text
stringlengths
1k
23.6k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
16
1.34k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
4.91
int_score
int64
3
5
Are you and your family prepared to stay home for weeks or months at a time if a severe pandemic swept the globe? Most people aren’t ready to weather such an emergency. Yet many experts agree that we should be preparing for such an event. Pandemics have been part of human history for thousands of years, and it stands to reason that one will happen again. TIME reports that microbes evolve about 40 million times faster than humans; eventually, one tiny virus could evolve in a way that spreads easily and completely devastates our immune systems. Preparing for a pandemic is similar to preparing for other emergencies like a long-term power outage or natural disaster, but there are some key differences. Let’s take a look at what you can do, on a budget, to prepare your family for a pandemic. What Is a Pandemic? The word “pandemic” stems from the Greek words “pan” (meaning “all”) and “demos” (meaning “people”). Thus, a pandemic is a widespread infectious disease, bacteria, or virus that sickens a large number of people worldwide. When a disease or illness is isolated to one region or country, it’s called an “epidemic.” Throughout history, humans have experienced a number of pandemics, some of which have killed tens of millions of people. These pandemics include cholera, smallpox, measles, yellow fever, tuberculosis, malaria, and Ebola. One of the most devastating and well-known pandemics is the Black Death, also known as the Plague, which swept across Europe and Asia during the mid-1300s. It’s estimated that the Plague killed 30% to 60% of Europe’s population, or 75 million to 200 million people. The influenza virus has been the cause of many pandemics. In 1918, a strain of the virus called the “Spanish flu” swept the world. The Centers for Disease Control (CDC) estimates that this virus sickened up to one-third of the world’s population (around 500 million people) and killed more than 50 million people. Some died within hours of symptom onset. Are We Overdue for a Pandemic? According to the Center for Infectious Disease Research and Policy (CIDRAP) at the University of Minnesota, there have been nine influenza pandemics over the past 300 years. According to the CDC’s research, these pandemics are not cyclical; in other words, there is no pattern to their occurrence. The longest gap between pandemics was 56 years, while the shortest gap was three years. We can’t say that we’re “overdue” for an influenza pandemic because each pandemic was a random event, and random events can’t be predicted. That said, scientists do expect to see a major pandemic of some kind in the future given their repeated occurrence throughout history. We’re at a greater risk for a pandemic now than in the past because air travel makes it easy for people to move quickly across borders, thus spreading infectious disease. There are also more of us; TIME reports that the number of people on the planet has doubled in the past 50 years, which means there are more of us who can become infected and, in turn, infect others. In an NPR interview, science writer Sonia Shah, author of the book “Pandemic,” said, “the majority of… pandemic experts of all kinds, felt that a pandemic that would sicken a billion people, kill 165 million people and cost the global economy about $3 trillion would occur sometime in the next two generations.” The Next Pandemic Might Be the Flu The influenza virus, in particular, worries many doctors, researchers, and scientists because it mutates quickly, which makes it challenging to create a vaccine that works. Each year, researchers must anticipate how the virus might mutate over time and then create a vaccine that will work against that particular strain. Sometimes, researchers accurately predict how the influenza virus will mutate and can create a vaccine that’s highly effective against the virus. Other times, the virus mutates in a way researchers did not expect, leading to a vaccine that’s less effective against the virus. When a new strain arises, it typically it takes four to six months to create and distribute a vaccine for it. In an interview with Scientific American, Paul Biddinger, vice chair for emergency preparedness at Massachusetts General Hospital, stated, “flu remains our number one global infectious disease threat.” It’s impossible for scientists to predict which virus, bacteria, or disease will cause the next pandemic. However, the Washington Post reports that since 1940, over 300 new infectious diseases have been identified, and the number of annual global outbreaks increased from less than 800 in 1980 to more than 3,000 in 2010. According to TIME, the CDC ranks the H7N9 flu virus (commonly known as the “bird flu”) as the strain with the greatest potential to cause a pandemic. If it ever mutates into a form that easily spreads from human to human, it could cause tens of millions of deaths. The problem is that we’re still not ready to handle such an emergency. Many experts agree that the world is grossly unprepared. The Global Health Risk Framework for the Future, formed to analyze the response to the 2014 Ebola epidemic in West Africa, issued a report that stated, “the global community has massively underestimated the risks that pandemics present to human life and livelihoods,” as The Washington Post reports. Forbes reports that the Bill & Melinda Gates Foundation has partnered with Google co-founder Larry Page and is devoting $12 million to the creation of a universal flu vaccine. Why? Because Gates believes the U.S. is unprepared for a severe pandemic like the 1918 Spanish flu, and he wants to change that. As Gates puts it, “The world needs to prepare for pandemics the way the military prepares for war.” How to Prepare for a Pandemic According to Harvard Business Review, current models suggest that a pandemic might sweep the globe in three distinct waves, each lasting from a few weeks up to three months. This means that you and your family should be able to survive on your own, at home, for a significant amount of time if you have to. Preparing for a pandemic is an important part of disaster planning and requires many of the same steps. However, there are some additional precautions you need to take in order to keep your family safe. 1. Be Prepared to Treat at Home Healthcare workers will face an ethical and moral dilemma during a pandemic. Do they report to work and help care for the sick, putting themselves (and their families) at risk for infection, or do they stay home and help ensure their loved ones don’t fall ill? According to a survey conducted by CIDRAP, almost half of healthcare workers admit that they would stay home during a pandemic. Another study, published in the journal BMC Public Health, found that 28% of healthcare professionals agree it would be acceptable to abandon their workplace during a pandemic in order to protect themselves and their families. Even if only 10% of healthcare professionals opt to stay home during a pandemic, and another 10% fall ill themselves, that’s still a conservative 20% reduction in the medical labor force at a time when hospitals and doctor’s offices will be flooded with patients. There’s a chance that some patients won’t be able to get in to see a doctor at all. Medication could also be hard to obtain. According to a 2006 study conducted by the Harvard School of Public Health, 43% of people believe they would have difficulty obtaining medicine should they have to stay home during an epidemic. During the 2017-2018 flu season, which turned out to be only slightly more severe than normal, the LA Times reported that pharmacies in California had medicine shortages. Supply disruption is also a real possibility during a pandemic. In order to save on storage space and costs, most hospitals and pharmacies only keep enough medicine on hand for a few days, depending on daily deliveries to keep their supplies stocked. In addition, many life-saving medicines are now made in Asia. If a pandemic occurs, there’s a good chance that deliveries will be interrupted or halted entirely. Stores are also likely to sell out of over-the-counter medication quickly. Stocking up now means you’ll already have what you need should a pandemic occur, and you’ll be less likely to have to leave the house for supplies, potentially exposing yourself to the virus. Consider stocking up on over-the-counter medication like: - Pain relievers - Cough and cold medicine - Stomach medicine, including anti-diarrheal Over-the-counter medication can be expensive, especially when you’re trying to buy it in large amounts. To save money, look for sales and coupons and only buy what you need when the price is discounted. Make sure to keep your medication rotated so it doesn’t expire by checking expiration dates every few months. You should also have a well-stocked first aid kit in your home and know how to administer emergency first aid like stopping traumatic bleeding and administering CPR. Remember, during a pandemic, hospitals will be overcrowded, and an ambulance might not be available to take you or your family member to a hospital should you break a leg or have a heart attack, so you should be prepared to deal with these emergencies yourself. Knowing first aid is an important survival skill and could save the life of someone in your family. Also,consider stocking up on face respirators so you’re protected if you do have to go out in public. The U.S. Food and Drug Administration recommends using an N95 respirator during public health emergencies, which you can purchase inexpensively on Amazon. The “N95” designation means that the respirator blocks 95% of tiny (0.3-micron) airborne particles. Keep in mind that a good fit is important for adequate protection, and N95 respirators are designed for adults, not children. You will need to purchase child-sized respirators (which you can also find on Amazon) to protect your children during an outbreak. 2. Plan for a Sick Room The CDC recommends that during a pandemic, the sick should stay in a dedicated “sick room” and use a dedicated bathroom that no one else will use. Start thinking now about which room in your home would work best as a sick room. If the room doesn’t have a door, have an extra plastic shower curtain on hand to partition it from the rest of the house. If someone does fall ill, quarantine them to the sick room and clean the room daily with bleach. 3. Stock Up On Food, Water, & Household Supplies The Department of Homeland Security recommends that families have at least a two-week supply of water and food to prepare for a pandemic. Supplies for a month or more are even better. Typically, you’ll need one gallon of water per person, per day, for drinking and hygiene. Building a long-term food storage pantry means you won’t have to put yourself at risk of infection by going to the store, and you’ll be insulated from the food shortages that could very well occur during the panic of a pandemic. So, what should you stock up on? Focus on shelf-stable foods that your family already eats and enjoys. This might include: - Dried beans, lentils, or peas - Protein bars, granola bars, or fruit bars - Canned soups, fruit, and vegetables - Peanut butter and jelly - Coffee, tea, and hot chocolate - Powdered drink mixes - Nuts and dried fruits - Beef jerky - Instant soup mixes - Baking essentials (such as baking soda, salt, and yeast) - Pickled vegetables - Dried milk - Evaporated or condensed milk - Trail mix - Comfort food (such as cookies, candy bars, and chocolate) - Oils (such as olive oil, vegetable oil, and coconut oil) - Pancake mix - Cereal (including hot cereals like Cream of Wheat) - Chicken, beef, and vegetable bouillon cubes - Liquid seasonings (such as soy sauce, vinegar, and Sriracha) - Liquid sweeteners (such as honey, maple syrup, chocolate syrup, and agave syrup) - Spices (such as salt, onion flakes, cinnamon, and ginger) - Packaged foods (including macaroni and cheese and instant potatoes) - Canned meats (such as tuna, sardines, oysters, chicken, turkey, pork, sausage, and Spam) - Formula or baby food (for very young children) You should also stock up on the supplies you’ll need to stay healthy at home. These items include: - Hand soap and sanitizer - Bleach or other surface cleaners - Toilet paper - Prescription medication - Fluids with electrolytes (like Gatorade and Pedialyte) - Garbage bags (for medical waste disposal) - Plastic gloves - Diapers (for very small children) Again, it can get expensive if you hit the stores to stock up on all of these items at once. Instead, purchase items slowly, over time, and only when they go on sale or you have a coupon. Don’t forget to stock up on food and supplies for your pets too. Although the chance of an outage is remote, it is possible that utilities and power supplies might be interrupted or stop entirely if a large portion of the working population falls ill or has to stay home to care for sick family members. Have enough supplies to survive without power for several days or weeks, including flashlights, lanterns, a hand-crank or solar-powered radio, and the ability to cook food without electricity, such as with a solar oven cooker. 4. Make an Emergency Plan If a pandemic is suspected, the CDC reports that it’s likely schools will close early to prevent the spread of the disease – and they could be closed for weeks or even months. How would you care for your children if you were still expected to report for work? Under what circumstances would you stop attending work in order to protect yourself and your family from illness? Do you have enough in savings to stop working for a period of time if necessary? It’s important to ask yourself these questions before a pandemic occurs. With a plan in place, you won’t have to worry about what you’re going to do if the worst should happen. Start thinking now about who might be able to care for your children during such an emergency. Consider other family members, friends, neighbors, or members of the community. Talk to these people beforehand to find out how you could help each other during a pandemic. Next, find out how your company might handle work absences during a pandemic. Do you have the ability to telecommute? If not, what would you need to get started? You should also make a list of community organizations you can contact to receive help in the form of information, medical assistance, food, and other supplies. A good place to start is the Red Cross. You might also want to talk to local officials about how they would distribute emergency assistance in your community during a pandemic. Last, make sure you have enough in your emergency fund to survive for a period of time without a regular income. 5. Explore Natural & Herbal Medicines While it’s important to have over-the-counter medications on hand to treat symptoms, it’s just as important to have an herbal medicine kit in your home to complement commercial medicine. Some herbal remedies are a great frugal flu treatment and can even be more effective than store-bought medicine. Herbs such as elderberry and oregano oil are very effective in preventing illness, as well as lessening the severity and length of an illness once it starts. They’re also great natural remedies to keep your kids healthy during a prolonged illness. 6. Practice Prevention Now Several simple actions can dramatically reduce your risk of catching (and spreading) an infectious disease. The CDC recommends that you: - Wash your hands for at least 20 seconds with hot soapy water whenever you come back from any public place or have been around anyone who is sick. - Keep your hands away from your face, particularly your eyes, nose, and mouth. - Cover your coughs and sneezes with a tissue. - Stay home when you’re sick, and don’t go out until you’ve been fever-free for 24 hours without the use of fever-reducing medications. - Clean frequently touched surfaces and objects. Start practicing these actions with your family today, especially if you have younger children. If you get into these habits now, they’ll be second-nature to you should a pandemic occur, reducing the risk that someone in your family will get sick. It can be frightening to think about experiencing a severe pandemic. Plenty of movies like “Contagion” and “Outbreak” play on these fears and show us, in terrifying detail, what it might be like if a pandemic ever became a reality. Preparing in advance is one way to alleviate some of these fears. If you have the ability to take care of your family at home for a significant period of time, you won’t have to worry about going to the store and exposing yourself to the virus. You also won’t have to worry as much about packed waiting rooms at the doctor’s office or hospital. The more you prepare now, the more in-control you’ll be should the worst occur. Do you have enough supplies to care for your family at home during a pandemic? What areas do you need to work in order to be prepared?
<urn:uuid:4fcbd925-f3d3-4078-a719-c6e4941448e5>
CC-MAIN-2019-22
https://www.moneycrashers.com/prepare-next-pandemic/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257259.71/warc/CC-MAIN-20190523143923-20190523165923-00342.warc.gz
en
0.958462
3,838
3.734375
4
Embed Size (px) Transcript of Common Raven From Wikipedia, the free encyclopedia Jump to: navigation, search "Corvus corax" redirects here. For the German band, see Corvus Corax (band). For the butterfly called "common raven", see Papilio castor. Least Concern (IUCN 3.1) Species: C. corax 811, see Classification Common raven range The common raven (Corvus corax), also known as the northern raven, is a large all-black passerine bird. Found across the Northern Hemisphere, it is the most widely distributed of all corvids. There are at least eight subspecies with little variation in appearance, although recent research has demonstrated significant genetic differences among populations from various regions. It is one of the two largest corvids, alongside the thick-billed raven, and is possibly the heaviest passerine bird; at maturity, the common raven averages 63 centimetres (25 inches) in length and 1.2 kilograms (2.6 pounds) in mass. Common ravens can live up to 21 years in the wild, a lifespan exceeded among passerines by only a few Australasian species such as the satin bowerbird and probably the lyrebirds. Young birds may travel in flocks but later mate for life, with each mated pair defending a territory. Common ravens have coexisted with humans for thousands of years and in some areas have been so numerous that people have regarded them as pests. Part of their success as a species is due to their omnivorous diet; they are extremely versatile and opportunistic in finding sources of nutrition, feeding on carrion, insects, cereal grains, berries, fruit, small animals, and food waste. Some notable feats of problem-solving provide evidence that the common raven is unusually intelligent. Over the centuries, it has been the subject of mythology, folklore, art, and literature. In many cultures, including the indigenous cultures of Scandinavia, ancient Ireland and Wales, Bhutan, the northwest coast of North America, and Siberia and northeast Asia, the common raven has been revered as a spiritual figure or god. o 1.1 Classification o 1.2 Evolutionary history 3 Distribution and habitat o 4.1 Diet o 4.2 Predation o 4.3 Breeding o 4.4 Intelligence o 4.5 Play 5 Relationship with humans o 5.1 Conservation and management o 5.2 Cultural depictions o 6.1 Cited texts 7 Further reading 8 External links The common raven was one of the many species originally described by Linnaeus in his 18th century work, Systema Naturae, and it still bears its original name of Corvus corax. It is the type species of the genus Corvus, derived from the Latin for "raven". The specific epithet, corax/, is the Ancient Greek word for "raven" or "crow". The modern English word raven has cognates in all other Germanic languages, including Old Norse (and subsequently modern Icelandic) hrafn and Old High German (h)raban, all which descend from Proto-Germanic *khrabanas. An old Scottish word corby or corbie, akin to the French corbeau, has been used for both this bird and the carrion crow. Obsolete collective nouns for a group of ravens (or at least the common raven) include "unkindness" and "conspiracy". In practice, most people use the more generic "flock". The closest relatives of the common raven are the brown-necked raven (C. ruficollis), the pied crow (C. albus) of Africa, and the Chihuahuan raven (C. cryptoleucus) of the North American southwest. While some authorities recognized as many as 11 subspecies, others only recognize eight: Subspecies Image Distribution Notes C. c. corax eastwards to Lake Baikal, south to It has a relatively short, arched bill. The population in south- western Europe (including the Balearic Islands, Corsica and Sardinia) has an even more arched bill and shorter wings than "typical" nominate, leading some authorities to recognize it as a separate subspecies, C. c. C. c. varius Iceland and the It is less glossy than C. c. principalis or nominate corax, is intermediate in size, and the bases of its neck feathers are whitish (not visible at a distance). An extinct color morph found only on the Faroes is known as pied raven C. c. subcorax eastwards to north- west India, Central Asia and western China though not It is larger than the nominate form, but has relatively short throat feathers (hackles). Its plumage is generally all black, though its neck and breast have a brownish tone similar to that of the brown-necked raven; this more evident when the plumage is worn. The bases of its neck feathers, although somewhat variable in colour, are often The name C. c. laurencei (also spelt lawrencii or laurencii) is sometimes used instead of C. c. subcorax. It is based on the population from Sindh described by Hume in 1873 and is sometimes preferred since the type specimen of subcorax collected by Nikolai Severtzov is possibly a brown-necked raven. The population restricted to the Sindh district of Pakistan and adjoining regions of northwestern India is sometimes known as the C. c. tingitanus North Africa and the Canary Islands It is the smallest subspecies, with the shortest throat hackles and a distinctly oily plumage gloss. Its bill is short but markedly stout, and the culmen is strongly arched. Canary ravens are browner than the North African ravens, leading some authorities to treat them as separate subspecies, with the latter maintaining the name C. c. tingitanus and the former known as C. c. canariensis. C. c. tibetanus Himalayas It is the largest and glossiest subspecies, with the longest throat hackles. Its bill is large but less imposing than that of C. c. principalis, and the bases of its neck feathers are grey. North-eastern Asia Intergrades into the nominate subspecies in the Baikal region. It is intermediate in size between C. c. principalis and C. c. corax and has a distinctly larger and thicker bill than does the nominate race. It has a large body and the largest bill, its plumage is strongly glossed, and its throat hackles are C. c. sinuatus, It is smaller, with a smaller and narrower bill than C. c. principalis. Populations in far south-western USA and north- western Mexico (including the Revillagigedo Islands) are the smallest in North America. They are sometimes included in C. c. sinuatus, while other authorities recognize them as a distinct subspecies, C. c. clarionensis. The common raven evolved in the Old World and crossed the Bering land bridge into North America. Recent genetic studies, which examined the DNA of common ravens from across the world, have determined that the birds fall into at least two clades: a California clade, found only in the southwestern United States, and a Holarctic clade, found across the rest of the Northern Hemisphere. Birds from both clades look alike, but the groups are genetically distinct and began to diverge about two million years ago. The findings indicate that based on mitochondrial DNA, common ravens from the rest of the United States are more closely related to those in Europe and Asia than to those in the California clade, and that common ravens in the California clade are more closely related to the Chihuahuan raven (C. cryptoleucus) than to those in the Holarctic clade. Ravens in the Holarctic clade are more closely related to the pied crow (C. albus) than they are to the California clade. Thus, the common raven species as traditionally delimited is considered to One explanation for these genetic findings is that common ravens settled in California at least two million years ago and became separated from their relatives in Europe and Asia during an ice age. One million years ago, a group from the California clade evolved into a new species, the Chihuahuan raven. Other members of th
<urn:uuid:d80cc763-f196-4f8c-84bc-79cc2b7479ac>
CC-MAIN-2022-33
https://fdocuments.in/document/common-raven.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.902685
2,276
3.625
4
The Importance of Choosing a Good Topic Choosing a good topic is an essential step towards delivering an effective speech. Explain the importance of selecting the right topic - When you tell a story, you want your audience to be engaged, so you choose a topic that will interest your audience. The same goes for speech giving. - topic: Subject; theme; a category or general area of interest. Tips for Choosing a Topic When you tell a story, you want your audience to be engaged, so you choose a topic that will interest your audience. The same goes for speech giving.When you choose a topic, consider your audience. Ask yourself: What topic, or subject, will engage the audience? If you are unsure what topic to choose, consider the following: - current events (newspapers, other media) - personal experience - your hobbies– Does your audience have an understanding of the basics of your hobby or the terms used in it? - your work–Are there things that you have learned through your work that would be useful to people who are not familiar with your profession? - books you may have read recently The trick is to be as relevant as you can to the audience who is listening to you. Your Areas of Expertise When selecting a topic consider areas in which you have expertise. Explain why choosing a topic in an area in which you are an expert is a good option - Considering your expert areas can help you decide what topic you will speak about. - An expert area is one where you have knowledge that most people do not. - Choosing an expert area for a topic has an advantage because you already have the knowledge, which makes it easier to explain to an audience. - knowledge: Familiarity or understanding of a particular skill, branch of learning, etc. - expert: A person with extensive knowledge or ability in a given subject. - expertise: great skill or knowledge in a particular field or hobby Your Expert Areas Many people have areas in which they are experts. Expertise: Considering your areas of expertise can be a way to generate a speech topic. Experts are people who have a thorough knowledge of something that most people do not. Expertise is when someone has a wealth of knowledge in a particular field. Rocket scientists are experts, but so are the analysts who talk about football on the television. When trying to select a topic for your speech consider any areas in which you are an expert. Do not expect to speak fluently on a subject that you know little or nothing about. Your fluency will be in direct ratio to two important conditions: your knowledge of what you are going to say, and your being accustomed to telling what you know to an audience. Your area of expertise might be a good topic to give a speech about because you already possess a familiarity with it. One benefit of this familiarity is that it reduces the time you will have to spend on researching. Instead, research will mostly be aimed at refining your expertise, enriching it, and ensuring that you are familiar with the conversation around that topic. When trying to determine what topic you will speak about, picking an area where you have expert knowledge increases the likelihood that your speech will effectively communicate with your audience. For the audience, you are the authority on the topic that you are speaking about, so it might help to already have authoritative knowledge. A speech whose topic is related to your expert area will draw on your extensive knowledge, making it easier for you to explain the specifics of the topic to the audience. Your Areas of Interest Consider areas that you are interested in when trying to select a topic for your speech. Select your topic from an area in which you have an interest but are not yet an expert - An interest is something that you are aware of but don't know much about. - Think about what intrigues you about the area you are interested in. - Choosing something you are interested in as a topic will likely turn you from a novice to an authority. - Interest: A great attention and concern from someone or something; intellectual curiosity. While most people are experts in certain areas, possessing highly specific knowledge, they also tend to have areas that they might not know much about but have an interest in knowing more. One stamp might lead someone to be interested in stamp collecting. Or maybe you have had a conversation with a friend who introduces you to an idea that interests you but you have not found the time to thoroughly investigate it. When trying to select the right topic for your speech, consider any areas that you are interested in. A Stamp Collection: Someone who has an interest in stamps might think about that as a speech topic. There are many advantages to searching in an area of interest for the topic of your speech. As you research your topic, you will move from having an interest to having a good understanding. In this way, your journey will mirror that of the audience who you will be speaking to. Your goal as the speaker is to make the audience interested in the topic of your speech and then inform them about that topic through the course of your speech. When choosing a topic, think about an area that interests you. Then ask yourself some questions, like "Why do I think this is interesting? " and "What specifically interests me about this topic? " Follow through your initial sense of inquisitiveness and consider how you might recreate this sense of interest in the speech, which would draw your audience in in a similar way to how you initially became interested in the topic. Then consider how you might enrich this interest by researching the area and learning more about it. The goal of your speech is be to navigate the audience through the same journey you went through, from ill-informed interest to informative understanding. Brainstorming is one method to finding the right topic for a speech. Employ brainstorming as a method to help you generate topic ideas - Brainstorming can be a helpful way to find the topic for your speech. - Brainstorming is a helpful method to generate a large numbers of ideas in a spontaneous manner. - During a brainstorming session, give yourself a time limit and then let yourself consider any thoughts you have in considering what the topic of your speech will be. - brainstorming: A method of problem solving in which individuals or members of a group contribute ideas spontaneously. You have considered your areas of expertise. You have considered your areas of interest. And you are still trying to choose the right topic for your speech. In addition to these other methods of finding and selecting the right topic, brainstorming is an effective means for generating potential speech topics. Think of a brainstorming session in terms of what happens during a real storm. Think of the ideas as rain. Good storms have lots of rain, and a good brainstorming session should generate lots of ideas. And hopefully your brainstorming session will have a lightning strike, or an "ah-ha! " moment, where you identify the perfect topic for your speech. Speech Topics: Brainstorming allows you to generate topics for your speech. The goal of a brainstorming session is to let yourself quickly generate a large number of ideas, commonly in relation to a specific purpose. When brainstorming for speech topics, write at the top of a fresh piece of paper: "What topic should my speech be about? " Then, under the question, let yourself write down what comes to your mind for a pre-established period of time. Let yourself generate as many different answers to the question as come to mind. Brainstorming is one of many ways to help you find and select the best topic for your speech. Brainstorming should feel less stressful than other methods of generating ideas. Use brainstorming as a creative way to come up with different topic ideas. Use the creative topic ideas that you have generated during brainstorming to help decide what your speech will be about. A well-chosen topic is key to the success of a good speech. Lightning Strikes: Lightning strikes, or "ah-ha" moments, during brainstorming mean that you are coming up with ideas. Scoping Your Topic Once you have generated a variety of ideas, it is time to narrow the topic to ensure it fits the scope of your speech. Demonstrate how to narrow your speech topic - Scoping your topic is identifying the subtopics related to the general topic your speech will address. - The amount of time allowed for the speech will help determine how narrow or broad the scope should be. A broader scope will take more time to explain, while narrowing will allow you to cover the material in less time. - If your goal is to include more detailed information, narrowing your scope will allow you to analyze your topic more completely. - narrow: To reduce in width or extent; to contract. - topic: Subject; theme; a category or general area of interest. - scope: The extent of the area or subject matter that something deals with or to which it is relevant. After much deliberation, you have selected a topic. Congratulations! Now comes the fun part: making that topic manageable and developing your speech. Think of your preliminary work as establishing a general target. Now the goal is to narrow your aim and find the bull's-eye ! Narrow Your Topic: Narrowing your topic is like aiming for the bull's-eye on an archery target. Even though it is not an easy decision to come to, deciding on the general topic has only set you out on the path toward developing a speech, not toward leading you to the end. If you decide your topic will be about basketball, for instance, that is quite a broad topic. Will your speech be about the history of basketball? Will it be about specific players? Or specific rules? Scoping your topic is the process of identifying the important subtopics that form the parameters of your speech. As these questions make clear, picking a general topic is only a first step. What you need to do is establish the scope of your engagement with the topic of your speech by breaking it into the important parts. An important consideration when you begin narrowing in on the specific area of your general topic is how much time you will have to deliver your speech. If you have a shorter amount of time, you will need to narrow the scope of your speech. If you have a little more time, you might be able to cast a wider net when it comes to the topic of the speech. Use time constraints to your benefit, let them guide you to narrow the scope of your speech. Scoping your topic will not only make the writing of the speech easier, but by narrowing the scope of your speech, you also increase the likelihood that your speech will effectively communicate with the audience. Covering a more narrow scope will allow you to include more detailed information, and cover your topic more fully. When your speech has a focused engagement, it is easier for audiences to follow along and be informed or persuaded, depending on what the purpose of your speech is. Licenses and Attributions
<urn:uuid:f0631e12-7943-46d1-a3a7-87db712281d7>
CC-MAIN-2022-33
https://www.coursehero.com/study-guides/boundless-communications/finding-and-selecting-a-topic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00405.warc.gz
en
0.948853
2,357
3.375
3
Background Image for Hero: Opportunity and the Ripple Effect Yogen stood in the lab in Cleveland. It had been seven days since he started the simulation. The computer ran for a full week crunching numbers before it was ready to reveal its findings. The system worked, the computer said. “Good news,” he thought to himself. But there were some spikes in the data that didn’t look promising.Yogen’s tree “That’s how this goes. This is how research works.” He started punching in the parameters for the next simulation. The next big wait. Half a country away, Austen Robinson was sitting in a control room in Texas. The massive screen crackled to life as he rifled through his notes. The image showed an empty chamber with lots of hardware and tubing. Then an astronaut floated into view and looked right into the camera. “Hey. What’s up, guys?” the spaceman asked. Dr. Yogendra Panta is fascinated with the fluid dynamists of old. Newton. Bernoulli. Even DaVinci. “He wasn’t actually a fluid dynamist, but he understood fluids. In his art, he showed things like turbulence in sea waves and wind drag in his machines. He imagined everything about fluid behavior. It was way before his time,” said Yogen. Fluid dynamics are everywhere. The water that sustains us. Less obvious, the air we breathe. “It is really important to maintain thermal systems in everyday things. Even our bodies do this. We can’t even survive without those two,” Yogen said. So fluid dynamics impacts how we live, how we move, how we regulate temperature and just about everything else around us. It’s Yogen’s passion, and it’s also how he found himself in Cleveland at that supercomputer. Dr. Yogendra Panta works in a lab at the Glen Research Center. “Turbojet engines release a tremendous amount of heat, which can cause them to wear down or malfunction. One of the easiest ways to cool them is to use a fan, but it’s not always enough. We’re focusing on a heat exchanger where we circulate cold water to cool the engines,” he said. Yogen and his team were tasked with establishing design guidelines for turbine blades that feature integrated cooling. That included designing, modeling and prototyping test devices. His team landed on the concept of pulsating heat pipes. The system uses tubes filled with a special coolant that can quickly draw heat away from an engine as it’s in use. Half gas, half liquid, the coolant works by constantly changing its state – or “pulsating” – as it evaporates and condenses. It’s a system already in use in small-scale electronics, and Yogen saw it as a solution to fitting a big job into a small space. Yogen started by examining different pipe configurations. Then he would build digital prototypes and run computer simulations. “We had to factor in pressure, cavitation, turbulence, viscosity, thermal conductivity and the amount of liquid in the computer modeling simulations. The point was to figure out how the cooling system could remain in a steady state during use,” he said. For the first ten weeks, that was Yogen’s focus. Work up simulations, run them and see what came out. “Some of the simulations didn’t turn out to be stable, but that’s part of the process,” he said. The team was running into issues with their simulations. But remember, fluid is everywhere. Nature is bursting with examples of efficient fluid systems. So Yogen turned to nature and to VINE – the Virtual Interchange for Nature-Inspired Exploration. The organization collects and documents data from various organisms and ecosystems. “They have sets and sets of data on natural movements. How to mimic an insect. How to mimic a butterfly. How to mimic the flight of hummingbirds. They use those data to experiment with different devices. They’re looking at using the flight mechanics of hummingbirds to collect weather data on Mars,” he said. Yogen didn’t need a hummingbird. He needed a tree. “What we’re trying to do is circulate the flow of that pulsating fluid through those branches, like roots or blood vessels, mimicking nature,” he said. The group settled on a multi-branch system and got to work running simulations. Two branches. Four branches. Eight branches. In his second ten weeks, Yogen worked with electrical engineers, material science experts, data science pros and specialists in turbomachinery. His team produced more than two dozen physical prototypes and harvested test data from each one. “We’ve had really promising results,” he said. Still, it was painstaking work. “There was a moment when we were successful in modeling the multiphase system that was really satisfying for our group,” he said. “We were struggling to make the modeling properly and to validate with experimental results for over a month or so.” The group persisted and found a few configurations that looked like they might work. It was a cap on what Yogen says was an incredible experience. There’s a lot more work ahead, but he says the cornerstone is laid. He’ll continue working on the project, and he expects other researchers will add pieces to the puzzle. “This is an initial idea that we’re building a foundation for. You don’t just get something like this with the snap of a finger. It takes a lot of time. It takes a lot of minds and effort to bring it out into the world.” A story starts in Beckley Yogen has always been a teacher. “It’s not the best for making money,” he said laughing, “but it’s the best for having satisfaction in your life.” He’s been at WVU Tech for half a decade, but his teaching career spans a lifetime. “Back in Nepal, I taught right after I graduated from high school. After finishing tenth grade, I taught ninth and tenth graders. I taught in the college I graduated from,” he said. Yogen says that drive to teach is fueled by two things: exploring the world around him and then sharing his findings with his colleagues and students. One of those students is Beckley-born Austen Robinson, a mechanical engineering major who took Yogen’s dynamics class a few years back. The two worked well together. Dr. Yogendra Panta and Austen Robinson in a WVU Tech engineering lab. “Dr. Panta really inspired me to stay in mechanical,” Austen said. “I was still bouncing around and I didn’t know what I wanted to do. I was behind, but his teaching and who he is inspired me to stay.” Not only did Austen stay in the field, he decided to specialize in aerospace engineering. He’s now at WVU wrapping up the degree. Because of that chance encounter, he says he’s gained some incredible working experience– a ripple effect of following his mentor’s advice and chasing down opportunity. Two astronauts walk into a gym Austen had already started fall classes on the Morgantown campus when he got the call. NASA’s Johnson Space Center in Houston, Texas (you know: “Houston, we have a problem”) was offering Austen an internship for the semester. “I dropped all my classes. Then I drove 20 hours – halfway across the country – to Houston,” he said. “It was totally worth it.” Austen was assigned to the exploration exercise lab where engineers develop and maintain exercise equipment for astronauts on the International Space Station. He wound up working with a mentor on a data analytics project for the ISS’s Advanced Resistance Exercise Device. The machine uses vacuum tubes to simulate weight so astronauts can do resistance exercises in zero gravity. His job? To streamline how coaches and doctors on Earth receive exercise data from the device. “When the astronauts do exercise on the ISS, that data gets sent down in raw form. It’s important for our engineering team to track to help us do maintenance on machines and to make sure astronauts are doing the right amount of repetitions,” he said. Austen demonstrates exercises on a test ARED device. Austen spent the bulk of his time in the internship writing software from scratch. His program retrieves that raw exercise data from the space station and turns it into a polished report that details the type of exercise and the number of repetitions for each astronaut that used it. His experience went well beyond coding, though. During the internship, one of the vacuum cylinders on the device malfunctioned, so it was sent back down to Houston for repairs. It was a lesson in detailed engineering. It was also a lesson in patience. “We completely stripped it apart and refurbished it. It took us two months because we had to write up documents for each step. Each piece is verified through the space hardware program. You had to report on each individual screw you removed and where you put it,” he said. During the process, the team had to create detailed maintenance procedures so astronauts could perform repairs in orbit. Austen had to visit the astronaut training facility and perform the procedures on actual ARED devices. So, the next time the device went up, it came with detailed instructions. It didn’t always go as planned. “Something went wrong with one of the procedures on a different machine. There was a detent plate and we couldn’t get two-point contact. It wasn’t going well, so we had to go to mission control and walk the astronauts on the ISS through the process on a live stream,” he said. And there, in that room along with five or six NASA engineers, a kid from Beckley chatted with astronauts who were hurtling around our world at more than 17,000 miles an hour. “I was just trying to keep my cool,” he recalled. “It was absolutely surreal to be talking to them one-on-one.” The entire experience was so powerful that Austen applied for a second internship over the summer. He landed in the same unit and continued his work in software, helping one of his mentors with the OnePortal program, which will serve as the main user interface software for all exercise equipment in the future. “In the summer of 2020, this software is scheduled to fly to the ISS and become the new ARED software,”he said. He also revisited the ARED with a mission to find ways to enhance the device. Working with a team of interns, Austen helped develop a new way to ensure astronauts were doing their exercises correctly. Austen and the NASA team. “My project aims to provide a non-invasive form check while exercising. Using load sensors that are already on ARED, we can calculate the user’s center of pressure while exercising, providing live feedback to the user as well as ground analysis to the trainers and engineering support team,” he said. The team was inspired by the Fit Balance Board, a popular Nintendo Wii accessory. “Another intern and I spent a week doing just math equations. We spent time drawing free body diagrams and deriving equations that would use values from the ARED’s load cells and calculate an X and Y value – the center of pressure. After finding our equations, we developed a program that could read the actual data from ARED,” he said. The system is about more than making sure an astronaut is doing proper squats. Austen wants to impact astronaut life as they go beyond orbit. “The project is based around the idea of making crew life as autonomous as possible, which is crucial for future exploration missions as message communications to Mars can take up to 20 minutes each way. Any way we can use technology to help the crew while exercising will be crucial as the trainers and other support on the ground will not be able to communicate daily as they do now,” Austen said. When the Apollo 11 crew came back from the moon in 1969, they brought home rock samples that changed the way we understand how worlds are formed. Samuel Lawrence, a NASA planetary scientist, calls those specimens the “Rosetta Stone of the solar system.” President Nixon understood the gravity of the stones and what they meant for humanity, so he sent samples to every nation in the world. Yogen and Austen have held to that spirit of exploration and sharing. Yogen brought back a wealth of knowledge on how to perform complex research, best practices for distilling and delivering data, contacts in his field from all over the world and even the kind of technology in use to help researchers do their jobs more effectively. He’s busy sharing that experience with colleagues and students. He’s implementing new technologies in the classroom. Inspired by his experience, he’s encouraging others to chase those opportunities. “I learned so many things that I can bring back to WVU Tech. I’ve been able to incorporate a lot of this in the classroom. We have to spread the word. Our students and our faculty are capable of so much. They can do this kind of work and they can do it well and gain experience,” he said. Austen came home a different person. He found a passion for the human aspect of engineering. He learned valuable lessons in leadership, teamwork and networking. “I learned so much and met so many people. Without a doubt, this has changed the trajectory of my career,” he said. He’s continuing his work with the OnePortal program remotely, and he’s using his experience to encourage others. “It’s something that can change you. Just keep applying, even if you don’t think you have a chance. And make sure to make the most of it if you get lucky enough to get an offer,” he said. For both men, there’s palpable awe and enthusiasm for their fields. There’s a sense that seizing opportunity can transform everything. And as the two share their own moon rocks with those around them, they do so with a new mantra. “Learn something. Bring it back. Share it,” said Yogen.
<urn:uuid:60645bc9-ead7-409b-9651-55b3bc5cdd1b>
CC-MAIN-2022-33
https://magazine.wvutech.edu/features/opportunity-and-the-ripple-effect
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00405.warc.gz
en
0.966603
3,112
2.625
3
The vast majority of Ukraine’s volunteers would never pass the physical fitness tests of the U.S. Army. And yet earlier this year, they pulled off a feat almost unparalleled in modern warfare: they helped defeat one of the largest standing armies in the world and held the capital. The Battle of Kyiv proved that volunteers could shape the course of a war, which holds important implications for the future of war, especially between large powers and their smaller neighbors. When Russia’s 150,000-man army invaded Ukraine from multiple directions on Feb. 24, many analysts thought Kyiv would fall in a matter of days. What these analysts and the Russians did not anticipate was the will and capability of Ukraine’s “volunteers” and the important role that they would play in Kyiv’s defense. That is because the Russians expected the resistance to resemble the same feeble forces they witnessed in 2014, when they invaded and annexed Crimea with ease. The importance of the volunteers cannot be understated. We just returned from Kyiv, where we interviewed dozens of Ukrainian Army, Territorial Defense Force and civilian volunteers, as well as visited dozens of sites. It was clear from the onset and confirmed throughout our visit that volunteers played a critical role in the defense of Kyiv, yet their role has not been systematically studied. When tens of thousands of Russian troops amassed along Ukraine’s border in 2021, Ukraine sought to formally incorporate its volunteers into its national defense. Last year, Ukraine’s parliament passed a law “on the foundations of national resistance,” that took effect in January and established a Territorial Defense Force as a stand-alone branch within the military. The force included 10,000 career positions, supplemented by 120,000 civilian reservists organized into 20 regional brigades. Russia initiated the invasion before Ukraine could formally organize its Territorial Defense Force; nonetheless, Ukraine was ready to arm its volunteers. In the days after the invasion, tens of thousands of Ukrainians poured into recruitment centers throughout Kyiv and around the country to receive an AK-47 rifle and two magazines. Lacking a formal structure, these volunteers largely self-organized to establish defensive positions within their towns. It was not until the defense of Kyiv was nearly over that these volunteers became formally organized. For example, the Territorial Defense Force battalion in the small city of Bucha, a city that played a critical role in the defense of Kyiv and is known for atrocities committed there, was not formally organized until March 31. Who are the volunteers? Most of the volunteers we met were male, but women also serve in combat and noncombat roles. Indeed, these volunteer units constitute a broad cross-section of Ukrainian society, ranging in age from 18-60; with some younger and older. All the volunteer fighters we met were highly motivated, even if they might not be able to pass a standard military physical exam. When asked who gave them their orders during the opening days of the war, many provided similar answers: “No one. I acted on my own.” Upon seeing a bridge or road unguarded, many volunteers took it upon themselves to pull other volunteers to provide the necessary defense. In some ways, it was the perfect execution of the U.S. Army’s mission command. Despite lacking true mission orders, each volunteer clearly understood the commander’s intent—defend the capital—and exercised the disciplined initiative to accomplish the mission. Everyone we talked to, both regulars and volunteers, trusted those around them. Volunteers and regular forces co-mingled throughout the defense of Kyiv. A bridge too far Take the ambush at Giraffe Bridge. Ukrainian National Guard and active duty forces defended against the Russian air assault at the Hostomel Airport on Feb. 24, but the Ukrainian regulars largely pulled back to defensive lines closer to Kyiv following their tactical victory. This left volunteers to defend forward of Kyiv’s main defensive lines, somewhat analogous to skirmishers in America’s Civil War defending forward of regular lines. In Kyiv’s northwest, regulars defended along the Irpin River, leaving the volunteers to lead the defense forward of the river in small cities such as Bucha and Irpin that sat just outside Kyiv’s city limits. While many are familiar with the alleged war crimes Russians committed in Bucha and Irpin, less known is that volunteers, supported by regular army forces—primarily artillery—conducted much of the fighting there. The alleged Russian atrocities appear to be a direct result of the effectiveness of the volunteers as the poorly trained and poorly led Russian soldiers took out their frustrations on Ukrainian civilians. By March 1, Russian forces had reached Bucha and were advancing on Irpin, a city of 60,000 just outside Kyiv. The Bucha River separates the two small cities, so the Russians had few routes into the city. The Ukrainians established an ambush on the primary route into Irpin. Ukrainian regulars established a defensive position along the Giraffe Bridge across the river in Irpin, with volunteers occupying positions along the road in Bucha. As was common in the early stages of the war, the poorly trained Russians advanced as if they were on parade as opposed to expecting contact with the enemy. When the lead vehicle approached the bridge, Ukrainian regulars destroyed it with an anti-tank missile at the same time volunteers destroyed the trail vehicle. The closely packed convoy on the narrow street became pinned and an easy target for Ukrainian artillery which destroyed the entire convoy. Over the ensuing weeks, the Giraffe Bridge would see eight more similar skirmishes between Ukrainian volunteers and Russian soldiers. Tank ambush at Brovary On the east side of the Dnipro River, volunteers armed with RPGs and special operators armed with Stugna anti-tank missiles engaged a slow-moving Russian tank battalion. Together with artillery, the Ukrainians destroyed a surprising number of tanks and forced the rest to flee. Days later, the Russians would eventually enter the city, but that was as close as they would get to Kyiv from the east. On April 2, the Ukrainian forces recaptured the city and Russia troops aborted their attempt to seize the capital. Volunteers as sensors Volunteers also provided an important intelligence role. When Russian forces advanced toward Kyiv’s northeast, they established a resupply and refueling point in the town of Bervytsya. An older Ukrainian woman living across the street notified appropriate authorities of the Russian position. Hours later, the Ukrainian military struck, killing all the Russians and decimating their position. Luckily, the old woman and her house were unharmed. This was not a typical Western neighborhood that includes sidewalks, curbs and a wide paved street. It was a rural town with a narrow gravel road. Despite her house being less than 25 yards from the exploding ordnance, it, amazingly, suffered no damage. What the battle for Kyiv shows is that volunteers and local militias are a necessary component for smaller nations’ militaries. With a defense budget roughly 10% the size of Russia’s, Ukraine has sought NATO membership to enhance its defense, but membership seems unlikely, at least in the near term. A large standing army is prohibitively expensive, and Ukraine cannot match Russia battalion for battalion, so a volunteer force is an effective way to bolster its defense. The battle also shows that civilian populations can be just as effective as technological sensors. Despite Russian electronic warfare and cyberattacks, Ukrainians were able to maintain communications and call in the positions of Russian forces. Rarely were calls made to a formal 911 call center characteristic of the United States. Often it was through communications apps, with civilians or volunteers communicating with someone in the military who they knew. That contact would then transmit intelligence to the right person. Some of the volunteers we observed had extremely good weapons. When we asked how they obtained them, they said they retrieved them from Russian forces at Hostomel and other locations. Often, it was the only way for volunteers to get machine guns and RPGs since the Ukrainian Army lacked sufficient numbers of these weapons to distribute to volunteers. But volunteers require the support of a conventional army to be most effective. Just as infantry is most effective when fighting as part of a combined arms formation, the same goes for volunteers. While we heard stories of smaller volunteer teams engaging vehicles with RPGs, they are not sufficient against larger formations. The large ambushes at Bucha, Brovary, and other locations often involved a mix of volunteers, special operations forces, and the regular army. To be sure, any decisions to use civilian volunteers can put civilians at risk. Any civilian that directly participates in fighting loses their protected status under the laws of war and is considered a combatant. Furthermore, even civilians who are just providing information can find themselves at risk of reprisals from frustrated and poorly disciplined invaders like seen in Ukraine. How and when civilians provide information must be a calculated, protected process. Perhaps most important, and a lesson that the Finns have learned, is that volunteers enhance deterrence. While Ukraine was unable to deter Russia’s invasion, the impact of these volunteers in the current war may serve as a deterrent to future wars. The Baltic states have embraced this strategy. And this also has implications for deterring a Chinese invasion of Taiwan; China is much less likely to invade if it believes the entire population will take up arms against it and this force can actually be effective. The defense of Kyiv demonstrated that volunteers can play an important role in maneuver and guerrilla warfare, although the latter was only minimally observed in the defense of Kyiv. Yet the impact of volunteers is likely more muted in the attrition warfare currently being waged in Ukraine’s east. With more static positions and shorter supply lines, it offers the volunteers fewer opportunities to leverage their strengths. Expect to see them organized into more traditional battalions as they were in 2014. The war is far from over, but Ukrainian volunteers have left an indelible mark on how smaller nations fight. Liam Collins is the executive director of the Madison Policy Forum, a member with the Council on Foreign Relations and a fellow with New America. He also served as a defense advisor to Ukraine from 2016-2018. He is a retired U.S. Army Special Forces colonel with deployments to Iraq, Afghanistan, Bosnia, the Horn of Africa and South America. He is co-author of the forthcoming book, “Understanding Urban Warfare.” John Spencer is the chair of urban warfare studies at the Madison Policy Forum. He served 25 years as a U.S. Army infantryman, which included two combat tours in Iraq. Together, he and Collins traveled to Ukraine in June 2022 to research the defense of Kyiv. He is the author of the book “Connected Soldiers: Life, Leadership, and Social Connection in Modern War” and co-author of the forthcoming book, “Understanding Urban Warfare.” Have an opinion? This article is an Op-Ed and as such, the opinions expressed are those of the authors. If you would like to respond, or have an editorial of your own you would like to submit, please email Military Times senior managing editor Kent Miller. Want more perspectives like this sent straight to you? Subscribe to get our Commentary & Opinion newsletter once a week.
<urn:uuid:339e53c9-6411-4a55-9a21-34f28ea0752a>
CC-MAIN-2022-33
https://www.marinecorpstimes.com/opinion/commentary/2022/07/05/how-volunteers-can-defeat-great-powers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00603.warc.gz
en
0.967777
2,332
2.640625
3
Macroeconomic and growth-led policies are often premised on two assumptions; firstly, that poor and malnourished people are physically and psychologically equipped and ready to participate in vigorous economic activity and secondly, that although they are excluded from economic development, somehow the dynamic results of growth will filter down to them, solve their problems, and render them capable of gaining from the development process. But experience reveals that countries that do not prioritize social sectors such as health and nutrition, and fail to address basic needs of people, cannot achieve sustained and high rate of economic growth and human development. Even if development opportunities exist, poor families cannot often take advantage of them. The capability approach of the Nobel Laurate economist Amartya Sen explains that a person’s capability to live a good life is defined in terms of the set of valuable ‘beings and doings’ like being in good health or having loving relationships with others to whom they have real access. Indeed, poverty vis-à-vis resultant endemic hunger stand in the way of achieving that capability. For them, there is no long-term solution. The vicious cycle of hunger begins with low-birth weight babies born in food-deficit homes, and who remain undernourished throughout childhood and are unable to develop their mental and physical capacities even to average levels. Upon reaching adulthood, they are stunted, wasted and inadequately skilled, and therefore forced to sell their only asset, physical labour, at any available wage rate. As may be expected, the market pays only lowest possible wages for such unskilled labour thus extending the initial food shortage-poverty scenario into a lifelong one. Women from ‘hungertrapped’ households marry young, put in enormous amounts of physical labour, and suffer severe nutritional problems while fighting to survive. Caught in the trap of under-nourishment and anemia, they give birth to weak and vulnerable babies, perpetuating the cycle of hunger and poverty. The so-called ‘Barker Hypothesis’ also posits that maternal dietary imbalances at critical periods of development of womb can trigger an adaptive redistribution of fetal resources (including growth retardation). Such adaptations affect fetal structure and metabolism in ways that predispose the individual to later lifestyle diseases. Thus, intergenerational cycle of malnutrition sets in. Hence, in order to address food insecurity in the long run, it is imperative to break this cycle of hunger. On an individual scale, hunger occurs when a person consumes insufficient amounts of calories. Literally, hunger means the physiological desire to consume food. Hunger cues are physical feelings that originate in our brain. Neuropeptide Y (NPY) is the neurotransmitter responsible for feelings of hunger. When our body is running low on glucose and glycogen, it releases a hormone called ghrelin. When this hormone reaches the brain, it releases NPY, and we start craving sweet or starchy foods. Once glucose level rise, our body releases ghrelin’s counterpart, leptin. When leptin reaches the brain, it inhibits NPY and we feel like we have had enough food. There is considerable confusion about what constitutes hunger, malnutrition and starvation. Hunger is the most widely used term to indicate food deprivation. The word hunger is used in the sense of ‘appetite’ caused by an empty stomach. People suppress their hunger by availing of non-nutritious ‘pseudo foods’ like tubers and mango kernels, tea or cheap intoxicants. When poor access to food results in physiological damage to the body, then the person is malnourished. If the denial is prolonged to such an extent that it threatens survival or makes people vulnerable to curable ailments due to malnutrition, then they are living with starvation. When such people die, the starvation death is proved by a post-mortem that shows a completely empty belly. However, subjective definitions and physiological cause of hunger do not lead automatically to an understanding of the extent of food deprivation. As defined in The State of Food Insecurity 2001, “‘Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life.” The emphasis on consumption, the demand side and the issues of access by vulnerable people to food, is most closely identified with the seminal study by Prof. Sen. Eschewing the use of the concept of food security, he focuses on the entitlements of individuals and households. Scientists have been studying food security for decades, and for many years they relied on crude metrics such as food available per capita, or the rate of stunting among children. However, these methods come with problems. The amount of food grown by a country or stored in national reserves do not account for inequalities in access to that food, while population level metrics like rates of stunting are confounded by things like infectious disease and parasites (sanitation). Today, scientists use a new metric called the Food Insecurity Experience Scale, which measures people’s experiences of hunger, rather than just crude proxies for hunger. It involves questions about skipping meals, running out of food, and worrying about having enough to eat over the previous year. As one of the most informative and crossculturally valid metrics of food insecurity, it has been selected as one of the key indicators for the second Sustainable Development Goal of Zero Hunger. Now, with the World Hunger Clock, it is possible to explore this important metric at high spatial resolution including projections into the future for the entire world. Due to the impact of coronavirus on the global food system, 2000 and 2021 will see the highest levels of hunger, because people lacked resources to purchase the food they would like, while 800,000 people are severely food insecure, going entire days without eating once. Let us consider India. India has moved from food shortages to self-sufficiency in production, built up substantial buffer stocks, and is even exporting foodstuffs. Democratic dialogue has taken place on prevention of famines as a social commitment, but that has not yet happened with persistent hunger and chronic undernourishment. Around 19 crore Indians go to bed hungry every night. About half of Indian children are chronically undernourished, and more than half of adult women suffer from anemia. The terrible combination that we have in India, of immense food mountains on the one hand and the largest conglomeration of undernourished in the world is a paradox. Every year, the Global Hunger Index (GHI) tracks hunger and malnutrition across the countries using four indicators: (1) undernourishment: share of the population with insufficient caloric intake; (2-3) Child wasting: share of children under age five who have low weight for their height, reflecting undernutrition; child stunting: share of children under age five who have low height for their age, reflecting chronic undernutrition; and (4) child mortality: the mortality rate of children under the age of five. Based on these four indicators, the GHI determines hunger on a 100-point scale where 0 is the best possible score (no hunger) and 100 is the worst. India has slipped to 101st position in the GHI 2021 of 116 countries, from the 2020 position of 94th. With a score of 27.5, India has a level of hunger below its neighbours, Bangladesh, Nepal, and even Pakistan. The GHI report also includes the most up-to-date data available at the time of its editorial deadline in July and applies the same standards to all countries to ensure comparability. For India’s 2021 GHI score, data on the four component indicators came from different sources. In his seminal book Ash in the Belly: India’s Unfinished Battle Against Hunger, Harsh Mander, a social activist, has described how, despite years of spectacular economic growth and achieving self-sufficiency in grain production, hunger in India is not only persistent but intergenerational. He has also described how hunger is not just limited to physiological dimension of an unappeased belly and chronic fatigue, but also characterized by psychological and social deprivation that come from loneliness, shame and low self-esteem. The poor and the hungry have learnt to live in a permanent state of destitution. To do so they eat food shunned by others, such as the poisonous herbs that grow in the wild, or beg for stale leftovers or starch water left over from boiling rice in richer households, or in extreme cases by selling their children in order to keep them and the ones left behind alive. When the wailing of infants gets too much, mothers give their fingertips laced with tobacco or natural intoxicants, to infants to suck. Sometimes babies are given cannabis or khaini or cheap country liquor. Those help them sleep with nothing in their stomachs. Documentation of these real stories by Mander in his book is one proof of the sad state of Indian poverty and hunger. Hunger is preventable. It is not difficult to end hunger in India. It is not like that we don’t have the food to feed the hungry. India produces more than enough food to provide for all its citizens. It is primarily a problem of general poverty. The problem lies in access to food. Amartya Sen’s entitlement theory basically approaches food security from an access point of view. It is particularly important to pay attention to employment opportunities. Moreover, what we don’t have is the political will that drives a zero-huger policy. Solving world hunger involves investing in smallholder family farmers, health care, financial services and increasing women’s access to resources. Above all, in the words of Revered David Beckmann: “It is important for people to realize that we can make progress against world hunger, that world hunger is not hopeless. The worst enemy is apathy.” (The writer is a retired IAS officer)
<urn:uuid:377621f6-0e3c-4679-84a5-739134b139a4>
CC-MAIN-2022-33
https://www.thestatesman.com/opinion/living-with-hunger-1503023892.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00406.warc.gz
en
0.947383
2,058
2.75
3
Along an unassuming residential street in the north London suburbs, there’s a house whose famous 1930s resident is still a household name. The Freud Museum in Hampstead was where the father of psychoanalysis lived with his family when he fled Nazi persecution. The Jewish neurologist lived and worked for the majority of his career in Vienna. But he spent his final year in Britain when his family escaped Austria following the Nazi annexation in 1938. He brought everything with him, so the museum holds his extensive library, collection of antiquities (Egyptian, Greek, Roman, and Oriental), the family’s Biedermeier furniture, and the prize of the museum’s collection: Freud’s famous psychoanalytic couch where his patients reclined. Psychology’s most famous figure is also one of the most influential and controversial thinkers of the twentieth century. Sigmund Freud’s theories and work helped shape our views of childhood, personality, memory, sexuality, and therapy. Freud is credited with moving treatment of mental illness out of asylums and into hospitals and therapists’ offices. Psychoanalysis is a method for treating mental health issues through dialogue between a patient and their analyst. Sigmund Freud emphasized the importance of the unconscious mind. A primary assumption of Freudian theory is that the unconscious mind governs behavior to a greater degree than people suspect. Indeed, the goal of psychoanalysis is to make the unconscious conscious. In the decades since his death, many of Freud’s methodologies, techniques, and conclusions have been criticized and called into question. There is a misogynistic ancient Greek view of the idea of hysteria that it only happened to women. Freud wrote his famous studies on hysteria, yet even though he had male patients with hysteria, he chose not to write about them. Freud perpetuated the idea that hysteria was a thing to do with femininity which is, of course, nonsense. Freud ‘ recognized the ancient power invested in the display of women’s genitals’ despite his arguably constricted attitudes towards women. We are only just starting to free ourselves of these misogynistic origins of medicine. But his impact on the field of psychology and mental health treatment is undeniable. Freud died in 1939, just one year after arriving in England. His youngest daughter Anna (herself a pioneer of child psychoanalysis) remained in the house until her own death in 1982. She bequeathed it as a museum to honor her father. The Freud Museum opened in 1986. The ground floor of the museum houses Freud’s study, library, hall, and the dining room. The museum shop is on the ground floor as well. The first floor has a video room, Anna Freud’s room, and a temporary exhibitions room. The Freud Museum exists to promote the intellectual and cultural legacies of Sigmund and Anna Freud for the learning and enjoyment of all. While caring for the house and collections, it aims to highlight the relevance of Sigmund Freud, Anna Freud, and psychoanalysis in the contemporary world. The Museum has been displaying contemporary art for over 25 years and has a reputation for innovative and exciting exhibitions. Artists who have responded to the house, its history and collections, and to the work of Sigmund and Anna Freud include Sophie Calle, Louise Bourgeois, Mark Wallinger, Susan Hiller, Gavin Turk, and Alice Anderson. No. 20 Maresfield Gardens was built in 1920 in the British Queen Anne Revival style. Sigmund’s fourth child, Ernst Ludwig Freud, had moved to London from Berlin in 1933. He was an established architect, so was already working here when the rest of the family arrived. He found the house and purchased it for them at £6,500 with the aid of a bank loan. He made various alterations, including knocking down a wall to create a combined library, study, and consulting room. He added the sunroom at the back of the new family home. Overlooking the well-maintained garden, this is now used as the gift shop. Sigmund Freud was 82 when he moved to this house and his wife, Martha Freud, known as Frau Professor, was 77. Their youngest daughter, Anna, was 43. She was the only one of their six children to become a psychoanalyst. Freud’s study (and consulting room) has been preserved to be as it was during his lifetime. The walls are lined with shelves of his books, and there are over 2,000 items in cabinets and on every surface. His books are wide-ranging, and subjects include biology, psychology, archaeology, art, and literature. He did sell 800 books before leaving Vienna but still managed to bring over 1,600 books. The coach where patients told him their dreams is covered with a richly-colored Iranian rug with chenille cushions piled on top. Other fine Oriental rugs, Heriz and Tabriz, cover the floor and tables. Freud’s patient Sergei Pankjeff described the experience of being analyzed in Freud’s consulting room as being more like an archaeology study than a doctor’s office. He did also say he felt it was homely, and the old objects made it easier to leave modern life behind. Freud explained his love for archaeology in that the psychoanalyst, like the archaeologist in his excavations, must uncover layer after layer of the patient’s psyche before coming to the deepest, most valuable treasures. This now iconic piece of furniture was given to Freud by a patient in 1890. The desk is cluttered, and there is the unusual, anthropomorphic chair that had been designed especially for Freud to accommodate his preferred seating posture, which was to have his legs over one arm of the chair. The chair was designed by Muriel Gardiner’s friend Felix Augenfeld. This is the room where Freud died. The Dining Room There were frequent large family gatherings as three of Sigmund and Martha’s children lived nearby (Martin, Mathilde, and Ernst). This is the room where you can learn about the context of Freud’s story and the story of psychoanalysis. Have a look at Edmund Engelman’s photos of the Freuds’ Viennese apartment Berggasse 19, taken just before the family left Vienna in 1938. You can also see Lucian Freud’s drawing, Palm Tree. (Lucian Freud was the grandson of Sigmund Freud.) Anna Freud bought this early work of her nephew’s from his first solo exhibition at the Lefevre Gallery in London in 1944. It contrasts with the rustic 18th-century painted furniture in the room, which originally came from Anna Freud and Dorothy Burlingham’s country cottage in Hochrotherd, Austria. The Freud family tree and photographs are on the landing. There are also two notable paintings. The first is a portrait of Sigmund Freud by the surrealist Salvador Dalí. And the second is by Freud’s patient, Sergei Pankejeff, known as the Wolf Man, depicting his dream of wolves sitting in a tree. Dalí made several portraits of Freud. He visited Freud in his study at Elsworthy Road, London, where the family lived briefly before moving to Maresfield Road. In Anna Freud’s Room, you can learn about her pioneering work on child psychoanalysis and see her couch and collections. This was not Anna’s bedroom but was actually the consulting room for her friend and colleague Dorothy Burlingham who lived in the house from 1941. The next room has a 20-minute video about the Freud family. It has voiceovers from Anna Freud and a rare recording from an interview with Sigmund Freud. This was the bedroom used by Minna Bernays, Martha’s sister, and is where she died in 1941. She had moved in with the family in Vienna in 1895 and stayed with them from then on. The Exhibition Room was Sigmund and Martha Freud’s bedroom (although towards the end of his life, he slept downstairs in his study). Code Name Mary: The Extraordinary Life of Muriel Gardiner From 18 September 2021 to 23 January 2022, you can see a fascinating exhibition. This American woman fought fascism in the 1930s, saving countless lives, and was at the center of a circle that included Sigmund and Anna Freud, the ‘Wolf Man’ and a string of celebrated figures. Her name is largely unknown, but her story deserves to be celebrated. The exhibition brings together a collection of objects, documents, and photographs drawn from the Museum’s own collections and those of Muriel Gardiner’s family. Many of the items have never previously been displayed in public or published. Together, the collection builds a powerful image of a woman who was driven to help others from an early age, a conviction which she held until her death in the 1980s. Muriel Gardiner (1901–1985) was a genuinely unsung heroine. She was born Helen Muriel Morris in 1901 and was the youngest of four children of a wealthy Chicago family. Her paternal grandfather was Jewish but was brought up a Protestant. After graduating with a degree in literature and history from Wellesley College, a liberal arts college near Boston, she moved to Rome to teach. In 1922 she had her first brush with fascism when Mussolini’s forces marched on the city. She studied at Oxford for two years in the 1920s, which she found “rather bleak, rigid and unfriendly to women students.” Her thesis on Mary Shelley was failed because she refused to condemn suicide before an examination panel of “two clergymen and a woman of rigid mind.” She moved to Vienna in 1926, had a short-lived second marriage to an English artist, Julian Gardiner, with whom she had a daughter, Connie, in 1931. After the divorce, she raised her daughter on her own. She attended the Wednesday Psychological Society, which Freud had founded in 1902. She also took Russian lessons from one of Freud’s most famous patients. Sergei Pankejeff or The Wolf Man, so-called because he was haunted by dreams of white wolves perched in a tree which were eventually traced to a childhood event: him witnessing his parents having sex. In the mid-1920s, she wrote to Sigmund Freud asking him to take her on for analysis. He wrote back regretting that he was too busy but recommended an American colleague, Ruth Mack, also based in the city. Gardiner later became close to Anna Freud. During a seaside holiday in 1934, in what is now Croatia, she met the poet Stephen Spender. He was with his lover Tony Hyndman who was posing as his secretary. Gardiner became the poet’s first female lover, later writing in her memoir: “Stephen was totally open about the fact that his previous relationships had only been with men.” Gardiner became drawn into political activism against the fascist Austrian government, which had come to power in 1934. Under the code name ‘Mary,’ Muriel smuggled money, fake passports, and papers for her comrades. She rented two apartments in Vienna, one for family life and the other for work. In practice, the second was used as a hiding place for illegal visitors. She also hid fugitives in her isolated cottage deep in the Vienna woods. During this time, she fell in love with and married Joseph Buttinger, leader of the Austrian Revolutionary Socialists. She stayed in Vienna to finish her medical degree after Buttinger, and his comrades fled to Paris to run the opposition from exile. Muriel left Nazi-occupied Vienna for Paris in June 1938 and was reunited with Joe and Connie. As war broke out in 1939, the couple moved to the US. They worked to bring as many German and Austrian fugitives as possible to safety there. Gardiner set up the New-Land Foundation, which still campaigns for arms control and the protection of the environment. She worked as a psychiatrist and psychoanalyst and would send food parcels to Europe to help those left destitute by the war. Among the documents in the exhibition are touching letters thanking her for gifts of chocolate and powdered egg. After the war, Muriel Gardiner built a busy psychoanalysis practice, taught at universities, and published several books, including ‘The Wolf Man and Sigmund Freud.’ In her later years, Muriel Gardiner worked with Anna Freud on the creation of the Freud Museum, which her family foundation supported for many years. The women had met in Vienna but were not close. After the war, Muriel visited Anna in London. Gardiner remained glamorous enough to pose for Vogue in a swimsuit at the age of 81, the year her own memoir was finally published. After her death from lung cancer in 1985, a street in Vienna was named in her honor. Among the highlights of the exhibition are an unpublished collection of family photographs of Muriel Gardiner spanning her life. You can see personal identity cards, letters, papers, and travel documents used during her travels across Europe, plus items from the Library of Congress in Washington and the Freud Museum’s own archive. The Wolf Man is featured with a collection of Sergei Pankejeff paintings and his death mask. Muriel’s daughter Connie became an active environmentalist and set up home in Colorado. The 1977 Oscar-winning film Julia starred Jane Fonda and Vanessa Redgrave plus Meryl Streep in her film debut. It was based on a chapter from Lillian Hellman’s controversial book Pentimento (1973), about the author’s alleged friendship with a woman named Julia who fought against the Nazis in the years prior to World War Two. Julia’s story is uncannily similar to Muriel’s, and in 1983 Gardiner became involved in a libel suit against Hellman. Hellman claimed that ‘Julia’ had been a friend of hers, and Gardiner stated she had never met Hellman. They did have a mutual associate, though, as Gardiner said she had often heard about Hellman from her friend Wolf Schwabacher, who was Hellman’s lawyer. Gardiner’s editor cited the unlikelihood that there were two millionaire American women who were medical students in Vienna in the late 1930s. A consultation with the director of Austria’s resistance archives confirmed that there had only ever been one American heiress in the country’s anti-Nazi underground: Muriel Gardiner, whose code name was Mary. The incident prompted Muriel to publish her own life story, the long-out-of-print book Code Name Mary has been republished by the Museum to complement the exhibition. The museum gift shop here (also available online) is rather wonderful. It includes plenty of unique souvenirs, including “Freudian Slippers.” Exhibition and Museum Information Name: Code Name Mary: The Extraordinary Life of Muriel Gardiner Where: The Freud Museum, 20 Maresfield Gardens, Hampstead, London NW3 5SX When: 18 September 2021 – 23 January 2022 Tickets: Adults £14 | Concessions £12 | Young Persons (12 – 16) £9 | Children under 12 free Opening hours: 10.30 am – 5 pm, Wednesday, Saturday, and Sunday. Official Website: www.freud.org.uk A short two-minute walk from the museum, you can see the statue of Sigmund Freud by Oscar Nemon. It’s at the corner of Fitzjohns Avenue and Belsize Lane.
<urn:uuid:246f4e3c-83c9-4a39-8ed8-e0e9771b7993>
CC-MAIN-2022-33
https://londontopia.net/culture/museums/exploring-londons-freud-museum-and-a-fascinating-new-exhibition-code-name-mary/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00206.warc.gz
en
0.976619
3,307
3.8125
4
Small space, big problem8 July 2016 At Dounreay, a mock-up and ‘keyhole surgery’ approach to an inaccessible seized mechanism in a heavily contaminated chamber has avoided worker dose and allowed maintenance to a faulty robot. Work on dismantling the plant can now resume reports Corrina Thomson. The Dounreay fast reactor complex in northern Scotland is being decommissioned but a problematic seized mechanism in the site's fast reactor reprocessing plant Active Filter Change Facility (AFCF) had reduced ventilation capacity since 2009. During a filter change operation workers found the mechanism on one of the filters had seized and they were unable to change it. Decommissioning of the D1206 plant was being held up by the air filtration problem but access to the AFCF is difficult and the area is subject to heavy radiological contamination after decades of operations in the reprocessing plant. Many of Dounreay's facilities were built and operated without decommissioning in mind, which has posed numerous problems to staff now dismantling the old, experimental complex. The design of D1206 was drawn up in the 1950s to address the need to reprocess irradiated fast breeder reactor fuel onsite with the aim to alleviate the issues associated with transporting spent fuel across the UK. Construction began in 1957 and installation of the actual plant systems in 1958. D1206 was originally built to reprocess Dounreay Fast Reactor fuel but was refurbished to carry out dissolution and reprocessing of MOX fuel for the Prototype Fast Reactor. The method used was dissolution in nitric acid followed by solvent extraction. Active commissioning of the plant began in 1959. It was operational until 1997, at which point it was deemed to be in care and maintenance. Limited post-operational clean out began almost a decade later in 2006. The main purpose of the D1206 active extract ventilation system is to stop the spread of contamination by providing a constant negative pressure across all the containments. When access ports are opened to deposit and retrieve items or equipment, the ventilation ensures that air will flow in to the containment, preventing contamination from leaving. The system was the only one affected by reduced ventilation capacity as most buildings in the site's Fuel Cycle Area (FCA) have self- sufficient dedicated ventilation systems. The AFCF filters the extract to ensure contamination is not discharged to the atmosphere. When the plant was operational, the other function of the vents was to extract the aerosol by-products of the chemical processes from the various vessels. The vessel extract used to be sparged, or flushed, when the plant was operational to stop active liquors from entering ducts. The current primary function of the ventilation is to prevent contamination releases to general plant areas when containment is deliberately breached in a controlled manner to provide access for decommissioning work. Depression gauges are used to ensure the ventilation system is working properly. Flow measuring instrumentation is not fitted on individual ventilation branches and the combined D1206 active extract is the only one with a flow meter. The total volumetric flow rate for the active extract is about two cubic metres per second at all times. The AFCF is heavily contaminated and the dose rate in the filter chamber is estimated to be several hundred millisieverts per hour. A hole in the wall was made to provide access to filter clamps and the dose rate coming from that was one millisievert per hour. The design of the AFCF is such that when its filter-changing robot rotates the filters from a horizontal to a vertical position, in order for them to fit a waste container, contamination falls onto the floor of the chamber. The filters sit behind a mobile shield wall during normal operations. The robot grasps a filter and rotates it from a horizontal to vertical position, then taking it to a maintenance bay that has an overhead flasking port. The robot had to be serviced in 2009 because the filter-grasping mechanism had loosened, raising the risk that a filter would be dropped. At the time, unsuccessful attempts were made to service the robot. This aspect of the work was carried out as part of the AFCF repair package. The maintenance regime is such that filters should be changed if they fail a DOP test, which tests integrity every ten years, unless a compelling argument can be made that the plant does not warrant it. The filters have previously been changed when the plant was still operational. Following that, the fourth secondary filter could not be changed because the clamps were seized in place. None of the other filters were changed while the robot was out of commission. The D1206 active extract system is made up of five main ventilation branches, each one fitted with a vortex amplifier, which ensures that depressions are maintained during losses of containment. The glovebox branch originally served about 20 gloveboxes, but close to half have been decommissioned. Most were directly connected to the main glovebox vent which becomes progressively wider the closer it gets to the AFCF. Air enters the system through bleed-in filters with one fitted on every glovebox. The two caves in D1206 have interconnected voids but there are two separate branch extracts for each one. The posting ports and a HEPA-filtered inlet used to be the primary sources of air. The damper for the HEPA-filtered inlet is now closed so there is no routine ingress of air. The fourth main branch is dedicated to eight process cells as well as several ancillary extensions. The cells are connected to the branch in the same way as the gloveboxes. However, most of them are also interconnected like the caves. Air intake is limited and most of it comes through a bleed-in filter located on a centrifugal contactor facility, interconnected with a medium-active cell. The fifth branch is dedicated to extracting from the various vessels. The glovebox extract feeds into the first AFCF primary filter. The cells, the caves, and the vessels all have dedicated ducts. They join a common duct before connecting to a manifold which feeds the second, third, and fourth AFCF primary filters. The AFCF has a common void where all the extracts mix before going through four secondary filters. The filters are kept in place against ducting using rotating clamps, mounted on cams. As the cams rotate the clamps catch the filter from underneath and pull it up towards the mating face. A 'bush' separator sits between the stainless steel cam and stainless steel shaft, used to drive the rotation of the assembly. In the past a mild steel bush was used contrary to design specifications. When it seized in 2009, too much torque was applied to the shaft which shattered a split pin in the flexible connection to the external face. The fault was isolated to the mechanism which keeps the filters in place. The repair team decided that due to the high radiation and contamination in the area the repair inside the heavily shielded chamber would have to be carried out semi-remotely. The team used a mock-up of the project to create and trial the tools needed for the repair, ensuring workers received a minimal dose. Before work in the radioactive filter cell could start the repair area had to be opened. A redundant dissolver cell control panel and office were removed. In addition a section of a dividing wall between the cell and the inactive feed area was also removed to improve access. Using techniques developed and proved on the mock-up, the team cored a hole into the cell shielding and identified the cause of the problem - the use of the mild steel component and too much torque when it corroded and seized. The problem was replicated on the mock- up and staff tested ways to repair it, before completing the work in the radioactive area using the now proven method and equipment. The filter clamp repairs took a year to get from the concept design stage to implementation. Three engineers worked alongside a fitter to develop the methodology. Estimated cost of the AFCF project is about £20,000 which includes the materials and machining costs. The new filters are like-for-like replacements. The alternative was constructing a bypass and a new filter change facility, estimated to cost about £10 million and could have delayed the decommissioning programme. Successful repair of the AFCF means that staff can proceed with the D1206 programme of cell clean-up work with the ventilation system working at a greater capacity. Gordon Tait, senior project manager, said: "This is another excellent demonstration of the benefits of mock-ups in decommissioning and also highlights the engineering talent and teamwork existing within the DSRL workforce. “There are no processes currently taking place in the areas affected by the reduced capacity. This is why AFCF issues were not addressed when they arose in 2009." However, he continued: "The reduced capacity severely limited the ability to carry out decommissioning activities in cells and caves due to the possibility of blinding the filters. This is a credible scenario which could occur due to the agitation of contamination during decommissioning operations. These activities can now proceed." Mr Tait outlined some of the knowledge gained from the AFCF work, saying: "As many nuclear sites are reaching the end of their lifespan, many difficult situations will develop where the courses of action are severely limited by the historical design. Lateral thinking is vital when tackling these challenges. The methodology should also be robust. “The AFCF work showed that assumptions based on historical data are not reliable. It is important to quickly adapt in response to the multiple unknowns at an inherited plant. "Remote tooling needs to be utilised to its full potential because a keyhole surgery methodology is very adaptable. It allows for work to be safely suspended while newly discovered challenges are resolved." Steve Beckitt, FCA project director said: "This is an excellent example of the use of mock-ups and innovation. Its success has resulted in significant savings of over £10 million." There are about 50 facilities at Dounreay where airflows are partly, or wholly, ventilated to prevent unnecessary exposure of the workforce. Some buildings have their own ventilation stacks while others, such as the older plants in the FCA, share a common network of air ventilation systems and stacks. Dounreay's operators found several years ago that the existing ventilation system in the FCA was not fit for purpose or up to modern standards. Due to its construction in the 1950s, it had not been built as the integrated, controlled and properly alarmed system that would be currently acceptable. Many decades of operations on radioactive materials had also affected its ability to perform its intended function. Ventilation systems aim to prevent dispersion of airborne radioactive substances within the plant, as well as controlling releases of radioactive material to the environment so they are below authorised discharge limits. In Dounreay's case these limits are set by the Scottish Environment Protection Agency. Key improvements have been made as decommissioning progresses, including replacement of the old main 55m high FCA stack with a new ventilation system comprising two 30m high stacks. More than 300 tonnes of steel was used to create a network of ducts and chambers that formed the new ventilation system, needed to decommission more than a dozen of the most hazardous facilities at the site. The experimental nature of many of Dounreay's redundant facilities, such as the reprocessing plants, reactors and labs, means the decommissioning of the site requires innovation as well as a measured and proven approach. Site closure involves: cleaning out and demolishing redundant nuclear and non- nuclear facilities; segregating and packaging the radioactive and non-radioactive wastes for long term storage or disposal; and removing nuclear fuels and other nuclear waste. Site operator DSRL is a wholly owned subsidiary of the Cavendish Dounreay Partnership Ltd, a consortium of Cavendish Nuclear, CH2M and AECOM. It is funded by the UK's Nuclear Decommissioning Authority to deliver the site closure programme.
<urn:uuid:0db658b8-d41c-4837-a9c7-8ed17689f8eb>
CC-MAIN-2022-33
https://neimagazine.com/features/featuresmall-space-big-problem-4943403/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00206.warc.gz
en
0.9648
2,501
2.53125
3
When you look at a data analyst’s workflow, you might think most of their time is spent analyzing data. However, a 2016 survey by CrowdFlower reveals 60% of surveyed data analysts spend most of their time cleaning and organizing data. Data preparation is critical in producing accurate data analytics, but it is time consuming. As a result, ETL tools that help with data preparation, such as Tableau Prep, Microsoft Power Query, and Alteryx Designer, are becoming more popular than ever before. What is ETL? ETL is the process of combining data from multiple sources into a centralized database, such as a data warehouse, through three steps: Extract, Transform, and Load. Many organizations store data across multiple databases, and thus, use ETL. In order for Business Intelligence (BI) software, such as Power BI and Tableau, to draw quick insights from data, it is essential to bring data together in an organized manner. ETL has three main processes: Exporting raw data from various structured or unstructured sources, such as: - SQL servers - ERP systems - Mobile apps - Emails and text files Refining the extracted data to ensure data quality, integrity, and compatibility with the destination source. The transform step is equivalent to data preparation and can involve: - Filtering missing, blank, or unusable values (e.g., null cells) - Reformatting for consistency (e.g., dates, row and column headings) - Removing duplicate values (i.e., deduplicating) - Sorting data (e.g., ascending alphabetical order) - Applying calculations (e.g., unit conversions) Importing transformed data into the destination database. There are two loading methods: - Full refresh: Importing all the data at once and periodically overwriting all records with new data - Incremental loading: Importing data in batches and periodically appending new data once they become available Why is ETL important? According to Statista, 64.2 zettabytes of data will be created, consumed, and stored globally in 2020. This is equivalent to over 64 billion 1 terabyte hard drives – a number set to more than double in 2025. The world has a lot of data, but they are not all stored in the same place. In fact, external data that may be useful to your organization can be scattered across data servers in several countries. Thus, you can imagine how the structure and notation of data can vary drastically! Take this list of equivalent British and American English words, for instance: |British English||American English| The table is merely one example of how data sources can differ. These variations can occur not only from country to country but within the same organization: from one department to another, and one employee to the next. Moreover, data silos, where data is isolated within each department and not shared across the entire organization, can contribute to inconsistencies in data. As organizations collect more and more data using different systems, e.g., sales data from Point of Sales systems or app usage from customers’ phones, analysts must often work with data in different sizes, shapes, and forms. Therefore, ETL is an important process for resolving these discrepancies, so data can be analyzed from various sources. What is an ETL tool? In short, ETL tools are software that automate the manual process of writing code to perform ETL. A major benefit of using an ETL tool is it saves time. As a result, analysts can prepare more data for analysis and discover in-depth insights. Another benefit of using an ETL tool is users can perform ETL without coding knowledge. Instead, the code runs in the background, and users simply interact with the tool’s graphical interfaces. For example, “no-code” actions may include: - Dragging and dropping to combine different data sets - Editing values of multiple records at once - Filtering values with a single click of a button In contrast, here are some of the same data cleaning functions handwritten as code. By simplifying the task of data preparation, ETL tools makes data analysis more accessible to different stakeholders in an organization. Many ETL tools are also available online on a web browser, e.g., Tableau Online and Microsoft Power Query Online. Compared to a locally installed application, an online ETL tool mitigates version incompatibility. Let’s look at an example of an ETL Tool: Tableau Prep Builder Tableau Prep includes two products: Tableau Prep Builder and Tableau Prep Conductor. Tableau Prep Builder is Tableau’s ETL solution available to users with a Tableau Creator license. Tableau Prep Conductor is an add-on in Tableau Online or Tableau Server. Tableau Prep Builder Tableau Prep Builder is structured in three panes, ordered from top to bottom: - Flow pane – Inspired by subway maps, visualizes the data flow, i.e., the series of actions applied to transform input data into the desired output - Profile pane – Provides the distribution of data per field, so users can easily identify outliers - Data grid – Shows the data by row, so users can immediately see the effect of transformations on the data Once you connect your data sources to the tool, you can create data flows. Tableau Prep Builder’s key functions are summarized below. Watch Tableau’s how-to videos to learn how to perform these transformations step-by-step. - Add a Pivot step (outlined by a blue box in the Flow pane) to summarize data by grouping records (rows) of a table by their fields (columns) Group and Replace (AKA realiasing) - Add this Clean step to group equivalent values into one (e.g., AB and Alberta) and edit multiple values at once (e.g., correct all records that are misspelled) Join and Union - Add a Join step to merge data from two or more tables using common fields - Expands a table horizontally - Inner join: Returns records that have matching values in both tables - Left (outer) join: Returns all records from the left table, and matched records from the right table - Right (outer) join: Returns all records from the right table, and matched records from the left table - Full (outer) join: Returns all records when there is a match in either left or right table - Add a Union step to append records from one table to another table with matching fields - Expands a table vertically - Add an Aggregation step to group records in a single table by a certain field - This step is often done before a Join or Union step to combine multiple tables together - Click on the drop-down arrow on the Profile pane to exclude outliers or unwanted values - E.g., there are filters by calculation, values, dates, and relative dates Tableau Prep Conductor Tableau Prep Conductor is a tool accessed through the Data Management Add-on in Tableau Server or Tableau Online for managing data flows. This component of Tableau Prep emphasizes the “Load” step in ETL. Notable features include: - Automatically running flows to produce up-to-date output data - Notifying failures and errors in running flows - Viewing scheduled and past flow runs Looking to unleash your data through visual analytics? Connect with us at Onware. Call and speak to one of our data experts, and we will answer any questions you may have. We are experienced with created consolidated reporting, no matter where your data resides. Ask us about combining multiple data sources in Tableau Prep to create company-wide consolidated financial reports, including income statements and balance sheets. We are experts in ETL, so we can help unify your organizational data. With over 20 years of combined experience in custom software development, BI, and data solutions, Onware can help you leverage data analytics to meet your organization’s needs. Whether it be with architects, construction owners, general contractors, engineers, government entities, or services providers, we can design a custom-tailored solution that is built for your organization. We have experience building income statements and balance sheets for financial analysis, job costing reports, and many other software solutions for project management, sales, and logistics. Enjoy this post? Visit our website for more content including additional case studies, news and events, and tips and tricks to elevate your visual analytics. Follow our social media for updates in software, BI, and data. Follow our social media (LinkedIn and Twitter) for updates in software, BI, and data. IBM Cloud Education. (2020, April 28). ETL (Extract, Transform, Load). Retrieved from IBM: https://www.ibm.com/cloud/learn/etl#toc-etl-and-ot-NiTFjp1v SAS. (n.d.). ETL. Retrieved from SAS: https://www.sas.com/en_ca/insights/data-management/what-is-etl.html Tableau. (2021, July 8). Tableau Prep Help. Retrieved from Tableau: https://help.tableau.com/current/offline/en-us/tableau_prep.pdf#v-d-alt Tableau. (n.d.). Tableau Prep Builder & Prep Conductor: A self-service data preparation solution. Retrieved from Tableau: https://www.tableau.com/products/prep Talend. (n.d.). What is Extract, Transform, Load? Definition, Process, and Tools. Retrieved from Talend: https://www.talend.com/resources/what-is-etl/
<urn:uuid:b8c94822-5a78-4f84-af87-34be6e3f69d8>
CC-MAIN-2022-33
https://onware.com/how-to-clean-your-data-with-tableau-prep-and-etl-tools/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00602.warc.gz
en
0.86441
2,105
2.921875
3
Election season is fast approaching so you can be sure a plethora of polls will soon be adding to the mayhem. Polls educate us in two ways. They tell us what we, or at least the population being polled, think. And, in a more Orwellian sense, they tell us what we should think. Polls are used to guide how the nation is governed. For example, did you know that the unemployment rate is determined from a poll, called the Current Population Survey? Polls are important, so we need to be enlightened consumers of poll results lest we come to “love Big Brother.” The growth of polling has been exponential, following the evolution of the computer and statistical software. Before 1990, the Gallup Organization was pretty much the only organization conducting presidential approval polls. Now, there are several dozen. On average, there were only one or two presidential approval polls conducted per month. Within a decade, that number had increased to more than a dozen. These pollsters don’t just ask about Presidential approval, either. Polls are conducted on every issue of real importance and most of the issues of contrived importance. Many of these polls are repeated to look for changes in opinions over time, between locations, and for different demographics. And that’s just political polls. There has been an even faster increase in polling for marketing, product development, and other business applications. So to be an educated consumer of poll information, the first thing you have to recognize is which polls should be taken seriously. Forget internet polls. Forget polls conducted in the street by someone carrying a microphone. Forget polls conducted by politicians or special-interest groups. Forget polls not conducted by a trained pollster with a reputation to protect. For the polls that remain, consider these four factors: - Difference between the choices - Margin of error - Sampling error - Measurement error Here’s what to look for. Difference between Choices The percent difference between the choices on a survey is often the only thing people look at, with good reason. It is often the only thing that gets reported. Reputable pollsters will always report their sample size, their methods, and even their poll questions, but that doesn’t mean all the news agencies, bloggers, and other people who cite the information will do the same. But the percent difference between the choices means nothing without also knowing the margin-of-error. Remember this. For any poll question involving two choices, such as Option A versus Option B, the largest margin of error will be near a 50%–50% split. Unfortunately, that’s where the difference is most interesting, so you really need to know something about the actual margin of error. You might have seen surveys report that the percent difference between the choices for a question has a margin-of-error of plus-or-minus some number. In fact, the margin-of-error describes a confidence interval. If survey respondents selected Option A 60% of the time with a margin-of-error of 4%, the actual percentage in the sampled population would be 60% ± 4%, meaning between 56% and 64%, with some level of confidence, usually 95%. For a simple random sample from a surveyed population, the margin-of-error is equal to the square root of a Distribution Factor times a Choice Factor divided by a Sample Size Factor times a Population Correction. - Distribution Factor is the square of the two-sided t-value based on the number of survey respondents and the desired confidence level. The greater the confidence the larger the t-value and the wider the margin-of-error. - Choice Factor is the percentage for Option A times the percentage for Option B. That’s why the largest margin of error will always be near a 50%–50% split (e.g., 50% times 50% will always be greater than any other percentage split, like 90% times 10%). - Sample Size Factor is the number of people surveyed. The more people you survey, the smaller the margin of error. - Population Correction is an adjustment made to account for how much of a population is being sampled. If you sample a large percentage of the population, the margin-of-error will be smaller. The population correction ranges from 1 to about 2. It is calculated by the reciprocal of one plus the quantity the number of people surveyed (n) minus one divided by the number of people in the population (N), or in mathematical notation, 1/(1+(n-1/N)). So the entire equation for the margin-of-error is: Or in mathematical notation: This formula can be simplified by making a few assumptions. - If the population size (N) is large compared to the sample size (n), you can ignore the Population Correction. What’s large, you ask? A good rule of thumb is to use the correction if the sample size is more than 5% of the population size. If you’re conducting a census, a survey of all individuals in a population, you can’t make this assumption. - Unless you expect a different result, you can assume the percentages for respondent choices will be about 50%–50%. This will provide the maximum estimate for the margin-of-error, ignoring other factors. - Ignore the sample size in the Distribution Factor and use a z-score instead of a t-score. For a two-sided margin-of-error having 95% confidence, the z-score would be 1.96. - The Distribution Factor (1.962) times the Choice Factor (50%2) equals 0.96 These assumptions reduce the equation for the margin-of-error to 1/√n. What could be simpler? Here’s a chart to illustrate the relationship between the number of responses and the margin-of-error. The margin-of-error gets smaller with an increase in the number of respondents, but the decrease in the error becomes smaller as the number of responses increases. Most pollsters don’t use more than about 1,200 responses simply because the cost of obtaining more responses isn’t worth the small reduction in the margin-of-error. Don’t worry about the Current Population Survey, though. The Bureau of Labor Statistics polls about 110,000 people every month so their margin-of-error is less than half of a percentage point. Always look for the margin-of-error to be reported. If it’s not, look for the number of survey responses and use the chart or the equation to estimate the margin of error. Here’s a good point of reference. For 1,000 responses, the margin-of-error will be about ±3% for 95% confidence. So if a political poll indicates that your candidate is behind by two points, don’t panic; the election is still too close to call. Sampling error in a survey involves how respondents are selected. You almost never see this information reported about a survey for several reasons. First, it’s boring unless you’re really into the mechanics of surveys. Second, some pollsters consider it a trade secret that they don’t want their competition to know about especially if they’re using some innovative technique to minimize extraneous variation. Third, pollsters don’t want everyone to know exactly what they did because then it might become easy to find holes in the analysis. Ideally, potential respondents would be selected randomly from the entire population of respondents. But you never know who all the individuals are in a population, so have to use a frame to access the individuals who are appropriate for your survey. A frame might be a telephone book, voter registration rolls, or a top-secret list purchased from companies who create lists for pollsters. Even a frame can be problematical. For instance, to survey voter preferences a list of registered voters would be better than a telephone book because not everyone is registered to vote. But even a list of registered voters would not indicate who will actually be voting on Election Day. Bad weather might keep some people at home while voter assistance drives might increase turnout of a certain demographic. A famous example of a sampling error occurred in 1948 when pollsters conducted a telephone survey and predicted that Thomas E. Dewey would defeat Harry S. Truman. At the time, telephones were a luxury owned primarily by the wealthy, who supported Dewey. When voters, both rich and poor, went to the polls, it was Truman who was victorious. This may seem obvious in retrospect but there’s an analogous issue today. When cell phones were introduced, the numbers were not compiled into lists, so cell phone users, primarily younger individuals, were under sampled in surveys conducted over land lines. Another issue is that survey respondents need to be selected randomly from a frame by the pollster to ensure that bias is not introduced into the study. Open-invitation internet surveys fail to meet this requirement, so you can never be sure if the survey has been biased by freepers. Likewise, if someone with a microphone approaches you on the street it’s more likely to be a late night talk show host than a legitimate pollster. Measurement error in a survey usually involves either the content of a survey or the implementation of the survey. You might get to see the survey questions but you’ll never be able to assess the validity of the way a survey is conducted. Content involves what is asked and how the question is worded. For example, you might be asked “what is the most important issue facing our country” with the possible responses being flag burning, abortion, social security, Congressional term limits, or earmarks. Forget unemployment, the economy, wars, education, the environment, and everything else. You’re given limited choices so that other issues can be reported to be less important. Politicians are notorious for asking poll questions in ways that will support their agenda. They also use polls not to collect information but to dissemination information about themselves or disinformation about their opponents. This is called push polling. The last thing to think about for a poll is how the responses were collected. For autonomous surveys, look at how the questions are worded. For direct response surveys, even if you could get a copy of the script used to ask the questions, there’s no telling what was actually said, what body language was used, and so on. Professional pollsters may create the surveys but they are often implemented by minimally trained individuals. Read more about using statistics at the Stats with Cats blog. Join other fans at the Stats with Cats Facebook group and the Stats with Cats Facebook page. Order Stats with Cats: The Domesticated Guide to Statistics, Models, Graphs, and Other Breeds of Data Analysis at Wheatmark, amazon.com, barnesandnoble.com, or other online booksellers.
<urn:uuid:01becc7b-d2b0-4073-aa00-6ff4112e7f84>
CC-MAIN-2022-33
https://statswithcats.net/2011/05/08/polls-apart/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00404.warc.gz
en
0.935063
2,281
2.859375
3
LIVING AN ISOLATED LIFE: ASTRONAUTS, ANTARCTIC DOCTORS AND CLIMBERS SHARE THEIR ADVICE For many of us, living in self-quarantine and social distancing from family, friends and co-workers is an unfamiliar feeling. But some professions lend themselves to isolation. Astronauts such as Scott Kelly can spend up to a year in space living on the International Space Station. They spend two hours a day working out to maintain muscle and bone mass, and the rest of their waking hours are spent working on tasks and experiments. The space station is comparable to a six-bedroom house, and six astronauts can comfortably live in it for six months or longer at a time. Climbers, including Jon Kedrowski, ascend some of the most isolated and challenging peaks in the world. They huddle in tents on their own or with a small crew on the sides of mountains upwards of 20,000 feet, like Everest. They can spend months away from their families in dangerous conditions with limited ways of contacting them. "I think the first step to understand and handle what is going on is to come to terms with the fact that the next three to six months of our lives are going to be changed and altered forever," Kedrowski wrote in a newsletter, addressing the pandemic. "The faster we get comfortable with accepting this, the better off we will all be. "And yes – I have often equated the past 10 days of this isolation on par with any of my four expeditions to Everest, or other 25 expeditions to peaks over 20,000 feet in my career," he told CNN. "Except in the home, we are way more comfortable right now than we are in dining tents with no heat." Crews manning the National Science Foundation's Amundsen-Scott South Pole Station on Antarctica lead isolated lives with the same people for months at a time – including during the winter months, where going outside or flying home is impossible. The station holds 50 people during winter, a long period between mid-February and late October, while 150 people can live there during the summer. As for submariners, Jon Bailey, a robot submarine driver and former Navy submariner, said it best: "During my time in the Submarine Service, I – along with many others – endured many weeks and months cooped up in a steel tube under the waves," he shared in a tweet. "Like all other patrols, this one will end. Bring your world closer, focus on little things that you enjoy and make plans for the future. At least you should have a window!" Here are their tips for coping, staying sane and even thriving. Establish a routine. Forming new habits and schedules is the number one thing all of our experts agreed on. It provides structure and helps the time pass without it feeling insurmountable or undefined. European Space Agency astronaut Tim Peake spent 186 days aboard the International Space Station between 2015 and 2016. While he was on the station, Peake even completed the London Marathon using the station's treadmill. "Habits and routine are so key to keeping everything under control in a confined and isolated situation," he said during a call organized by International Asteroid Day founders on Thursday. "That structure it gives you is vital; it's key to feel that in situations that feel out of control. We need to embrace that at home in these difficult conditions for everyone. We call it normalizing the abnormal." For Peake, when he was on station that meant having tea and a favorite meal after waking. For astronauts just starting their stint on the station, the initial schedule is rigid: They know when they need to eat, exercise and complete tasks. Gradually, this routine relaxes to give the astronauts more control over their time. "It provides a positive mental attitude in a new environment," Peake said. The key to astronauts successfully living with one another for six months or more can be chalked up to what NASA calls EB, or Expeditionary Behavior. NASA astronaut Anne McClain, who spent 204 days on the station between 2018 and 2019, has been sharing good examples of successful EB on Twitter. She highlights leadership – as well as "followership," meaning knowing when to step back and follow another's lead – as key for those living in confined spaces with one another and beginning a routine together. It's all about trusting each person and knowing they will all accept responsibility. "Adjust your style to your environment," she said. "Assign tasks and set goals. Lead by example. Give direction, information, feedback, coaching and encouragement. Ensure your teammates have resources. Talk when something isn't right. Ask questions. Offer solutions, not just problems." Breaking down your day into different categories, and even changing up the rooms where things happen, can help. "Life at sea is dictated by shifts and routines," Bailey shared in a tweet. "You [could] tell what day it was by what was for dinner. Make a routine now, test it, then write it down & stick to it. Divide your day up into work (if home working) rest, exercise, meals, hobbies, etc. Do the same for kids."Because you're all going to be spending more time in your home, make cleaning part of that daily or weekly routine, he said. And it's OK if you need to take some time for yourself as part of the routine. "The only place private at sea was your bunk," he shared in a tweet. "Make a dedicated private time / place in the routine. Even if you timeshare the front room get everyone a couple of hours alone. Do whatever you want." Scott Parazynski knows a thing or two about "dealing with isolation, risk and uncertainty," he said. He's a NASA astronaut; has climbed Everest; ventured inside Masaya volcano's crater in Nicaragua; and has supported the winter crews at the South Pole Station via telemedicine. "Time flies when you have a sense of purpose or mission," he said. "Keeping your mind and body active and engaged, and working towards a higher purpose can stave off the monotony and some of the stressors perpetually around you." Set goals and start new hobbies. Part of that new routine can include making time for new things you've always wanted to try. Goals and hobbies can act as a motivational tool during uncertain times. "Even though my life has been altered like most other people, I decided to refocus and create a new plan," Kedrowski said. "I signed up for the New York City Marathon and will start to train for that for later this year when the dust settles." It's not easy for everyone to take on new things at this time, due to varying circumstances. But if you suddenly have more time than you used to, it might be uplifting to fill it with new things. "This may be especially difficult for those who've been furloughed during this pandemic, and aren't able to otherwise continue their work from home, and/or having to care for homebound kids," Parazynski said. "If you now find yourself with lots of time but no mission, is it a time to learn a new language, or how to code through an online course? An opportunity to shed some extra pounds, or a chance to read the stack of books that's accumulated on your nightstand? Are you in a position to volunteer to support those most vulnerable? It might be the right time to find your new mission." Beth Healey, a British medical doctor who has spent time at South Pole Station, said the hardest times may come later, rather than at the beginning. When that slump hits, it's time to find something that will bring you purpose and joy. "In the beginning, you're super motivated and have grand plans of what you're going to do," she said. "The key challenge is to keep that motivation going. In Antarctica, we would plan out events and goals to get us through that 'third quarter' of winter. In this current situation, we don't know how long it will last, but it's more likely to be a marathon than a sprint." She suggested putting down specific dates with things next to them that you'd like to accomplish, like mile markers along the way. Remember to have some fun, too. Routines are great, but that doesn't mean you can't change things up. Even the astronauts on the space station take time for fun. NASA astronaut Christina Koch, who recently returned from a record-breaking stay on the station, said setting aside time for meals together, celebrations and other fun activities felt special. Part of that was food-based, like care packages sent up to the station including pizza kits, which gave astronauts the opportunity to each create their own and eat together. "Take time to prepare meals," Bailey shared in a tweet. "One boat did Steak Saturdays, Fishy Friday, Curry & Pizza nights." And frankly, we all have a little more time now. Enjoy it while you can. "Realize that this is an extended spring break," Kedrowski said. "This hasn't happened in our lifetime and probably won't ever happen again once we get through the tough parts in the next few months. Relax and rest, recharge your batteries and find ways to have some fun." Get outside (if you can), take care of yourself and stay active. Astronauts know firsthand that taking care of yourself is key to mission success. They monitor their health on physical and psychological levels, especially during long-term spaceflight. Self-care for astronauts includes hygiene, time management, sleep and maintaining mood. "Realistically assess your own strengths and weaknesses," McClain said. "Learn from mistakes. Identify personal tendencies and their influence on your success or failure. Be open about your weaknesses and feelings. Take action to mitigate your own stress or negativity (don't pass it on to the group). Be social. Seek feedback. Balance work, rest and personal time. Be organized." Taking time to exercise is not only good for you, it provides a mental break that separates you from work or something else you were doing, astronaut Scott Kelly told CNN. During exercise, you can push yourself physically or turn inwardly to meditate. "It's possible to get in your car, leave your town or city and get lost outside," Kedrowski said. "For me that's easy; I live in a place in Colorado where my home backs up to wilderness. But I will also get in the car and drive to trailheads. Get creative. Take your skis or snowshoes, or come up with something you haven't done before outside, and go do it. "Every day I get up and stretch, most days I grab my foam roller and lately, if I'm not leaving for an excursion, I tap into my yoga routine," he added. "I recently started meditating. It allows the body to slow down, reflect and think, but also relax and (be) calm." Stay connected and take care of others. If you're living with family or friends right now, the astronauts refer to that as ‘group living EB’. "Cooperate rather than compete," McClain said. "Actively cultivate group culture (use each individual's culture to build the whole). Respect roles, responsibilities and workload. Take accountability; give praise freely. Then work to ensure a positive team attitude. Keep calm in conflict." But if you're in isolation, it's important to maintain a connection with others. Check on your loved ones, use FaceTime, Skype or other ways of video-chatting and let them know you care. On the space station, they call it ‘team care’. "Demonstrate patience and respect," McClain said. "Encourage others. Monitor your team for signs of stress or fatigue. Encourage participation in team activities. Develop positive relationships. Volunteer for the unpleasant tasks. Offer and accept help. Share credit; take the blame." Astronauts during long-term spaceflight have video chats with loved ones to stay connected. "Even during radio silence," submariners would receive weekly telegrams from loved ones, Bailey said. Parazynski has seen the benefits of staying connected and communicating across his varied experiences with isolation. "It can take extra effort and energy to do so – I can only imagine how difficult it is for the 44 or so winter-over crew who spend many months isolated together in an isolation ultramarathon at the South Pole Station – but it makes the journey a shared, more enjoyable and productive experience," he said. And you've heard it a lot, but we're all in this together. During the Apollo 9 mission, NASA astronaut Rusty Schweickart served as the lunar module pilot for the third manned flight of the Apollo series and the first manned flight of the lunar module, according to the agency. Schweickart left the spacecraft for a 46-minute spacewalk to test the portable life support backpack that would later be used on the lunar surface. In images captured by his crewmates, Schweickart exits the craft in space with a brilliant view of Earth behind him. It gave him a unique perspective about our planet and all of the life that exists on it. "This is one of the very few times when it's very clear to everyone on this planet that we're all one life form, and our life form is being challenged by a little bug we can't see," he said. "But it's so insidious, it has spread through the whole community. We're used to being individuals – this is kind of a shock to find, in a sense, we're all one and wrestling with this bug. This is an interesting moment in time when everyone on the planet has realized that." Taking comfort in that – in the team around us, all on this "mission" – can help create a positive attitude. "In anything that's bad and challenging, if you look hard enough, you can find some good in it," Kelly told CNN.
<urn:uuid:251aeac3-e20b-4963-b4de-62dcbc9b0df4>
CC-MAIN-2022-33
https://maxandaegle.com/gallery/press/living-an-isolated-life-astronauts-antarctic-doctors-and-climbers-share-their-advice
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00406.warc.gz
en
0.969834
2,915
2.671875
3
Wine terms can be confusing even to professionals. Learn here about all the terminology and jargon we use on our site. Acacia is sawed rather than split into staves, and it’s used by a handful of wineries worldwide. It gives suave texture to wines and roundness that can often be confused with sweetness. Still, it is more neutral than oak. Identified as the crisp, sharp character in a wine. It refers to acid found in all grapes as an essential component of wine that preserves it, enlivens and shapes its flavors and helps prolong its aftertaste. There are four major kinds of acids--tartaric, malic, lactic and citric--found in wine. Acid is identifiable by the crisp, sharp character it imparts to a wine. A named geographical area (may be as large as an entire region or as small as a vineyard) from which wine may be labeled and marketed as having come from. Regulations vary widely from country to country and appellation to appellation, but typically require that appellation-labeled wine be made entirely or mostly from grapes grown within the appellation's boundaries. Some appellations also regulate which grape varieties are permitted, how they are grown and harvested and how the wine is made. French term for stirring the lees during the aging and maturation of wine. A farming approach that combines principles of organic farming and concepts developed by Rudolf Steiner, an Austrian philosopher. Some of these include the use of manure and compost as a substitute for artificial chemicals; incorporating livestock into plant care; and the following of an astronomical planting calendar. In its purest form the farm becomes a self-sustainable ecosystem that is centered around capturing the energy from all elements of the farm and implanting it into all of the produce that the farm grows, including grapes and finally wine. A less expensive, mass-production method for producing bulk quantities of sparkling wine. The second fermentation takes place in a pressurized tank, rather than in a bottle, decreasing lees contact and producing larger, coarser bubbles. The wine is filtered under pressure and bottled. Also known as the bulk process or tank method. Wines made this way cannot be labeled Méthode Champenoise nor Méthode Traditionnelle. Primarily used in Italy, but some other regions venture out as well. It is much more neutral than oak, even more neutral than acacia, because it imparts delicate tannins. Co-ferment normally refers to a wine that mixes both red and white grapes during the fermentation process. Generally speaking, co-fermenting is the winemaking process of fermenting at least two varieties of grapes at the same time. This practice is different from the widely used process of blending wine components into a cuvée after fermentation. A heavy, thick-walled vessel that comes in many shapes and sizes. Unlike oak, concrete tanks have a minimal influence on wine. It is a neutral vessel, like stainless steel, but with some differences. Unlike stainless steel, the inner walls of concrete tanks aren’t uniform. They are porous, with thousands of tiny pockets that trap air and allow the wine limited contact with oxygen. They are still neutral, so the wines created in concrete tanks tend to be bright and fruit-forward, with excellent texture and minerality. French term for the progression of wine between fermentation and bottling. Comparable to the term maturation in English, this is the period when the raw fermented juice is shaped into something resembling its final form, through techniques such as barrel aging, resting on lees, batonnage, filtering and fining. Field blend is a wine produced from a vineyard planted to several different varieties and the grapes are harvested together to produce a single wine. Denotes a wine whose alcohol content has been increased by the addition of brandy or neutral spirits. Italian term for sparkling wines with lighter effervescence and fewer bubbles than found in ordinary sparkling wines. Wines speak of their place of origin and winemaking style very clearly, and are best enjoyed during gastronomic experiences. Very neutral vessels, not allowing for any micro oxidation. Glouglou wine is one that invites easy, copious drinking. It is a wine to be poured and not stored. Hand-harvest refers to manual grape picking, rather than with the use of machinery. HVE certification (meaning “high environmental value”) is awarded to farmers/winegrowers who choose to take a “reasoned” approach to their work, from vine cultivation to bottling. This French certification promotes good, environmentally friendly practices across three levels: level 1 certifies that growers have a basic knowledge of “sustainable” cultivation; level 2 is achieved if the grower adheres to 16 environmental standards; and level 3 is based on the measurement of indicators such as respect for biodiversity, a strategy regarding insect pests, and sound management of fertilizer and irrigation. Kvevri (Qvevri or Tchuri) are large earthenware vessels used for the fermentation, storage and aging of traditional Georgian wine. Resembling large, egg-shaped amphorae without handles, they are either buried below ground or set into the floors of large wine cellars. Kvevris vary in size: volumes range from 20 liters to around 10,000; 800 is typical. LIVE (Low Input Viticulture and Enology) certification is your assurance that the wine in the bottle was made in conformance with the most advanced standards for sustainable grape growing and winemaking. It pertains to the winegrowers in the Pacific Northwest and the organization takes into account unique attributes of the region. The labor-intensive process whereby wine undergoes a secondary fermentation inside the bottle, creating bubbles. The process begins with the addition of a liqueur de tirage (a wine solution of sugar and yeast) to a bottle of still base wine, triggering a secondary fermentation inside the bottle which produces both carbon dioxide and spent yeast cells, or lees, which are collected in the neck of the bottle during the riddling process. The lees are then disgorged from the bottle, and replaced with a solution of wine and sugar, giving the sparkling wine its sweetness. All Champagne and most high-quality sparkling wine is made by this process. Also known as méthode Champenoise, méthode classique and metodo classico. Neutral tanks that have many benefits: Flexibility - Allows for heat expansion during fermentation; Tight Seal - Wine remains microbiologically stable; Heavy Side Wall - Makes for a strong, durable tank with a long life span; Lightweight - Easy to maneuver; Narrow Diameters Available - Saves Valuable Space; Inexpensive - More cost effective than alternative tanks Minimal SO2 refers to wines that get up to 30mg/L of SO2 added. Also known as indigenous, ambient or wild yeasts, these are yeasts that are naturally present on the grapes or in the cellar, rather than commercially cultured yeasts. Refers to barrels that have been used in the past and thus do not impart the flavors of the wine matured in them. Refers to the first time a barrel is used, when it has the greatest impact on wine (every use after diminishes the flavor influence on wine). Flavors associated with new oak include vanilla, cedar, toast and smoke. The wood tannins in newer barrels add firmness to the wine's structure. Finished wines bottled without any SO2 addition. These wines still contain naturally occurring SO2 (bi-product of the fermentation process) A wine blended with grapes grown in more than one vintage. The idea is to keep a house style from year to year, eliminating vintage variations. Many Champagnes and sparkling wines are non-vintage. Also, Marsala, Sherry and the non-vintage Ports (Tawny and Ruby). The rules and methods for producing organic grapes and wine. These rules usually differ between countries of origin and the various governing organizations involved. France, for example, legally defined organic farming in 1981 as "farming which uses no synthetic chemical products." In most cases, organic wines are fermented from grapes grown without the use of synthesized fertilizers, pesticides or herbicides. In organic wines, natural yeasts and minimal amounts of sulfur are often used in the fermentation process. An approach to land management and settlement design that adopts arrangements observed in flourishing natural ecosystems. It includes a set of design principles derived using whole-systems thinking. Pét-nat is an abbreviation for “pétillant naturel”—a French term that roughly translates to “naturally sparkling.” Pétillant means lightly sparkling, referring to the bubbles in these wines. Pét-nat is bottled while still undergoing its first round of fermentation. The French call this process “methode ancestrale,” and it’s likely been around far longer than other, more complex methods of producing sparkling wine like the Champagne method. Refers to when a producer is using these practices, but doesn't have the certificate most often because of cost and bureaucracy associated with it. Residual Sugar, or RS for short, refers to any natural grape sugars that are leftover after fermentation ceases (whether on purpose or not). The juice of wine grapes starts out sweet, and fermentation uses up that sugar as the yeasts feed themselves on it. Sandstone amphoras are widely used, but most commonly clay, including terracota, is used for amphoras. A wine made from grapes harvested from one (single) vineyard. When people talk about skin-contact wines, they usually refer to white grapes that are vinified like red wines. They also call these wines orange or amber, because of the color that is extracted from the skins. Skin contact is another term for maceration, or the period during winemaking when the grape skins remain in contact with the juice. Reds and some rosés get their color from maceration. Most white wines are made by pressing grapes after harvest, and only the resulting juice is fermented. But even with white grapes, if you let the juice ferment on the skins, it extracts additional tannin and flavor, just like in red wines. Sulfur Dioxide (SO2) is the most common chemical compound used in winemaking. Sulfur serves two main purposes. It prevents the wine from reacting with oxygen which can cause browning and off-odors (oxidation), and it inhibits the growth of bacteria and undesirable wild yeasts in the grape juice and wine. Stainless steel tanks offer a cleaner, more controlled way of fermenting and storing wine than oak barrels, allowing winemakers to make a fresher style with more fruit and acidity rather than texture and oaky or oxidative flavor. Some winemakers feel stainless steel tanks are too sterile, sometimes producing sharp, linear wines that couldn’t breathe. Terracotta is clay that has already been modeled and fired. Typically, terra-cotta objects may be made of any type of organic clay, but earthenware clay has the brown-orange color that is also known as terra-cotta. As a vessel used for wine maturation, it doesn't impart any flavor to the final wine, while allowing for a steady micro-oxidation. Unfiltered wine is simply a wine made without filtering, a process of removing leftover grape and fermentation particles. Most wines are filtered for both clarity and stability, although some winemakers believe that flavors and complexity may also be stripped from the wine. Unfiltered wines get their impurities removed through racking, where wine is left to sit for a time (the tanks aren't shaken or moved), allowing the particles to fall and settle naturally at the bottom of the tank through gravity. Unfined wine is simply a wine made without fining, a technique for clarifying wine using agents such as bentonite (powdered clay), isinglass (fish bladder), casein (milk protein), gelatin or egg whites, which combine with sediment particles and cause them to settle to the bottom, where they can be easily removed. Vineyard Exposure - Direction which a vineyard is facing (i.e. southeast) Vineyard Slope - Refers to the incline of the vineyard, often expressed in percentage (i.e. 40% incline) Vegan certified means that a wine is defined as containing no animal ingredients or by-products, using no animal ingredients or by-products in the manufacturing process, there is no testing on animals, and no animals are used in farming or winemaking process. Sometimes during the clarification process, egg whites, milk (and sometimes derivatives from fish) are often used to eliminate particles after the alcoholic fermentation and before bottling and this is not the case with vegan wines. A natural wine association that brings together winemakers from around the world who want to defend the integrity of their territory, while respecting the history, culture and art which has been handed down over time. Producing natural wine means respecting the soils, the environment, the natural cycle of life, and eliminating the use of invasive and toxic agents, first in the vineyard and then in the cellar. The goal of the association is to unite winemakers, giving each of them greater strength, awareness and knowledge by sharing experiences, studies and research. VinNatur was founded in 2006 by Angiolino Maule in Italy. Today, there are over 180 winemaker-members from 9 different countries. Natural wine with no additions whatsoever, including sulfur and no intervention. Zero-zero means zero added, zero removed.
<urn:uuid:24a2803c-1be6-4930-bb7c-265c372b8735>
CC-MAIN-2022-33
https://vintners.co/fr/vintners-glossary
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.953012
2,869
3.140625
3
Please follow the link to view the Whole School Curriculum Overview 2021-2022 More information is available by clicking on the headings below. Eglinton Primary School follows the National Maths Curriculum Become fluent in the fundamentals of mathematics, including through varied and frequent practice with increasingly complex problems over time, so that pupils develop conceptual understanding and the ability to recall and apply knowledge rapidly and accurately’ (National Curriculum 2014) Learning maths is like building a tower; children must develop firm foundations and acquire specific building blocks in a certain order. If any of these blocks of understanding are missing, then the tower can be toppled when faced with new challenges or concepts. Therefore, at Eglinton, children are not simply rushed through the curriculum, gaining vast, but superficial knowledge that can fall apart whenever they encounter something unfamiliar. The focus within maths lessons is on fluency and not speed. Children are encouraged to think carefully about mathematical problems, discuss and explain their understanding and learn from one another. For example: ‘…Can you explain the pattern…which is the odd one out…can you spot the error…” The result is more fluent mathematicians with a deeper understanding of maths concepts; children that have a firm foundation to build on and a more confident outlook towards the subject. Teachers at Eglinton follow a concrete, pictorial, abstract (CPA) approach to teaching and learning. CPA was developed by American psychologist Jerome Bruner and is an essential technique within the Singapore method of teaching maths for mastery. The White Rose Maths Hub has influenced the way maths is planned and assessed throughout the school and their mantra ‘Everyone Can Do Maths’ matches our aspirations for all of our children at Eglinton. Finally at Eglinton, where possible we aim to contextualise maths so that it is grounded in real life situations and connected to other learning across the curriculum. To quote educationalist, John Hattie, “You cannot use deeper-thinking skills unless you have something to think about’. Click the links below for our school Calculation Policy and Times Tables Policy. Please see the list below for websites to support maths learning (Years 5 and 6) Use your password to log on and play against your classmates (Years 2 - 4) Speaking and Listening Children are exposed to a wide range of language during English lessons to broaden their own vocabulary. Staff model good speaking and listening, showing children how to adapt their own language for the given purpose and/ or audience. Children are given a wide range of opportunity to apply their spoken language skills in context. This includes: drama and role play, assembly and performances, presenting ideas within class and when showing visitors around school. Within lessons, there is regular use of talk partners and dialogic talk which ensures children are encouraged to take ownership of their own learning. Children are encouraged to form and discuss their own opinions, as well as listen to, and challenge, others. Reading and Phonics We currently use Letters and Sounds RTPA teaching sequence and supplement this with Jolly Phonics actions and pictures to reinforce. From January 2022, the school will adopt the Little Wandle approach to phonics and early reading. In KS1, children have access to a wide range of books which are levelled according to the Letters and Sounds phases. In January 2022, KS1 will adopt the Little Wandle approach to early reading. In KS2, children that still require phonetically decodable books, have access to a range of levelled books. Reading is taught throughout the school primarily using a whole class reading model to ensure all children have the opportunity to be exposed to challenging texts. Lessons focus on explicitly teaching reading skills through discussions and activities. The skills taught build upon each other as children progress through the school. The provision of reading at Eglinton consists of: - 1 to 1 reading - Shared reading - Guided reading - Whole Class Reading - Reading for Pleasure In order that the children gain a life-long love of reading, we provide them with a wide range of stimuli, including visual media. These include interesting, age-appropriate books in class reading corners as well as the large school library. We host book fairs, which provide parents and carers the opportunity to spend time with their children choosing books to purchase for home. We also have a Book Hut which all the children have access to on a weekly basis. Here, they can take home books to enjoy as well as swap books they no longer need. In order to promote a love of reading and develop an interest in the world of books, we invite authors and theatre companies to school on a regular basis and take part in local projects and initiatives. Writing is a key part of the curriculum that is taught throughout the week. Creative writing is developed using the core text to influence the children’s own ideas for writing. The core texts are selected to ensure that children are exposed to a wide range of stories which reflect the community and world they live in. When writing, pupils understand the following: - There is a purpose to all types of writing. - The need to consider their audience when writing. - There are a range of text types; each with their own features and conventions to be applied when writing. - Their writing must make sense and flow. - The need to pay close attention to Spelling, Punctuation and Grammar (EGPS) when working in order to improve the sense and clarity of their work. - Writing is a process which allows for changes and edits to be made. - A wide range of interesting and exciting vocabulary should be experimented with. - That writing is an enjoyable activity with great value. - There are different dimensions to the writing process; immersion, practise and application. At Eglinton, we use the Nelson Handwriting Scheme. In EYFS and Year 1, children are taught to form individual letters and then taught to join their letters from Year 2. Practise is given daily to handwriting. Across the school, spelling is taught using No Nonsense Spelling where the children are taught regular lessons to help develop their understanding of different spelling rules and etymology. What is phonics? Phonics is a key aspect in developing reading and spelling. Phonics is the practice of blending letter sounds (known as phonemes) to make words when reading and segmenting words into sounds to help with spelling. Phonics is taught every day at Eglinton and lasts for around 30 minutes from Reception to Year 2. Children learn phonics through hearing, saying, reading and writing phonemes. We follow Little Wandle to teach phonics and use a range of banded books, in order for children to apply their phonics knowledge and be able to access high quality texts and read for pleasure later on. How is Phonics Taught? All phonics lessons include revision of previous learning, teaching of new sounds/ tricky words, and application of new skills. Find Little Wandle’s full Reception and Year 1 teaching programme overview here to see what your child will learn and when. It is essential that each phonics lesson include the key skills of blending for reading and segmenting for writing. Children are taught how to read and write graphemes and apply these skills to their independent reading and writing. Some children will receive additional support in class, in addition to whole class phonic sessions. What is the Phonics Screening Check? The phonics screening check introduced in 2012 is a statutory assessment for all children in year 1. The purpose of this test is to confirm whether children can decode, segment and blend words correctly. The phonics test has a total of 40 words. Some are real words and some are pseudo words. This means (nonsense words or sometimes known to children as alien words). If you wish to practice real and alien words at home you can access them online (https://www.gov.uk/government/publications/phonics-screening-check-2018-materials) or ask your child’s class teacher for resources you can use at home. Children will be asked to read these words one-on-one with a teacher. The words they see will be either real words that make sense or pseudo words that have an alien or monster picture beside them. This test will show if the children have learnt the spelling patterns and phonic skills taught in year 1. The children will be very familiar with the format of the screening test before the formal test date in June. How can you support your child at home? Whilst at Eglinton Primary School, your child will be taught to read at school, however you can have a huge impact on their reading journey by continuing their practice at home. At Eglinton and whilst in Reception and Year 1 there are two types of reading book that your child will bring home: A reading practice book. This will be at the correct phonic stage for your child. They should be able to read this fluently and independently. A sharing book. Your child will not be able to read this on their own. This book is for you both to read and enjoy together. Reading practice book - This book has been carefully matched to your child’s current reading level. If your child is reading it with little help, please don’t worry that it’s too easy – your child needs to develop fluency and confidence in reading. Listen to them read the book. Remember to give them lots of praise – celebrate their success! If they can’t read a word, read it to them. After they have finished, talk about the book together. Sharing book- In order to encourage your child to become a lifelong reader, it is important that they learn to read for pleasure. The sharing book is a book they have chosen for you to enjoy together. Please remember that you should not expect your child to read the sharing book alone. Read it to or with them. Discuss the pictures, enjoy the story, predict what might happen next, use different voices for the characters, and explore the facts in a non-fiction book. The main thing is that you have fun! For further details about the Little Wandle Letters and Sounds Programme, please visit the parent page here. Science is a subject that develops the essential skills of curiosity, perseverance, reflecting and thinking. At Eglinton we believe that enquiry should be at the heart of science education. Our ambitious and spiral curriculum allows the children to cover the content and skills laid out in the national curriculum in an engaging and meaningful way. We believe that by incorporating hands on activities for the children, it allows them to immerse themselves into the wider world of Science and generate those key questions. Working scientifically forms a large part of the science curriculum and most lessons have an element of working scientifically within them. Some of the skills that your child will develop through our Science lessons are: - Posing questions - Making reasoned predictions - Developing methods to answer questions - Fair testing - Collecting results - Drawing conclusions Useful links for science British Science Week: At Eglinton we celebrate science week with a variety of activities both inside and outside the classroom. All children study a particular scientist and for that week, base their learning around this scientist and their achievements. At Eglinton, we also offer a science club on a Monday, which is run by Miss Bhana. In this club, the children are able to conduct a variety of experiments and work with great science equipment! Last wee, the children viewed different cells of the human body using a bioviewer and then drew their observation. Modern Foreign Languages At Eglinton, children learn French from Reception to year 6, covering various topics, including myself, animals and food. We follow the comprehensive online programme ‘Language Angels’ which engages all pupils using a variety of learning styles. Lessons are structured, offering clear pronunciation of words and phrases through games, songs and repetition of the language. At Eglinton, our children follow a broad and progressive curriculum which covers key skills in dance, gymnastics and a range of competitive team sports. Children have the opportunity to develop coordination, agility and attack and defence skills, as well as being reflective on their own and each other’s learning. As a school, we work with a variety of outside agencies including Charlton Athletic Football Club, to ensure our children and staff have access to a high quality curriculum. We are also part of the Greenwich School Sports Partnership (GSSP) which allows us to access training for staff and competitions across the borough. We also have an orienteering course at the school and all children in KS2 participate in orienteering lessons in the Summer Term. Working as a partnership, our children have the opportunity to take part in friendly sporting tournaments with Cardwell, Henwick and St Joseph’s Schools which encourage competition as well as sportsmanship skills. Our children also benefit from a range of after school activities including Dodgeball, Football, Dance and Gymnastics. At present we have a Key Stage 2 mixed football team. Summer 2 - 2022 Summer 1 - 2022 Spring 2 - 2022 Spring 1 - 2022 Autumn 2 - 2021 Autumn 1 - 2021 Summer 2 - 2021 Summer 1 - 2021 Autumn 2 - 2020 Autumn 1 - 2020 For more information regarding our curriculum, please contact Mrs Omololu, Assistant Headteacher.
<urn:uuid:8d6c9237-6440-49ca-8adc-0af0ecf9080a>
CC-MAIN-2022-33
https://eglinton-royalgreenwich.co.uk/Learning/Curriculum-Information/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572220.19/warc/CC-MAIN-20220816030218-20220816060218-00605.warc.gz
en
0.951892
2,839
3.484375
3
Small businesses provide an important role within their communities by bringing people together and helping local economies thrive. By providing jobs for locals, encouraging economic growth, and helping diversify local marketplaces, the benefits of small businesses in a community are more than the goods and services they provide. From family-owned restaurants to local boutiques and coffee shops, many small businesses are even responsible for shaping the overall identity of the community. With the ability to personally curate the products they carry, small business owners only offer the commodities and services they know that their customers want, need, and like – providing a customized and thoughtful retail experience. Often, local businesses are seen as the foundation for their community. Much more so than at the national level, small businesses make up the vast majority of a community’s GDP, therefore, the revenue small businesses bring in is vital to that community’s overall economic health. While it’s certainly important to acknowledge the economic contribution that a small business can make, it should also be noted that this relationship isn’t a one-way street. Both community and business thrive off of each other in a mutually beneficial way. As much as a small business can do for its community, both economically and socially, it wouldn’t be possible without the support of the people it serves. How Small Businesses Impact Their Communities Small businesses have a significant effect on the vitality of their community. Arguably, the best way for neighborhoods to become financially successful is to create an environment that supports and nurtures small business growth. Here are some of the many benefits of small businesses in a community: Create local jobs. Hiring local help has a great benefit to the regional economy by creating more disposable income within the community. A city with a thriving small business environment encourages people to stay, making it economically feasible to do so. Local workers are also more likely to spend their income in town, providing a chain reaction of prosperity. Local involvement. Small businesses typically thank their communities by giving back to local schools, charities, youth sports teams and other organizations. Local businesses pay local taxes which means more revenue goes back into the community. That additional revenue means more money for improvements to city roads, schools, and other needs. Foster community identity. The overall makeup of the many distinct personalities of local businesses reflects their locality, creating a unique image for their community. This uniqueness is important, as it gives tourists from outside the community a reason to come to that particular area and spend money. Benefit other businesses. As a business draws in customers to an area, neighboring businesses typically benefit, as these customers are also likely to check out and shop at other businesses while they’re there. Cultivating and encouraging entrepreneurship in these ways further develops a favorable climate for small businesses. Offer Internships. Successful small businesses inspired others to consider starting their own small business, encouraging healthy competition and innovation within area. Even offering internships or entrepreneurships to high school or local colleges would provide students hands-on experience to learn professional skills and the ins and outs of running a successful business. How Good Community Relations Help Your Bottom Line It’s not hard to make the case for community involvement and philanthropy. Many small business owners are already on board by donating a substantial percentage of its profits to charity. However, even small business owners who are more focused on the bottom-line often find that community involvement provides benefits that can actually increase profits long-term. Branding benefit: Getting involved in the local community puts your name and your brand out there. Small businesses typically can’t spend big money on advertising and marketing expenses, so getting involved is a relatively inexpensive way to let people know who you are, especially if you’re newly established. An influx of retweets, shares, and ‘likes’ have the ability to significantly amp up your social media business pages and overall costumer involvement. Networking benefit: Events and initiatives that give back and engage the community not only present great social media opportunities, but also attract new customers and strengthen preexisting relationships. Since most customers like to buy, shop, and dine at a business that provides long-term support for a specific cause, it may be wise to choose to donate to an issue that resonates with you. Build loyal customer base: According to a study by Cone Communications and Echo Research, 82 percent of U.S. consumers consider corporate social responsibility when deciding where to shop. Businesses that show their communities that they care and are committed to helping improve the local area create emotional loyalties with residents. Chain reaction growth: A chain reaction of growth happens when a business and its community are both prospering. When a local business gives back to the members of its community, it’s financially empowering those people to spend more, and in turn, benefiting local businesses. You’re investing in future sales, leading to revenue growth. When considering the benefits of small businesses in a community, and the metrics for determining success, it’s important to remember that most of these benefits require playing the long game. Fostering and nurturing client relationships take time, but if you’re willing to give and engage, the community will reward you with support and loyalty. What You Can Do in Your Community Sponsoring local events, hosting fundraisers, donating to charities and funding local projects (like building a new park, for example), are all great ways to get involved. Hire local help and be sure to use local vendors for your business whenever you can. Keeping money in the circulation of the local economy will financially benefit everyone within the community. Here are a few ways that small businesses can get involved: Importance of volunteer work: Serving and helping others not only benefits others, but benefits ourselves, too. Customers want to buy into a brand, not just buy from it. As a company, it’s important to present yourself as a trusted institution that values its community and the people in it. By taking advantage of local need-based initiatives, small businesses take ownership of their civic responsibility which shows the public that they have an active interest in the well-being of their community. Helping unite the community: By hosting benefits and events, or volunteering to a local initiative as a team, your presence will help strengthen local ties and broaden support networks. By engaging with people from different age groups, backgrounds, and social groups allows you and your team to create relationships with individuals you might not normally cross paths. This kind of engagement and diversity helps you and your employees get more value from their community. Types of volunteering: There are plenty of ways for you and your company to create a lasting effect on your community. Consider implementing one or more of these initiatives: - Cash or sponsorship: Some of the most common ways in which to give back are in the form of a philanthropic gift for a charitable cause. Monetary contributions can go a long way towards helping charities achieve their goals. - Pro Bono Services: Offering services or training at no charge is a great way for people who prefer one-on-one engagement to contribute to a cause. Whether its donating time as a mentor, teaching new skills or providing free services such as a logo or website, this kind of volunteer opportunity can provide a meaningful impact within the community. - Company events: Hosting a small gathering or benefit at your storefront or office building can provide speakers or — the perfect venue to raise awareness and collect donations for their organization. Being the host allows participants a chance to get to know what matters to you. - Volunteer day: Choosing a volunteer day for your entire team to participate in allows for interaction and comradery. Getting involved can boost team morale and individual employee happiness and purpose. - Company match: Perhaps you might consider a company match on employee donations made to qualifying charities in your area. A matching program can be a meaningful way to add employee participation and enthusiasm. Always keep your community in mind when making any business decision. Whether direct or indirect, you want the effects of your decisions to be positive in the local area. Without the support of small businesses, a community can’t thrive; without the support of its community, a small business has no shot. Leveraging small business financing to make an impact Now you may be wondering how to acquire the working capital you need to host a company event, make a charitable donation, or hire local talent to make the biggest impact on your community. To help make it easier, we’ve put together a list of financing options that offer the most flexibility when it comes to small business financing: - Line of credit: A line of credit is a flexible lending option that provides your company with access to capital on a need-to basis. Once your company has been approved for a set amount, you have the ability to draw from it whenever it’s necessary. This option provides you with the utmost flexibility when it comes to financing. - Short-term loan: A short-term loan allows you the ability to secure working capital upfront and then pay it off daily, weekly, monthly, or annually depending upon the lifespan of the loan. Typically, a term loan has lower rates than other financing options, but this may vary depending upon whether you choose a short-term or long-term loan. - Merchant cash advance: A merchant cash advance is another type of financing where the purchaser, purchases at a discount, a portion of your business’s future account receivables. Payments are based on a percentage of those future receivables. Whether you’re looking to host a fundraising event, launch a volunteer initiative, or make a sizable donation, small business financing can help you and your team significantly make a difference. By creating local jobs, fostering community identity, and supporting the local economy, the benefits of small businesses in a community not only impact the companies themselves, but the community as a whole. If you have any questions or would like to speak with a business advisor to meet business working capital needs, call one of our small business advisors at Rapid Finance today: (877)-252-0827.
<urn:uuid:0e479a4e-8d03-4ef6-a143-74d22862c795>
CC-MAIN-2022-33
https://www.rapidfinance.com/blog/how-small-businesses-can-nurture-communities-and-how-you-can-benefit/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.952104
2,090
2.703125
3
How to Plant Cannabis Seeds Indoors This article was co-authored by wikiHow Staff. Our trained team of editors and researchers validate articles for accuracy and comprehensiveness. wikiHow’s Content Management Team carefully monitors the work from our editorial staff to ensure that each article is backed by trusted research and meets our high quality standards. wikiHow marks an article as reader-approved once it receives enough positive feedback. This article received 11 testimonials and 93% of readers who voted found it helpful, earning it our reader-approved status. This article has been viewed 1,325,348 times. Growing cannabis at home can be a fun project and a nice way to have your own cannabis plants on hand. You may want to grow cannabis indoors due to inclement weather in your area or due to a lack of green space in your yard. Start by germinating the seeds. Then, plant the seeds in soil or in a starter cube. Once the seeds have been planted, care for them properly so they grow and thrive. - After 12 hours, place the viable seeds on a towel. Wet one paper towel and put it on a plate. Paper towels are thick enough to retain the moisture needed to help the seeds germinate. Place one paper towel under running water until it is wet to the touch, but not dripping wet. Use a ceramic dish or plate, as it will be strong enough to hold the towels and the seeds. The paper towel should cover the dish or plate. X Research source - If you do not have enough space on one plate for all your seeds, soak two more paper towels and put the remainder on a new plate covered in a wet paper towel. Wet other paper towel and place it over the seeds. Make sure the wet towel makes contact with the seeds. X Research source - You can try using a heat lamp near the seeds to keep them warm. Do not warm the seeds up too much, as you do not want your heat source to dry out the paper towels. - If the seeds become too dry, they could die and never germinate. - Be very careful with the seeds as they open. Avoid prodding, pulling, or touching the seeds, as you do not want to damage the roots. - Any seeds that have not opened and grown roots within a few days should be discarded, as they are not viable. - As an alternative to soil, you can use starter cubes from your local nursery or online. Starter cubes are pre-cut growing pods made of composted bark. They contain a hole where you can place the cannabis seeds and grow them in good conditions. Basic starter cubes are inexpensive and easy to use. X Research source - If you make planting holes that are too shallow, the seed’s roots will not have enough soil to grow well. If you make the planting holes too deep, the seed will have a difficult time sprouting. - Do not pull or tug at the seeds when you pick them up with tweezers. If they are stuck to the paper towel, wet the towel with water to make the seeds easier to pick up. - Do not press hard on the seeds when you cover them, as this can disturb their growth. - If you are using starter cubes, pinch the top of the holes in the cubes closed. - Maintain a growing temperature of 75 to 85 °F (24 to 29 °C) for the plants so they thrive. - Stick to a regular watering schedule so the plants get enough moisture. You can plan to spray the plants in the morning and then again at night so they get the water they need. - Grow lights range from $200 to $1,200 USD depending on the size and model. - You can get cool white grow lights at your local hardware store or online. Avoid touching or handling the seeds as they grow. Touching or handling the seeds can damage them and stunt their growth. With the right growing conditions and care, your seeds should sprout and poke out of the soil within five to ten days. X Research source More than 12 hours of light a day for about 4-6 weeks as the plant matures will be enough. Once the plant is a decent size, you may induce flowering. Switch the plant to a timer of EXACTLY 12 hours of strong light (the more sunlight the plant gets, the more energy it can devote to flowering). Yes, it is bad for the plant to have water constantly sitting at the bottom of the pot. It could make the roots rot over time. You can actually find LED lamps made for growing plants online. If you don’t want to bother with that, you can just get a purple light to grow them under. There are many articles online talking about the effects of colored lights on plants. If you plan on growing short, fat plants, they should be at least 6′ apart. You don’t want the plants rubbing on each other or shading the other plants. You will also want to select a spot to ensure all plants will receive maximum sunlight. You can start as soon as you see two little leaves budding. During that time, make sure to use distilled water when watering them. Cannabis thrives in a comfortable room temperature when grown indoors, or a little warmer – not too dry, not too humid. If it feels too hot or too cold for you, it’s probably too hot or too cold for your cannabis plants. You can’t. You can try keeping it by a window, but you still won’t have much success. Lights aren’t that expensive, look on Amazon. Yes, rain water is fine for any plant. The use of distilled water is to keep from adding tap water contaminants. Keeping the plant from “stretching” is simple. Place the lights closer to the top of the plants. There are good video examples on YouTube showing two seeds started at the same time and placed under lights at different heights. The plant with inadequate lighting actually “reaches” for the light, growing tall and thin with longer internodal gaps. The seedling with closer light grows short and squat, with less stem between leaves (internodal distance), which means a better frame and plant structure for supporting the massive buds that you want to grow. As the plant grows, raise the lights with it. (Most folks suggest somewhere in the 16-30 inch range from source to canopy.) The cultivation of cannabis is considered illegal in many jurisdictions. Make sure it is legal to grow cannabis in your area. You Might Also Like A Complete Guide to Growing Autoflowers Outdoors (When to Plant, How Often to Water, & How Much They Yield) About This Article This article was co-authored by wikiHow Staff. Our trained team of editors and researchers validate articles for accuracy and comprehensiveness. wikiHow’s Content Management Team carefully monitors the work from our editorial staff to ensure that each article is backed by trusted research and meets our high quality standards. This article has been viewed 1,325,348 times. To plant cannabis seeds indoors, first soak the seeds in lukewarm tap water for 12 hours. Discard any seeds that float to the top. Then, place the seeds on a damp paper towel on a plate with 1 inch (2.5 cm) of space between each seed. Cover the seeds with another damp paper towel. Keep the seeds in a spot that remains between 70-80°F (21-27°C), and spray the paper towels with water whenever they start to dry out. The seeds will sprout in 2-3 days. When they do, fill pots or a growing tray 3/4 of the way with loose potting soil that has a pH between 5.8 and 6.3. Press the soil down lightly, leaving some air in it. Then, use a pencil to poke 1 inch (2.5 cm) holes in the soil. Place the sprouted seeds vertically in the holes and fill the holes with potting soil. Water the soil thoroughly and place the pots or tray in a spot that’s always 75°F (24°C) or warmer. Set up a grow light over the seeds and leave it on at all times. Water the seeds every day so the soil doesn’t dry out. The seedlings will emerge in 2-4 weeks. To learn how to use cool white grow lights to help your cannabis seeds grow, keep reading! Reader Success Stories Terrie Mac morrison Did this article help you? Terrie Mac morrison “The process is explained very easily, and the author took note in detailing every aspect of seed planting. As for the rest of the process, refer growing weed indoors and harvesting marijuana plants.” . ” more “Thank you for your insight. I’m looking to cultivate cannabis, and your recommendations and Q&A answer some of my questions on starting to plan my grow.” . ” more “Although I have grown cannabis, for a couple of years I found some good tips in this article. I always find the starting stage to be challenging.” . ” more How Deep Do I Plant Pot Seeds? First-time cannabis growers have a plethora of questions when it comes to the first phases of marijuana cultivation. Even though growing marijuana plants is not much different from growing other plants (since every plant needs soil, light, nutrients, and water in order to thrive), the difference is in how much of these factors the cannabis plant needs. In order to end up with a good Sativa, Indica, or hybrid marijuana strain, growers need to take into consideration the unique requirements that each strain needs. To help you become more confident and informed when you set out to start marijuana cultivation, we’ll get into the subject of germination and planting of cannabis seeds, providing you with everything you need to know in order to grow Marijuana. Tips Before You Start With the Germination of Marijuana Seeds There are a few things you’ll need before you begin germinating seeds: - Get high-quality seeds from a reputable seed bank. - Keep your marijuana seeds under a specific temperature for germination that should be about 72 degrees Fahrenheit (22 °C). - Keep your germinating seeds away from direct sunlight (don’t keep them on your windowsill or near a heater since they will get dry, and seeds need moisture). - For the germination stage, you’ll need jiffy pellets or starter plugs that are designed specifically for germinating weed seeds. - For indoor cultivation, you’ll need grow lights that will be used after you plant the cannabis seeds in pots. Guide for Planting Cannabis Seeds In order for the marijuana cultivation process to result in a harvest, the marijuana plant needs to go through 4 stages: germination (3-10 days), seedling (2-3 weeks), vegetative stage (3-16 weeks), and flowering (8-11 weeks). The first and second stages are the most crucial when it comes to planting pot seeds. The first stage (germination) begins when the dry cannabis seed is placed in water until it sprouts. Some seeds may germinate, while others may not, depending on the quality of the seeds. Good cannabis seeds should be brown in color and should feel hard and dry to the touch. Transplanting (Planting the Seed) Once your seed has sprouted, it’s ready to be placed in soil so that it can start growing. Its taproot will grow downwards, while the stem grows upwards. As the plant grows, two cotyledon leaves grow out of the stem these take in sunlight to help the plant grow healthy and stable. Germination: The Wet Paper Towel Method This germination method includes germinating your seeds with damp paper towels and has been a tried-and-tested method for germinating seeds. Two pieces of paper towels are soaked in tap water and the seeds are stored between the sheets. Additional water is added over the next few days to keep the seeds moist. Sprouting times tend to vary, but the seeds will generally take between two and four days to sprout, and if they take longer it’s best to throw them away, as they probably aren’t viable. After a few days, tiny roots should appear, and that is an indication that the seed is ready for planting. Germination: Soaking Seeds in Water Another method for germinating cannabis seeds that works well with harder seeds is the soaking method. This method requires you to place the seeds at room temperature tap water and keep them soaked for 32 hours. After you’ve put the seeds in water, some of them will sink to the bottom. These seeds are viable. The non-viable seeds will float, and they need to be thrown away. After 32 hours, you can use the paper towel method on the seeds that sank, and after they sprout, you can plant them. Planting the Seeds Directly This is a harder germinating technique and one that isn’t recommended for first-time growers. In order for it to work, growers need to be informed about the plants’ required nutrients, humidity levels, and the appropriate pH soil levels that are needed. For this type of seed germination, you’ll need to plant the marijuana seeds in moist soil, about an inch deep. You’ll also need to have some additional heating system to keep the plants warm for the first few days. Even though planting the seeds directly may not be the best option for novice growers, it does have its benefits, like not risking breaking the taproot off when you’re transferring the plant to another pot. Transplantation of Germinated Marijuana Seeds After germination, you can plant the germinated seeds in a pot. Remember that the cannabis seedlings and its taproots are fragile in this early stage and you need to handle them with care, so it might be good to use tweezers when you do this. Fill small pots (2 inches) with potting soil that is loose and moist to the touch. The pots should be filled ¾ of the way. Make half-inch pre-drilled holes by using your finger, and carefully place one sprouted seed in each hole. Cover the seed with soil, spray it with water, and refrain from pressing the soil. It will take about one more week for the germination process to conclude, after which a stem will surface, and the taproot will produce secondary roots. The best soil for sprouting cannabis seeds is a seed starter with only a little bit of fertilizer, as cannabis seedlings need loose soil in order to grow easily. For hydroponic cultivation, you may want to germinate in rockwool cubes because they retain moisture better. Replanting for Healthy Growth Young plants need to be planted in smaller pots before they’re replanted into bigger containers, so that they can grow a stronger root system. That’s because small plants that are planted in bigger pots may find it harder to get oxygen when they’re surrounded with too much growing medium, which can result in stunted growth. It’s best to replant your cannabis plant as it outgrows its pot. Avoid leaving your plant in a small pot for too long as that can result in you having a “root-bound” plant (the roots grow too large for the pot and the plant can asphyxiate and die.) Some growers will directly plant the seedlings in the final container. However, this is not recommended because it will be harder for the plant to get oxygen when it is surrounded by too much growing medium. On the other hand, if you find that your plant absorbs water within a day, it might be time for a bigger pot. If the thought of transplanting your weed seeds sounds tiresome and challenging for you, then you can always plant directly in the final container. But do expect slightly slower growth, and make sure you are careful when watering the plant so as not to give it too much water. Cannabis plants require specific conditions in order to thrive and produce a good harvest. However, taking care of marijuana seeds isn’t as hard as you may initially think. Planting these seeds is similar to planting any other seeds when you’re gardening fruits and vegetables. All you need to know is how to properly germinate and transplant your young plants. With a bit of knowledge and practice, you’ll be well on your way to becoming a seasoned cannabis grower.
<urn:uuid:46bd18ec-c4b1-433a-9756-e1a612e8caf5>
CC-MAIN-2022-33
https://farmacyseeds.net/how-deep-do-you-need-to-plant-marijuana-seeds/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00404.warc.gz
en
0.937788
3,898
2.5625
3
The carotid sheath is a fibrous connective tissue that encircles four key structures within the neck. These structures include: The carotid sheath is located posterior to the sternocleidomastoid muscle and is a part of the deep cervical fascia of the neck. It consists of all three fascial layers of the neck, which include the pretracheal fascia, the investing fascia, and the prevertebral fascia. The carotid sheath starts superior to the sternum, and the first rib then extends to the base of the skull. Within the carotid sheath, the internal jugular vein is lateral to the carotid artery with the vagus nerve posterior to both vessels in most individuals, though many different anatomic configurations exist. The right common carotid artery originates from the bifurcation of the brachiocephalic artery, whereas the left common carotid artery arises from the aortic arch. Both common carotid arteries run within the carotid sheath until they bifurcate into the internal and external carotid arteries at the level of the upper border of the thyroid cartilage. The carotid body and carotid sinus are located at the bifurcation and function as important receptors within the body. The carotid body is a chemoreceptor that is sensitive to chemical changes including oxygen, carbon dioxide, and hydrogen ion concentration within the blood and helps control respiration. The carotid sinus is located just above the bifurcation at the origin of the internal carotid artery and functions as a baroreceptor helping detect and correct changes in blood pressure. Continuing from the bifurcation the external carotid artery exits the sheath and supplies blood to the various structures throughout the face and neck. The internal carotid artery continues within the carotid sheath and enters into the temporal bone through the carotid canal and gives rise to the ophthalmic artery as well as the anterior and middle cerebral arteries. The internal jugular vein is a continuation of the sigmoid sinus and begins its descent towards the heart at the jugular foramen along with the vagus nerve. It travels within the carotid sheath and ends with it meeting the subclavian vein, thus forming the brachiocephalic vein. Wile moving posteriorly, the internal jugular receives venous blood from the facial, lingual, and superior and middle thyroid veins. The vagus nerve has the longest course of any cranial nerve and begins its journey by passing through the jugular foramen with the internal jugular vein and makes it descent within the carotid sheath. Within the neck, it gives off the pharyngeal branch and the superior laryngeal nerve. The pharyngeal branch supplies motor fibers to the muscles of the pharynx with the exception of the stylopharyngeus. A lesion to the pharyngeal branch causes deviation of the uvula to the opposite side of the injury. The superior laryngeal nerve divides into the internal and external laryngeal nerves. These nerves supply sensory fibers to the larynx above the vocal cord, lower pharynx, and epiglottis as well as supplying taste fibers to the root of the tongue near the epiglottis. The glossopharyngeal nerve (CN IX), accessory nerve (CN XI), and hypoglossal nerve (CN XII) pierce the superior section of the carotid sheath briefly and then exit. In addition, the ansa cervicalis is embedded in the anterior of the carotid sheath. It is important to visualize both of these structures when performing procedures in which the carotid sheath must be incised or manipulated. The function of the carotid sheath is to separate and, possibly, help protect the vital structures within it. The adventitia of the cervical great arteries becomes apparent by 15 weeks gestation and is one of the earliest components of the fetal deep cervical fascia. The carotid sheath does not appear until approximately 20 weeks gestation. At this time it is fused with the pretracheal fascia, but not yet integrated into the prevertebral lamina of the deep cervical fascia. A carotid endarterectomy is performed to excise atherosclerotic sclerotic thickening of the intima within the internal carotid artery in an effort to reduce strokes in patients with significant carotid artery stenosis. To begin, the opening incision is made and the sternocleidomastoid muscle is retracted. At this point it is important to visualize the carotid sheath for this is where the structure vital to the procedure is located. The carotid artery lies on the medial side of the internal jugular vein, and the vagus nerve is situated posteriorly. Superiorly, the carotid sheath may also contain the hypoglossal nerve, the glossopharyngeal nerve, and the accessory nerve. These structures pass in a horizontal fashion and cross the internal carotid artery. It is important to identify these structures before incising any structure. The surgeons open the carotid sheath to gain exposure to the common carotid bifurcation as this is the most common site for atherosclerosis. Once access is gained into the carotid sheath and the carotid bifurcation is located, the surgeon then removes any atherosclerotic plaque found and repairs the vessel. Possible complications include air embolism and laceration of the internal jugular vein or carotid artery. Penetrating Neck Trauma Zones of the Neck The neck is divided into three zones. These become important when assessing and managing trauma in those with neck injuries. Zone I - cricoid cartilage to the sternal notch: trachea, lung, esophagus, thoracic duct, vertebral arteries, origin of the common carotid artery, and subclavian vessels, spinal cord, thoracic duct, thyroid gland Zone II - cricoid cartilage to angle of mandible: carotid sheath and its components (carotid artery, internal jugular vein, vagus nerve), trachea, esophagus, spinal cord, larynx, pharynx Zone III - angle of mandible to base of skull: distal portion of internal carotid artery, vertebral arteries, jugular veins, pharynx, spinal cord, sympathetic chain, CN IX,X,XI,XII The decision to explore these areas is based on hard and soft signs. Regardless of the zone, if the patient becomes unstable, surgical exploration is the best course of management. If the patient presents with hard signs emergent management is needed, whereas if soft signs are present close observation and reevaluation may be appropriate. Internal Jugular Central Venous Line An internal jugular central line is performed to gain access to push medication or fluids into the systemic vasculature. The procedure begins by placing the patient in slight Trendelenburg and locating the internal jugular vein within the apex of the triangular interval between the clavicular and sternal heads of the sternocleidomastoid muscle. It may help to have the patient turn the head to the contralateral side to better visualize these anatomical landmarks. If the patient is conscious, begin by applying a local anesthetic. Next, insert the needle at a 45-degree angle posteriorly while applying negative pressure. The needle will pass through the carotid sheath and the internal jugular vein will produce blood within the syringe. An ultrasound can be used to help assist and ensure proper placement of the guide needle into the vein. While keeping the guide needle in place, begin threading the guide wire. Once in place, remove the needle and introduce the dilator and then the catheter. The catheter should now be within the superior vena cava. It is important to understand the relationships of the structures within the carotid sheath to properly perform an internal central venous line. It is uncommon for any pathological conditions to directly affect the carotid sheath itself. Instead, it is more common to see pathological changes to the structures within the sheath and thus to affect the sheath secondarily. However, one scenario that could involve the sheath is a disseminated dental infection. This could lead to cellulitis within the head and neck with the carotid sheath becoming involved. The disease process could further progress and involve the mediastinum causing mediastinitis and endocarditis. |||Miyake N,Hayashi S,Kawase T,Cho BH,Murakami G,Fujimiya M,Kitano H, Fetal anatomy of the human carotid sheath and structures in and around it. Anatomical record (Hoboken, N.J. : 2007). 2010 Mar [PubMed PMID: 20169562]| |||Shvedavchenko AI,Oganesyan MV,Hammer CM,Paulsen F,Bakhmet AA, Ansa cervicalis - A new classification approach. Annals of anatomy = Anatomischer Anzeiger : official organ of the Anatomische Gesellschaft. 2018 Nov 17; [PubMed PMID: 30458237]| |||Rivard AB,Burns B, Anatomy, Head and Neck, Internal Jugular Vein 2018 Jan; [PubMed PMID: 30020630]| |||Ii N,Fuwa N,Toyomasu Y,Takada A,Nomura M,Kawamura T,Sakuma H,Nomoto Y, A Novel External Carotid Arterial Sheath System for Intra-arterial Infusion Chemotherapy of Head and Neck Cancer. Cardiovascular and interventional radiology. 2017 Jul; [PubMed PMID: 28357576]| |||Melamed H,Harris MB,Awasthi D, Anatomic considerations of superior laryngeal nerve during anterior cervical spine procedures. Spine. 2002 Feb 15; [PubMed PMID: 11840114]| |||Choi J,Ha DH,Kwon S,Jung Y,Yu J,Kim M,Min K, Needle Entry Angle to Prevent Carotid Sheath Injury for Fluoroscopy-Guided Cervical Transforaminal Epidural Steroid Injection. Annals of rehabilitation medicine. 2018 Dec; [PubMed PMID: 30613074]| |||Jusufovic M,Skagen K,Krohg-Sørensen K,Skjelland M, Current medical and surgical stroke prevention therapies for patients with carotid artery stenosis. Current neurovascular research. 2019 Jan 31; [PubMed PMID: 30706783]| |||Doshi PB,Bhatt YC, Passage through the carotid sheath: An alternative path to the pre-spinal route for direct repair of contralateral C7 to the lower trunk in total brachial plexus root avulsion injury. Indian journal of plastic surgery : official publication of the Association of Plastic Surgeons of India. 2016 May-Aug; [PubMed PMID: 27833275]| |||Cheah T,Ha JF, Carotid sheath 'intubation' during an emergency surgical cricothyroidotomy. BMJ case reports. 2016 May 25; [PubMed PMID: 27226126]|
<urn:uuid:965422de-82c8-405b-96a3-f849c5e5b15f>
CC-MAIN-2019-22
https://statpearls.com/kb/viewarticle/18971/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258621.77/warc/CC-MAIN-20190526025014-20190526051014-00542.warc.gz
en
0.857311
2,453
3.546875
4
Note: This supplement was originally created in consultation with Gregory C. Colomb, Professor of English at the University of Virginia, and revised in 2015 in consultation with Catherine Bradshaw, Professor of Education and Associate Dean for Research and Faculty Development at the University of Virginia. This supplement draws from A Manual for Writers of Research Papers, Theses, and Dissertations by Kate L. Turabian, revised by W. C. Booth, G. C. Colomb, J. M. Williams, and the University of Chicago Press Editorial Staff. When writing research or academic papers, it is common to use outside sources to inform your own ideas. However, it is critical that the necessary citations are provided to these outside references. Citation is important because it shows that you obtained information or ideas from another source, such as a textbook, website, or research article. By failing to cite, you are falsely portraying someone else's ideas as your own; this is considered plagiarism, which is a form of cheating. At the University of Virginia, cheating is an Honor offense. The Bylaws of the Honor Committee define an Honor offense as "a Significant Act of Lying, Cheating or Stealing, which Act is committed with Knowledge" (capitalized terms are defined in the Honor Committee By-laws). "Cheating" is defined in the Bylaws as "a violation of any standards, conditions, or rules for which a student may receive benefit, credit, or acknowledgment, academic or otherwise. Cheating includes, but is not limited to, performance of any of the following acts, or abetting a fellow student in the performance of any of the following acts: using unauthorized materials in the completion of work, copying from a fellow student, plagiarism, multiple submission, false citation, false data submission, and/or unauthorized acquisition of advance knowledge of the contents of an exam or assignment." The definition of cheating and the consequences of plagiarism/academic fraud used at the University of Virginia may differ from those of your high school or prior academic environment. All UVA students are held accountable to the expectations set forth by the Honor System; therefore, as a student at UVA, it is extremely important that you understand these expectations of academic integrity. This Supplement is designed to elaborate on one element of cheating—plagiarism—with a particular emphasis on one kind of potential plagiarism—paraphrasing the ideas or work of another. In general, you will avoid plagiarism if you cite the sources you paraphrase and if you use words or phrases that are distinctive to your original source. Alternatively, you can use quotation marks and provide a citation to indicate text that is identical to the original source. You should err on the side of attribution and quotation marks if you want to avoid plagiarism. This Supplement describes plagiarism and paraphrasing in a general way. Every case of alleged plagiarism will necessarily entail unique facts and circumstances. In other words, whether or not a particular Act actually constitutes plagiarism, and thus "Cheating," for purposes of the Honor Code, will be determined based on the unique facts and circumstances of each case (including, for example, such things as the nature of the assignment in question; the instructor's instructions on source material, if any; the extent and manner of reliance on the ideas and work of another author; and the policies established and expectations held by the relevant school, department or instructor). Because no one can anticipate and describe every Act that may constitute plagiarism, this Supplement is not exhaustive. If you are at all uncertain, you should speak to your instructor or consult a standards manual, such as A Manual for Writers of Research Papers, Theses, and Dissertations, by Kate Turabian, in advance, about whether your actions may put you at risk of committing an Honor violation. Plagiarism "occurs when a writer deliberately uses someone else's language, ideas, or other original (not common-knowledge) material without acknowledging its source" (Council of Writing Program Administrators, 2003, p. 1). In other words, plagiarism is representing someone else's ideas or work as your own original ideas or work. Plagiarism encompasses many things and is by far the most common manifestation of academic fraud. For example, copying a passage directly from a book, website, journal article, or any other source into a paper without using quotation marks and explicitly citing the source is considered plagiarism. Additionally, paraphrasing without citing the original source is considered plagiarism. It is very important that students properly acknowledge all ideas, work, and even distinctive words or phrases that are not their own. Any time you describe information gleaned from an outside source, you must complete two steps of proper attribution: - Accompany the quotation, paraphrase, or summarized text with a parenthetical or "in-text" citation/reference to the original source - Include the source in the bibliography (also known as a "Works Cited" or "References" list) at the end of your paper The exact method and formatting used to complete these two steps of citation will vary depending on which citation style you use; examples of citation styles include the American Psychological Association (APA), Modern Language Association (MLA), and the Chicago Manual of Style. Different academic disciplines use different citation styles; if you are unsure which style to use, ask your instructor. The information in this Supplement provides an overview of the concepts of plagiarism, paraphrasing, and quotations as they relate to the Honor Code at the University of Virginia. Students should consult relevant style manuals for specific and comprehensive citation guidelines relevant to their field. Incorporating Outside Sources Into Your Academic Writing If you want to include an author's exact words, phrases, or sentences, you must use quotation marks around the verbatim material or block indent longer quotes. In addition, make sure to cite the source appropriately in-text and in the bibliography. Plagiarism occurs if you do not use quotation marks around the copied words, or if you use quotation marks but fail to cite the specific author. Of course, you should not put quotation marks around words or phrases that are not exactly those of the author—this would constitute false citation (another form of Cheating, defined in the By-laws of the Honor Committee). The traditional rule of thumb is to use quotation marks anytime you use three or more words in a row from another source. If you quote a longer passage (typically, a passage that is four or more lines long), you should block indent the quote; see the Paraphrasing section for an example of a block quote. Using only one or two words from another source usually does not require quotation marks, except in certain situations, such as when the word(s) reflect a unique term or concept. Consider, for example, the following quotation and explanation discussed in Turabian (2013): Technology's history exemplifies what is termed as autocatalytic process: that is, one that speeds up at a rate that increases with time, because the process catalyzes itself (Diamond, 1998, p. 301). The phrase "autocatalytic process" is distinctive and would require quotation marks and a citation. While determining whether certain words warrant quotation marks might seem dependent on the reader, you should always use quotation marks when in doubt. Paraphrasing is a common method of incorporating ideas from another source into your own writing. Paraphrasing occurs when you take content or ideas from an outside source and concisely rephrase or summarize the source information in your own words. Paraphrasing does not mean merely changing a word or two or reordering the concepts in a passage; you must use your own words and your own phrasing to replace the words and phrasing of the source. Even though you use your own words, you must still cite the original source from which you obtained the content or idea (both in-text and in your references list). If you paraphrase a source but fail to cite the original source, you are committing plagiarism. In order to avoid plagiarism when you are paraphrasing, Turabian (2013) suggests, "[D]on't read your source as you paraphrase it. Read the passage, look away, think about it for a moment; then, still looking away, paraphrase it in your own words. Then check whether you can run your finger along your sentence and find the same ideas in the same order in your source. If you can, so can your readers. Try again" (p. 80-81). It is important to be diligent and double-check your work, especially when you are incorporating multiple outside sources. Otherwise, you may inadvertently commit a type of plagiarism called mosaic plagiarism. According to the Harvard Guide to Using Sources (2015): If you copy bits and pieces from a source (or several sources), changing a few words here and there without either adequately paraphrasing or quoting directly, the result is mosaic plagiarism. Even if you don't intend to copy the source, you may end up committing this type of plagiarism as a result of careless note-taking and confusion over where your source's ideas end and your own ideas begin. You may think that you've paraphrased sufficiently, or quoted relevant passages, but if you haven't taken careful notes along the way, or if you've cut and pasted from your sources, you can lose track of the boundaries between your own ideas and those of your sources. It's not enough to have good intentions and to cite some of the material you use. You are responsible for making clear distinctions between your ideas and the ideas of the scholars who have informed your work. If you keep track of the ideas that come from your sources and have a clear understanding of how your own ideas differ from those ideas, and you follow the correct citation style, you will avoid mosaic plagiarism. ("What Constitutes Plagiarism" section, para. 6). This example illustrates the possibility that, even where you have cited the original author, you may, in the manner and extent to which you go on to convey the author's ideas, be found to have represented that author's ideas or work as your own. This might be the case, for example, where you cite the original author one time at the beginning of a 10-page paper, then, after leaving the topic, return to the author's ideas later in the paper without indicating to the reader that you have done so; that is, the reader would reasonably infer that your reference to the original author had ended and that later paraphrases of the author's ideas or work were in fact your own original ideas or work. At UVa, an I-Panel, and, if applicable, a jury, would be asked to review the case and decide whether, in the totality of the circumstances, you have misrepresented the author's original ideas as your own and therefore committed an Honor offense. Possible Exceptions to Traditional Citation Rules There is some information that is considered "common knowledge" within specific academic disciplines that may be exempt from traditional citation rules. Common knowledge is information that an educated reader is expected to know (for example, that water boils at 32 degrees Fahrenheit) and therefore does not need to be cited. What is considered to be common knowledge varies among fields; when in doubt, consult a professor or Teaching Assistant ("TA"). If you are still unsure, always err on the side of attribution. Additionally, in certain specialized fields, such as law or business, close paraphrasing may be considered acceptable; in such cases, the relevant facts and circumstances will, as in all cases, inform the question whether a particular Act constitutes plagiarism. Examples of How to Paraphrase It is important to learn to appropriately paraphrase an idea. Toward that end, below are two examples designed to help you better understand what plagiarism by paraphrasing would look like. Each example also provides an appropriate paraphrase. Both examples come from the "What Constitutes Plagiarism" section of the Harvard Guide to Using Sources (2015). Source: Leech, Clifford. "The Moral Tragedy of Romeo and Juliet." Critical Essays on Romeo and Juliet. Ed. Joseph A. Porter. New York: G.K. Hall, 1997. 20. Print. Original Source Material: So in Romeo and Juliet, understandably in view of its early date, we cannot find that tragedy has fully emerged from the moral drama and the romantic comedy that dominated in the public theaters of Shakespeare's earliest time. Here he attempted an amalgam of romantic comedy and the tragic idea, along with the assertion of a moral lesson which is given the final emphasis—although the force of that lesson is switched from the lovers to their parents. But tragedy is necessarily at odds with the moral: it is concerned with a permanent anguishing situation, not with one that can either be put right or be instrumental in teaching the survivors to do better. Plagiarized Version: In his essay, "The Moral Tragedy of Romeo and Juliet," Clifford Leech suggests that rather than being a straight tragedy, Romeo and Juliet is a mixture of romantic comedy and the tragic idea, and that it asserts a moral lesson which is given the final emphasis. The impact of the moral lesson is switched from the lovers to the parents (20). Explanation: This is an inadequate paraphrase because the student has only replaced a few words ("mixture" for "amalgam"; "asserts a moral lesson" for "assertion of a moral lesson"; "impact" for "force") while leaving the rest of Leech's words intact. Acceptable Version: In his essay, "The Moral Tragedy of Romeo and Juliet," Clifford Leech suggests that there is more to Romeo and Juliet than simply a gloom-and-doom tragedy of two people destined to die for their illicit love. According to Leech, Romeo and Juliet is part romantic comedy, part tragedy, part morality tale in which the moral lesson is learned at the end. But this moral lesson comes with a twist: Since the lovers are dead, their parents experience the consequences of their actions (20). Explanation: In this version, the student communicates Leech's ideas (and cites Leech with an MLA in-text citation), but does not borrow language from Leech. Source: Persad, G.C., Elder, L., Sedig, L., Flores, L., & Emanuel, E. (2008). The current state of medical school education in bioethics, health law, and health economics. Journal of Law, Medicine, and Ethics 36, 89-94. Original Source Material: Indeed, of the more than 3500 hours of instruction during medical school, an average of less than 60 hours are devoted to all of bioethics, health law and health economics combined. Most of the instruction is during the preclinical courses, leaving very little instructional time when students are experiencing bioethical or legal challenges during their hands- on, clinical training. More than 60 percent of the instructors in bioethics, health law, and health economics have not published since 1990 on the topic they are teaching. Plagiarized Version: In order to advocate the use of the sitcom Scrubs as part of the medical education system, it is also important to look at the current bioethical curriculum. Medical school curriculum does not focus adequately on the moral issues that doctors face in the clinic. In fact, in more than 3500 hours of training that students undergo in medical school, only about 60 hours are focused on bioethics, health law, and health economics. It is also problematic that students receive this training before they actually go on to their hands-on, clinical training (Persad et al., 2008). Most of these hours are taught by instructors without current publications in the field. Explanation: The information in [the last sentence of the paragraph] is drawn directly from Persad, but because the student ends the citation of Persad above, this sentence appears to be the student's own idea. Acceptable Version: In order to advocate the use of the sitcom Scrubs as part of the medical education system, it is also important to look at the current bioethical curriculum. Medical school curriculum does not focus adequately on the moral issues that doctors face in the clinic. In fact, according to Persad et al. (2008), only about one percent of teaching time throughout the four years of medical school is spent on ethics. As the researchers argue, this presents a problem because the students are being taught about ethical issues before they have a chance to experience those issues themselves. They also note that more than sixty percent of instructors teaching bioethics to medical students have no recent publications in the subject. Explanation: The student mentions the researchers in each sentence, which makes it clear that all the information in this paragraph has been drawn from Persad et al. The student also uses a clear APA in-text citation to point the reader to the original article. In conclusion, paraphrasing is distilling or summarizing another author's ideas into your own words, while providing appropriate citation to the original source. It is important to evaluate source information critically in order to determine if you are able to paraphrase or summarize the information responsibly. In some instances, it may be more appropriate to provide a direct quotation along with the citation. When in doubt about paraphrasing, use quotation marks. If your words are too similar with those of the original source, a reader may "think that you cross[ed] the line from fair paraphrase to plagiarism" (Turabian, 2013, p. 80). Whether or not the line has been crossed will be decided on a case-by-case basis; since the facts and circumstances of each Honor case are unique, it is impossible to anticipate and describe every example of paraphrasing that may constitute plagiarism. The important question is whether you have represented someone else's ideas or work as your own original ideas or work. Finally, remember, even if you have correctly paraphrased your source—that is, even if quotation marks are not necessary— you must also cite the original source from which you got the ideas or information. Council of Writing Program Administrators (2003). Defining and avoiding plagiarism: The WPA statement on best practices. Retrieved from http://wpacouncil.org/files/wpa-plagiarism-statement.pdf. Honor Committee by-laws as of April 28, 2014. Retrieved from http://honor.virginia.edu/documents. Turabian, K. L. (2013). A Manual for Writers of Research Papers, Theses, and Dissertations, 8th ed. Revised by W. C. Booth, G. C. Colomb, J. M. Williams, & the University of Chicago Press Editorial Staff. Chicago: University of Chicago Press. What constitutes plagiarism (2015). In Harvard Guide to Using Sources. Retrieved from http://usingsources.fas.harvard.edu/icb/icb.do.
<urn:uuid:adc9604a-7e3e-495d-b977-50a27b553107>
CC-MAIN-2022-33
https://honor.virginia.edu/plagiarism-supplement
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00205.warc.gz
en
0.932551
3,971
2.671875
3
Gandhism and Conflicts Of Democracy Gandhism and Conflicts Of Democracy By Dr. Ravindra Kumar Just like being simple in his individual life, Mahatma Gandhi was equally simple in his work and ideas. His personality was neither of the kind of perpendicular nor was it angled. His appeal to the people was always direct. That is why; during his entire lifetime he neither was considered an eminent intellectual in the academic sense of the term, nor was he accepted as a great scholar, thinker and philosopher. However, it is another matter that after his passing away, he became a centre of study and research for so many scholars and intellectuals of both-the East and the West; perhaps the largest number of books and papers are being published today on various aspects of life, works and views of Mahatma Gandhi. Why is it so? Answer to this question is also very simple. It is because the manner, in which he explained the practicability of Ahimsa-the non-violence and placed it as an effective weapon for direct action, was unique in itself. Although, through the ages, Ahimsa-the non-violence, in spite of subsisting in human world in different forms in theory and practice both, was considered merely a personal virtue or a value, especially to be practiced by Rishis, Saints or Incarnations, Messengers of God, and that too in social and religious behaviours, but, it was Mahatma Gandhi, who, perhaps for the first time in the entire human history, declaring it to be a social virtue or a value also, called upon humanity to cultivate it like the other virtues or values in routines. In his own words: “Non-violence is not a cloistered virtue confined only to the Rishis and the Cave-dwellers. It is capable of being practiced by the millions, not with full knowledge of all its implication, but because it is the law of our species. It distinguishes man from the brute. But man has not shed the brute in him. He has to strive to do so. This striving applies to the practice of non-violence [in all walks of life including political], and not [merely] to the belief in it.” Further he states: “Surely society is largely regulated by the expression of non-violence in its mutual dealings. What I ask for is an extension of it on a larger, national and international scale” Mahatma Gandhi, by giving extension and anew dimension to the concept of Ahimsa, declares that purest non-violence is epitomized in having a tendency… towards spiritual or physical benefit unto everyone without selfishness and with pure thought after cool and clear deliberations So, he rightly believes: “The final test as it is violence or non-violence is after all the intent underlying the act.” As the whole world knows, through his political actions, basis of which was Ahimsa-the non-violence, he not only led his compatriots to the door of freedom of their motherland, India, and ensured independence from the centuries old shackles of slavery, but explaining its meaning and purpose in a comprehensive and all-welfaristic way, showed a unique, evergreen and exemplary path to the citizens of the whole world to attain freedom and secure justice at all levels even in democracy. Democracy and Conflicts Since human-freedom, equality of justice and welfare of all are the basic tenets of democracy, no matter if they have not become a reality in toto for each and everyone until now, or if in it the final yardstick of concurrence of the people is majority, in my opinion, it has come to stay as the best way of governing the people politically. Democracy, according to the best definition of Abraham Lincoln, “is the government of the people, for the people and by the people.” In democracy, apart from the presence of above-mentioned tenets, there is a greater possibility of peace in comparison to any other form of the system. It is because people are connected with the system directly as well as indirectly at every level; it provides maximum opportunity to people for progress or development and, above all, in it people can themselves decide the mode of their welfare. And it is for this reason that today a big portion of the world happens to be under democratic system of government. Mahatma Gandhi, who wishes for a stateless democracy fully based upon non-violence, more or less, supports the system of the day on the one hand, and he expresses desires to work continuously for improvement in it until it comes within the domain of Ahimsa on the other. For, improvement is necessary because democracy is a manmade institution, and no manmade institution is out of risk; according to time and space it is a subject to improvement. Democracy cannot be an exception. In Gandhi’s words: “There is no human institution but has its dangers. The greater the institution, the greater the chances of abuse; democracy is a great institution and, therefore, it is liable to be greatly abused.” Now, when all possibilities of abuse are there in a democracy, the state of conflicts in it is also inevitable. Then, how can we get rid of conflicts in a democratic system, and that too, as per the expectations of the Gandhian way in which Ahimsa-the non-violence is nucleus? In my opinion through the maturity of the organs of democracy or the democratic institutions, we can make the democracy healthy. And as much a democracy is healthy as less the possibilities of conflicts in it. This is the first thing that can be proclaimed openly. But, this thing itself raises a question before us and that is how democratic institutions can gain maturity and that too again through the way shown by Mahatma Gandhi? To find answer to this fundamental and very important question it is necessary for us to analyze Mahatma Gandhi’s views about some of the basic tenets of democracy, of which representation and public opinion are of utmost importance. Representation and public opinion, both, play their important role in construction and conduction of democratic government. That is why; Mahatma Gandhi not only held opinion on them but he expressed it exclusively before the world Regarding representation he said: “I hold it to be an utter delusion to believe that a large number of delegates are in any way a help to the better conduct of business, or that it safeguards the principle of democracy. Fifteen hundred delegates, jealous of the interests of the people, broadminded and truthful, would any day be better safeguard for a democracy than six thousand irresponsible men chosen anyhow. To safeguard democracy the people must have a keen sense of independence, self-respect and their oneness, and should insist on choosing, as their representatives, only such persons as are good and true.” No doubt, following two concrete points pertaining to representation, along with their importance in the system, are quite clear in the above statement of Mahatma Gandhi: - Consciousness in people for democracy and the role of representatives in it is absolutely necessary; and - Full care in choosing representatives for conduction of the system. He does not consider the number of delegates as important. Rather, he prefers those representatives, who may fulfill needs of people for their welfare to the maximum possible extent, no matter if they are few in number, because people’s interest is the main spirit of a democracy. Secondly, it is healthy and mature public opinion, which controls the state and the government. So, if the system is to be kept healthy, it is only going to be possible through healthy public opinion, repudiation of which is quite difficult by the state. In the words of the Mahatma himself: “A popular state can never act in advance of public opinion; if it goes against it, it will be destroyed.” No democracy can be successful without healthy criticism; well-informed, balanced and matured criticism is the backbone of public life there. In the absence of critical analysis, there is an apprehension of losing the real form and feature of democracy. Therefore, there is always a need to make the people conscious; what public want, there is the need of making the people in the government familiarized in this regard. Even then, if the government does not work in accordance with aspirations of people then those resuscitating it, must be aware of their strength. The state or the government cannot even for a moment exist without the wish of public opinion. How can a healthy and matured public opinion be generated? According to Mahatma Gandhi it is possible only through the right education. That is why; emphasizing on right and true education he points out that if no right education is imparted, public opinion can go in reverse order. And in such a situation it would be very difficult to tolerate it. To quote Mahatma Gandhi himself: “Healthy public opinion has an influence, of which we have not realized the full significance…Public opinion becomes intolerable when it becomes violent and aggressive.” Majority and Legislation The principle of majority, as we know, plays the key role in a democratic form of government; the scale of the establishment of democracy is the decision of the majority. In such a situation whatever majority decides, should it be accepted? Mahatma Gandhi says that to an extent the decision of majority should be surely taken for granted; one should yield to majority in matters of details. But, there is no place for autocracy in democracy even if it of the party in absolute majority. Individual freedom of each and everyone must be cautiously protected in democracy. In case individual freedom is not protected or if it is violated then, Mahatma Gandhi holds: “Minority has a perfect right to act differently from the majority.” In spite of the principle of majority applied in democracy of the day, Mahatma Gandhi desires cooperation of the both-majority and minority-to establish an ideal society completely free from exploitation. For this he suggests: “Let us not push the mandate theory to ridiculous extreme and become slaves to resolution of majorities. That would be a revival of brute force in a more virulent form. If rights of minorities are to be respected, the majority must tolerate and respect their opinion and action…It will be the duty of the majority to see to that the minorities receive a proper hearing and are not otherwise exposed to insult.” He also suggests: “Claiming the right of free opinion and free action as we do, we must extend the same to others. The rule of majority, when it becomes coercive, is as intolerant as that of a bureaucratic minority. We must patiently try to bring round the minority to our view by gentle persuasion and argument.” To ascertain the above suggestions of Mahatma Gandhi, it is necessary that before any legislation, intended to be brought into force, it should be patiently deliberated upon; it must be kept in mind that democracy demands patient instruction in it before legislation. Rights and Duties Equal rights to all are expected in democracy; in the absence of which there can be no enjoyment of freedom. If freedom, which in concrete terms according to the Mahatma is the interdependence in political, economic and moral spheres also, is to be shared equally by all, without any kind of discrimination, and even by those who are physically weak, the lame and the hailed, they must be able to contribute equally in its maintenance. But, simultaneously, in order to acquire rights, each and everyone is supposed to perform his/her duties. That is why; Mahatma Gandhi says that the true source of a right is duty. In other words, if someone discharges his duties, rights are not far from him. He also rightly points out that if someone having duties unperformed runs after rights, they escape him like a will of the wisp; more he pursues them, the further will they fly. In his own words: “If instead of insisting on rights everyone does his duty, there will immediately be the rule of order established among mankind.” “Rights that do not flow directly from duty well performed are not worth having.” Equality is placed at the highest state in a democracy; but rights also cannot be the exception of it. If there are no equal rights for each and everyone, there is no possibility of proportionate progress, and in such a state no democracy can survive for a long. It is a well-known fact. So, before having a desire to acquire rights, everyone should be ready to perform his/her duties. It is the best way even to strengthen the edifice of democracy as well as to run it on the path of Ahimsa-the non-violence shown by Mahatma Gandhi. Justice and Punishment When being a manmade institution democracy cannot be free from conflicts, how can it be free from crimes? An individual commits small or bigger crimes, no matter if generally this term is used for a legal crime. Now, if there is a crime, and if it is established, there should definitely be provision of punishment for it. But, how much should it be and what type of it should be met out in a democracy to accord justice to all concerned? In this regard Mahatma Gandhi holds his own different views and certainly the root of them can be found in his commitment for non-violence as we can presume it from his important following comment on redemption: “I do not seek redemption from the consequences of my sin; I seek to be redeemed from sin itself or rather from the very thought of sin. Until I have attained that end, I shall be content to be restless.” No doubt, a human being commits sin intentionally and unintentionally as the dealings of the world are such that it is impossible for a human being to get wholly rid of sins. If so then certainly one has to bear consequences of sins. Hence, for commission of crime, the provision of punishment is too utmost essential. But it must be of such a nature that could accord an opportunity to a wrongdoer to reform and amend him/her in the future. It is fully within the scope of Gandhian philosophy as also a step forward in direction to make democratic institutions matured and healthy and ultimately to strengthen democracy. Mahatma Gandhi is of the firm opinion that as the possibility of reform and improvement exists in every human being; he/she must not be deprived of reforming and improving him/herself. And that is why; he is in support for abolishing the provision of capital punishment altogether. Now, the conclusion we draw from the above analysis is this that democracy, which is not the exception of drawbacks-though temporary in nature, smaller or bigger-in the same manner as the other walks of human life, can be made free of them to a large scale, if not completely as per the wish of Mahatma Gandhi, through its mature and healthy organs or institutions. In this regard utmost need is of awakening among the masses and making the system responsible in practice as much as possible; in it there must be all possibilities and provisions for reforms at all levels. In fact, reforms are the signs of development. An institution like democracy depends on reforms much more in comparison to others, because its responsibilities are far greater than any other political institution to achieve its goal, if not fully then to maximum possible extent. So, Mahatma Gandhi’s simple suggestions to make different organs of democracy matured and healthy are worth giving a thought; through them, definitely, there are all possibilities of its growth in strength. And no doubt, a deep rooted or strengthened democracy can, more or less, accord well to all; it can grant considerable relief to people from conflicts. Dr. Ravindra Kumar is a universally renowned Gandhian scholar, Indologist and writer. He is the Former Vice-Chancellor of the University of Meerut, India and the author of the book entitled, ‘Theory and Practice of Gandhian Non-Violence’.
<urn:uuid:6f424bb1-8e19-4b3a-9269-1ce0ae1f2b9a>
CC-MAIN-2022-33
https://www.scoop.co.nz/stories/HL0710/S00350/gandhism-and-conflicts-of-democracy.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00005.warc.gz
en
0.964815
3,333
2.9375
3
When the steam clears The Fukushima crisis will slow the growth of nuclear power. Might it reverse it? FEAR and uncertainty spread faster and farther than any nuclear fallout. To date the crisis at the Fukushima Dai-ichi nuclear plant in Japan, laid low by the tsunami of March 11th, seems to have done little if any long-term damage to the environment beyond the plant's immediate vicinity or to public health. In fits and starts, and with various reverses, the situation at the plant has come closer to being under control. But the immediate crisis is far from over. The temperature of the three reactors with damaged central cores still fluctuates and water systems for the spent-fuel pools are jury-rigged at best. Contaminated food has been found a disconcertingly long way away, although it seems to be being kept out of the food chain. There are worries about tap water in distant Tokyo. There will certainly be more durable effects too. Years of clean-up will drag into decades. A permanent exclusion zone could end up stretching beyond the plant's perimeter. Seriously exposed workers may be at increased risk of cancers for the rest of their lives (which may nevertheless be long). A concern for the long term, like uncertainty and fear, is one of the things that nuclear power invariably brings to discussions of future energy. To a lot of environmentalists, the priority is to get nuclear power out of those discussions once and for all. Simply put, you can't trust the stuff. Somewhere, eventually, reactors will get out of control. One did at Three Mile Island in Pennsylvania in 1979. One did at Chernobyl in 1986. Now three have done so again, and an argument that had seemed to be running short of puff (Chernobyl's 25th anniversary comes up in April) is revived. Though this disaster has been nothing like as bad as Chernobyl, it is in some ways a lot worse than Three Mile Island—a bit like three Three Mile Islands in a row, with added damage in the spent-fuel stores. Fukushima Dai-ichi, it is true, was swamped by a natural catastrophe of biblical proportions. But this argument cuts both ways. Nuclear planners clearly did not appreciate how bad things could get on a low-lying coast in a seismic zone; and poor planning is part of the problem. One reason why Japanese confidence in nuclear power had been growing in recent years was that past scandals led to resignations and the prospect of reform among planners, power companies and regulators. Whereas in 2005 only a quarter of people felt nuclear energy was safe, by last year more than 40% did, according to a survey by Japan's Cabinet Office. Finding sites for new reactors was not proving easy—and old reactors stayed online as a result—but it did not seem impossible. Elsewhere, too, the industry was reviving. Figures from the World Nuclear Association, a trade body, have shown more capacity planned and proposed than on the ground. Now much of this expansion looks likely to be curtailed. Even the replacement of reactors may be in question. When last year a volcano closed the skies over Europe and a blown-out oil-rig turned the Gulf of Mexico black, there was no widespread enthusiasm for giving up oil or air travel. But nuclear power is much less fundamental to the workings of the world than petrol or aeroplanes. Nuclear reactors generate only 14% of the world's electricity, and with a median age of about 27 years (see chart) and a typical design life of 40 a lot are nearing retirement. Although the world is eager to fly and thirsts for oil, it has had little appetite for new nuclear power for the past quarter of a century. This is not just the direct result of Chernobyl. New nuclear plants cost a great deal of money. After Fukushima they are likely to cost even more, thanks to extra uncertainty in licensing and approval if nothing else. Another problem now made manifest is that if operator error or shoddy construction causes a reactor of the same design as yours halfway round the world to go wrong, yours may be shut down too. This is not a merely theoretical possibility. Seven German nuclear reactors which were officially safe until mid-March have been shut down. It is widely thought that at least some will not open again. And if that happens, Germany will not suffer much. While the nuclear industry has stalled since Chernobyl, natural gas and renewables have come on impressively. German electricity prices would probably go up, depending to some extent on the price of gas and carbon, because although new nuclear plants are expensive, old, depreciated ones make cheap electricity. But it would not be the end of the world. The 14% solution Nuclear power thus looks dangerous, unpopular, expensive and risky. It is replaceable with relative ease and could be forgone with no huge structural shifts in the way the world works. So what would the world be like without it? The most obvious answer is: a bit warmer. In 2009 the world's electricity generators emitted about 9 billion tonnes of carbon dioxide, out of an industrial total of 30 billion tonnes and a grand total, including deforestation and the effects of other gases, equivalent to some 50 billion. Without nuclear power and with other fuels filling in its share pro rata, emissions from generation would have been about 11 billion tonnes. The difference is roughly equal to the total annual emissions of Germany and Japan combined. To put that in perspective, in 2010 the UN Environment Programme estimated that for the world to have a reasonable chance of limiting global warming to less than 2°C, carbon-dioxide emissions should be reduced to 44 billion tonnes by 2020. With business as usual, emissions would be between 54 billion and 60 billion tonnes. If countries took the most ambitious of the courses of action that they have outlined to the UN, the figure comes down to about 49 billion tonnes, leaving an “emissions gap” of 5 billion tonnes that seems highly unlikely to be bridged. So the 2 billion tonnes saved by nuclear power is not vast, but it is significant. That said, a complete withdrawal from nuclear energy is not on the cards. Though China, which has 77 reactors at various stages of construction, planning and discussion, has said it will review its programme in the aftermath of Fukushima, few expect it to stop entirely. China has a great appetite for energy, which will continue to grow. For now its energy sector is highly concentrated on coal, but so that the country can both diversify and clean its air China's latest five-year plan aims for growth in all sorts of non-coal energy, including wind power, gas and nuclear. Adverse public opinion and the additional cost of capital caused by uncertainties over regulatory approval have much less salience in China than elsewhere. Some other countries will also go ahead: Russia says it sees no reason to stop work on ten reactors that are in development. But there could still be a widespread withdrawal from the technology by OECD countries, caused by national changes in policy or stiffer local opposition. And grand though China's ambitions are, for now OECD countries produce more than 80% of the world's nuclear electricity. Analysts at Société Générale, a French bank, argue that if these rich countries built no more reactors and allowed existing ones to close at the end of their planned lives, an extra 860m tonnes of carbon a year would be emitted, on average, from 2010 to 2030. This may underestimate the impact on the system as a whole, because nuclear plants and large dams are the only broadly reliable sources of baseload electricity that do not burn fossil fuels. Although renewable capacity has been added quickly in some countries, you cannot be sure that the wind will blow or the sun will shine to order. A fair part of this can be smoothed out if the various sources are linked into an electric grid that is sufficiently large, robust and smart, but that does not obviate all the need for baseload. Most studies assume that in a fully decarbonised electricity system the baseload would come either from nuclear or from fossil-fuel plants fitted with carbon capture and storage (CCS) technology. However, CCS has yet to be demonstrated on anything like the necessary scale, so deploying enough of it to replace existing and expected nuclear plants is a tall order. And a public that was turning against hubristic nuclear engineering might also object to the large-scale storage of a potentially asphyxiating gas beneath the ground, which CCS requires. This “numby” (not under my back yard) attitude has already affected some pilot projects. Damn Vermont Yankee America, which leads the world in installed nuclear power, may lead the world in turning away from the technology, too. In 2007 Congress agreed to provide loan guarantees for nuclear power; some 28 applications for new stations have since been filed. Barack Obama pledged in his state-of-the-union address in January 2010 to build a “new generation of safe, clean nuclear power plants”. Even before Fukushima, though, this was looking increasingly unlikely. The recession hit demand. Ever-more-available shale gas brought a cheap and reliable alternative route to domestically fuelled electricity. And the lack of climate legislation meant there was no price on carbon, which would have favoured nuclear power. There are just two new American reactors under construction, neither with full regulatory approval (a third, approved under an earlier system and then put on ice, is also under way). Few in the industry expect many more. Applications for around 20 plants to extend their licences are before the government and requests for 15 more are expected shortly. The Nuclear Regulatory Commission has already granted them to 64 plants, most recently on March 21st to Vermont Yankee, which is of the same design and vintage as the Fukushima reactors. This similarity has not been lost on the Vermonters trying with renewed vigour to shut it down. Expect more local opposition in years to come. In Japan, where nuclear power provides 30% of the country's electricity, the debate may be more complex than outsiders imagine. Japan's nuclear anguish stems more from the way the industry is run than from its technological essence. The Japanese are angry at bureaucrats and TEPCO, the company that owns Fukushima Dai-ichi, for a long record of shoddy safety standards and cover-ups. “Amakudari kills,” tweeted a well-known reformer recently, referring to the “descent from heaven” of senior bureaucrats to cushy jobs in industries they used to regulate. So although Japan may phase out a lot of older reactors, the public may tolerate nuclear power in the form of new, better plants with management it trusts. In the European Union Austria, Denmark, Greece, Ireland and Portugal are strongly anti-nuclear, but the EU as a whole is unlikely to go their way. Its response to Fukushima has been to call for “stress tests” of its members' reactors. Britain, the Czech Republic and Finland hope soon to build some more. Finland and France, which produces more of its electricity in nuclear plants than any other big country, each have under construction a plant of the European Pressurised Reactor (EPR) design developed by AREVA, a French industrial group. Plans may be delayed or diminished, but a complete halt to building is unlikely. France, in particular, seems certain to remain resolutely pro-nuclear. The French nuclear industry may even see Fukushima as an opportunity. The EPR is touted as being especially safe: if concerns about safety could be turned into a regulatory case for building only EPRs in Europe, so much the better. The British, Czechs and Finns, who are all also looking at a design by America's Westinghouse (the Finns are examining a South Korean one, too), would not be keen to be captive customers, but they may choose EPRs anyway. The most labile European country on matters nuclear has, not surprisingly, been Germany, where great engineering and anti-nuclear sentiment have long coexisted uneasily. In 2002 the then centre-left government said it would phase out nuclear power by 2022. Last year the current, centre-right lot extended the lives of seven ageing reactors by eight years. In response to Fukushima it shut them again, at first for three months. Explore our interactive guide to nuclear power around the world Some or all of those plants may not reopen. If none did, then according to Stefan Wächter of Point Carbon, a research firm, German carbon-dioxide emissions would increase by 435m tonnes in the decade to 2020. Analysis by Deutsche Bank suggests that at least 23 gigawatts of new gas-fired capacity would need to be built by the same year. Gas-fired plants are the natural short-term response in part because Germany's grid cannot take much more in terms of renewables (of which the country already has a lot) both because of their peaks and troughs and because some would need to be offshore. That said, demand for renewables elsewhere might increase, as Germany's extra use of fossil fuels pushed up the price of carbon in Europe's emissions-trading scheme. In its likely switch to gas, Germany reflects the probable post-Fukushima world. In any country where nuclear provides less electricity than had been expected, in the near term gas is favourite to make up the shortfall. Société Générale's analysis suggests that a full withdrawal from nuclear by OECD countries would increase demand for gas by more than 400 billion cubic metres a year by 2045. In America and Canada the nuclear slack could be taken up by domestically produced gas, Société Générale reckons, reflecting the sheer scale of the shale-gas revolution there. The rest of the world would either buy liquefied natural gas (LNG) or get gas in pipelines, a prospect that relations with Russia have made irksome to some. Energy-security concerns partly explained why Germany decided to delay its phasing out of nuclear plants. Now it and other European countries may buy a lot more Russian gas. To Russia one of the attractions of continuing with nuclear power is that it frees gas for export. Yet a gassier Europe may not need to worry too much about security of supply. At least in the near term there is plenty of LNG because capacity originally intended to serve America is no longer needed for that purpose. This is good news for Europe and for Japan, which in the short run needs gas and oil to make up for lost production at Fukushima and other nuclear plants closed in the earthquake's aftermath, regardless of its long-term choices. Some expect this surplus to last throughout the 2010s, as new sources become available. Others fear, or hope, that the market could tighten quite quickly. Paul McConnell of Wood Mackenzie, another research firm, has argued that for China to meet a pledged 40% reduction in the carbon intensity of its economy by 2020 would require a lot more gas than currently expected. If nuclear plants contribute less, that will be truer than ever. But though gas supply may tighten, there is still, by all estimates, a lot of it around for the medium to long term. In the long term we're not all dead Gas would be an early winner in a less nuclear world. But renewables might also do well. When cheap and plentiful gas replaces coal in electricity generation, it often reduces emissions much more cheaply than renewables can. But when gas replaces nuclear, it increases emissions. Any country serious about tackling climate change will therefore want more fossil-fuel-free generation elsewhere in the system. Renewables would have a clearer run at that segment of the market. Distressing though it is, the crisis at Fukushima Dai-ichi is not in itself a reason for the world to change energy policy. The public-health effects seem likely, in the long run, to be small. Coal, with its emissions of sulphur, mercury and soot, will continue to kill far more people per kilowatt hour than nuclear does. But as an opportunity to reflect it may be welcome. An energy portfolio, like any other, is a basket of risks: of security of supply, cost and environmental damage. Fear and uncertainty, which nuclear fission produces as unavoidably as it does iodine-131, distort people's perceptions of those risks. The long-term outlook which nuclear power also brings with it should clarify them. Over the next 40 years, four things look clear. The world's people would be healthier and its climate less prone to change if it used a lot less coal; that requires greater energy efficiency, more renewable power and better grids, all of which also allow greater energy security; significantly more research would help; and the supply of gas is much larger and more reliable than was thought just ten years ago, which will lower the costs of change. Because nuclear power saves carbon, doing without it would make action on climate harder. But because it increases capital costs and systemic risks, it would rarely have grown that much anyway outside a few countries. It won't go away, but it must to some extent remain a sideshow, however spectacular it looks when it goes wrong. This article appeared in the Briefing section of the print edition under the headline "When the steam clears" From the March 26th 2011 edition Discover stories from this section and more in the list of contentsExplore the edition And it is putting his acolytes into offices that control elections It will not be easy to handle That is why his country is such a threat to Ukraine, the West and his own people
<urn:uuid:900a33ec-8d95-44e8-838c-3ddfbeeca206>
CC-MAIN-2022-33
https://www.economist.com/briefing/2011/03/24/when-the-steam-clears
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00403.warc.gz
en
0.963032
3,615
3.046875
3
Whether you are the owner of a puffer fish or considering getting one, it is a good idea to know all you can about the lifespan of a puffer fish. After all; this knowledge can help you take better care of your pet and may even help it live longer. In this guide, we will discuss the lifespan of a puffer fish as well as tips on keeping a pufferfish as a pet. - Can You Keep a Puffer Fish as a Pet? - How Long Do Puffer Fish Live in Captivity? - Tips to Increase PufferFish Lifespan - FAQs – The Lifespan of A Puffer Fish - Wrapping Up – The Lifespan of A Puffer Fish Can You Keep a Puffer Fish as a Pet? Yes, you can keep pufferfish as pets. However, taking care of pufferfish is not easy since they have unique requirements. Pufferfish only make good pets for someone who is highly experienced in keeping these delicate fish as pets. Potential puffer fish owners need to do careful research before keeping one as a pet because these are no ordinary fish. Many countries are known to ban the sale of pufferfish for recreational and commercial purposes. They are also banned as food in most US restaurants. So, before you buy a puffer fish, please do your research about local legal requirements. You might even need a special license if you plan to keep a puffer as a pet or breed it. The spikes of puffer fish are known to carry a deadly toxin called tetrodotoxin. This toxin is 1200 times more poisonous than cyanide. If the puffer fish bites you or its spike cuts into your skin, you could become sick. They display the unique behavior of puffing up when scared or threatened. This can stress their bodies and many even die after they puff up. Puffers also do not have scales like other fish. Instead, they have a slimy layer with spikes on their backside. This delicate slimy layer can get disturbed if you touch it making the fish susceptible to bacterial infections. Pufferfish are rather unique in terms of behavior, diet. They need high-quality foods with shells such as crabs, shrimp, live snails, etc. This is because they have sharp teeth or beaks that grow continuously. To keep their teeth toned down, they need these hard shell foods. Finding human-grade shell food can be expensive. But, without this diet, your pet won’t thrive. Its teeth could also cut into its tender mouth causing injuries that may need medical attention from an aquatic veterinarian. How Long Do Puffer Fish Live in Captivity? The average lifespan of puffer fish is about 10 years. This is applicable to captive or pet pufferfish. Wild pufferfish tend to live a lot longer. Pet pufferfish have stringent dietary and other needs, which is why they do not make good pets for novice fish keepers. No one knows for sure how long puffers live in the wild. But, it is quite likely that they may live longer than 10 years in their natural environment. If you plan to keep a puffer as a pet, you need to understand that 10 years is a long time and you need to be committed to taking care of it for the duration. What are the Factors Affecting the Lifespan of a Puffer Fish? There are different actors affecting the life of pufferfish in captivity and in the wild since both environments are significantly different. In the wild Polluted oceans, loss of habitat, and overfishing are the main culprits causing a decline in puffer fish numbers. - Oceanic pollution reduces the natural food of puffer fish. Escalating chemical levels in the sea are threatening the aquatic food chains and there is no doubt that the pufferfish is also affected. - In many Asian countries, puffers are a delicacy. Japan alone eats 10,000 tons of puffer fish each year. In China too, pufferfish are being eaten into extinction. Improper handling, bad diet, and a general lack of knowledge can impact a puffer fish’s lifespan in an aquarium. - Touching the fish causes them to swell up which is stressful for them. - It could disturb the natural slime on their skin making them susceptible to bacterial diseases, ich, etc. - As mentioned before, puffers need human-grade hard-shell diets. Without it, their teeth continue to grow and your pet may end up with oral infections. - Without a proper diet, your pet will not thrive. - Many novice breeders breed their puffers indiscriminately with the view of selling the offspring to make money. This can cause disease and death. The resulting fish spawn is not healthy and also prone to diseases. Improper housing conditions - Puffers need proper water parameters like temperature, ammonia, nitrites, and nitrates. They also need specially conditioned water having optimum pH. - Without these conditions, they could get sick and even die. - Often, people house puffer fish with other tank mates. This could stress out these delicate fish as they may feel threatened by them. How Old is the Oldest Pufferfish? If you go to certain forums, you might find pufferfish owners claiming their pets to be over 10 years old. There is one YouTuber who claims to have a 16-year-old puffer fish. (Fast-forward the video to about 4:25 to see it!). Sometimes pet owners cannot say for sure how old their puffer fish actually is. This is especially true if they have bought their puffer from an aquatic pet shop or an online store. After all; the storekeeper may not have accurate information about the fish’s age. Only if you have raised your puffer right from its birth, can you tell its age for sure. Are Puffer Fish Endangered? Since puffer fish are toxic creatures, they are not endangered. Most populations of pufferfish are stable. However, certain species are vulnerable. Pollution, overfishing, and habitat loss are the factors affecting the puffer fish population. According to The Puffer Fish by Alicia Z. Klepeis, species like the Tetraodon Pustulatus which is only found in the Cross River in Nigeria and Cameroon, are threatened due to habitat loss. Scientists worry that oil exploration in the region is harming this species. Similarly, the Chinese Pufferfish has been marked by the IUCN (International Union for Conservation of Nature) as critically endangered. Its population has declined by almost 99.9% over the past few years thanks to its being one of the 4 varieties of pufferfish/fugu consumed as sashimi in massive amounts in Japan. Tips to Increase PufferFish Lifespan You can take several steps to increase your puffer fish’s lifespan. These include selecting a hardy and healthy puffer, setting up the right environment for it, and providing it with the best of care. Tips to Select a Healthy Pufferfish - Buy your puffer fish from a reputed breeder. Get recommendations from an aquatic vet or from fellow pufferfish owners regarding good breeders. Online forums are also good places to start your search for good pufferfish breeders. - If you opt to buy your puffer from a shop, ask several questions to the store-keeper. If they cannot answer your questions regarding its care, steer clear of such a shop. - Healthy pufferfish cost between $50 and $75. If a store or breeder is selling one for less than this price, then it is a red flag. - Observe the fish carefully before buying. Its skin should be healthy. There should be no signs of ich on it. Ich is characterized by white spots all over the pufferfish’s body. - Your pet should appear happy, active, and swimming around gleefully. It should also appear round, alert, and bright, and not show signs of malnourishment or ill-health. Setup an Ideal Tank Once you get your fish home, invest in a good tank setup. A good tank for puffer fish has the following features: - For a small puffer, the tank should be at least 20-30 gallons in size. For a large pufferfish, the tank should be around 100 gallons. - Most freshwater puffers need a pH of 7.0-7.6 and a water temperature between 74 and 78 F. Saltwater puffers may require aquarium salt added to their water. - All other water parameters like water hardness and currents will depend on the exact species of puffer fish. Make sure you research your particular species well and set up the tank accordingly. Irrespective of the species you own, make sure to test the water regularly. You must also clean the tank from time to time. API FRESHWATER MASTER TEST KIT 800-Test Freshwater Aquarium Water - Contains one (1) API FRESHWATER MASTER TEST KIT 800-Test Freshwater Aquarium Water Master Test Kit, including 7 bottles of testing solutions, 1 color card and 4 glass tubes with cap - Helps monitor water quality and prevent invisible water problems that can be harmful to fish and cause fish loss - Accurately monitors 5 most vital water parameters levels in freshwater aquariums: pH, high range pH, ammonia, nitrite, nitrate - Designed for use in freshwater aquariums only - Use for weekly monitoring and when water or fish problems appear Last update on 2022-08-04 / Affiliate links / Images from Amazon Product Advertising API Provide it with Proper Care Once your puffer fish has settled down, you need to provide it with regular care and maintenance. - Feed your puffer based on its species. Most puffers need a diet of shell animals like slugs, snails, shrimp, etc. to keep their teeth healthy. - For the reasons explained above, please avoid touching your puffer fish and instruct children about the same. Never pop an inflated puffer fish- it could die. - Do not bring your puffer out of the water for prolonged periods of time. Puffer Fish as Pets. Freshwater Puffer Fish Facts - Lang, Elliott (Author) - English (Publication Language) - 138 Pages - 03/05/2013 (Publication Date) - IMB Publishing (Publisher) Last update on 2020-09-26 / Affiliate links / Images from Amazon Product Advertising API Educate Yourself About Pufferfish Diseases and Remedies Stay up to date with the latest knowledge about the particular species of pufferfish you own. - Monitor your fish from time to time. - Watch out for any abnormal behavior. If you see signs of illness, please contact an aquatic vet right away. Remember: many minor diseases in pufferfish can be controlled and treated with prompt medical treatment. FAQs – The Lifespan of A Puffer Fish How long do giant puffer fish live? The giant puffer fish or Tetraodon mbu is a freshwater puffer that grows up to 26 inches in length. It is known to live up to 10 years in captivity and a little longer in the wild. Can you put 2 puffer fish together? Species such as the dwarf, redeye, and golden puffers are known to co-habituate peacefully in an appropriately sized tank. However, most puffers are OK being solitary beings and do not need much company to be happy. Can puffer fish survive out of water? If a puffer fish comes out of the water, it might swallow large amounts of air and puff up. This could result in its death so it is best not to bring it out of the water at all. Wrapping Up – The Lifespan of A Puffer Fish The lifespan of a well-cared-for puffer fish is around 10 years in captivity. Some people claim their pet puffers are older than 15 years of age. In the wild, its lifespan is longer. However, many wild puffers fall prey to predators like tiger sharks. Also, factors like overfishing, habitat loss, and pollution are reducing pufferfish populations. We hope this guide helps you take good care of your pet puffer fish.
<urn:uuid:bae61f0e-46d0-4c44-bf1f-a1b7d3803b7d>
CC-MAIN-2022-33
https://uniquepetswiki.com/lifespan-of-a-puffer-fish/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00206.warc.gz
en
0.941775
2,633
2.515625
3
|MadSci Network: Evolution| That’s a very astute question. Differences in chromosome number seem to be one form of barrier to inter-breeding between individuals of related species, but as I think you will see below, some differences in chromosome number might just be coincidental with some other species barrier. First of all, what is a chromosome? A chromosome is a large structure composed of DNA, RNA and protein, which serves as the storage medium for some or all of an organisms genetic information (in the form of DNA). Even though there are RNA molecules and proteins associated with the protein, each chromosome is organized along a single very long DNA molecule. The number of chromosomes you have is called your "ploidy" number (n). So if you have two of every chromosome (in pairs for example), you are diploid (2n), because "di" means "two". If you have three, you are triplod (3n), and if you have four you are tetraploid (4n). If you only have half of each pair, you are haploid (n). The collection of all of your chromosomes is called the genome. Eukaryotes (plants, animals, and fungi) have two copies (called chromosome pairs) of each chromosome in their cells, and when these organisms reproduce, they line their paired copies up together and duplicate them, and the duplicates are separated from the originals. Now, lets look at some of the mechanisms that can generate changes in chromosome number. First off, you have to remember that differences in chromosome numbers are largely relative. This is because we have to compare closely related species to recognize changes in chromosome numbers. If one species has 22 pairs of chromosomes and a second, closely related species has 23 pairs of chromosomes, it is difficult to say if the first species 'lost' a pair of chromosomes or if the second species 'gained' a pair. The only way to be sure what happened is to look at numerous species which we assume are all descended from a recent common ancestor, and then assume that the most common chromosome number was the same in the ancestral species, from which all the others are descended. When chromsome pairs duplicate, they first line up along side one another and exchange parts in a process called, "cross-over". An cartoon model of this is shown below. In this figure, the red and blue boxes represent chromosomes in a pair (part A). The "cross-over" and the cross-over point can move up and down the length of the chromosome, as shown in B. If it does not go all the way to the end when the chromosomes are separated, then they will have exchanged some sections, as you can see in part C. |Figure 1 : Cross-over| When complex eukaryotes like humans replicate, we create specialized cells ("gametes", known as sperm and ovae) that have half as many chromosomes as the rest of our cells. Instead of having a pair of each chromosome, these gametes only have one of each chromosome. Gametes form to fuse cells that have pairs of chromosomes, half of each pair comes from a sperm, and the other half from an ovum. When new chromosomes are being made, on very rare occasions, the new copies will fail to separate (or "disjoin") from the original copy. When this happens, one gamete will get an extra copy of the chromosome that failed to disjoin, and the other gamete will get no copy. This is called a non-disjunction. In this case, the sperm that got two copies will fuse with an ovum that had one copy, and the resulting cell would have three copies of that chromosome. Usually, having an extra copy of a chromosome due to a non-disjunction is fatal, and the cell dies. In the three or so billion years that eukaryotes have been around, some organisms with non-disjunctions managed to survive by finding new uses for the genes on that extra chromosome. Of course, this begs the question of who you mate with when you have a different number of chromosomes, and I will get to that later. Another way to increase your chromosome number is by duplicating all of your chromosomes, in a sort of whole genome non-disjunction resulting in polyploidy. This seems to work alright for plants, but for animals, this is very very rare, because of the way animals reproduce, as you pointed out above. However, there many examples of tetraploid (4n) and hexaploid (6n) insects, triploid and tetraploid fish (Catfish, Cyprinids and Carp), and even a hexaploid fish (a subspecies of the tetraploid Carp). There are also several tetraploid species of claw-toed frogs, and even a tetraploid rat (the red viscacha rat, or Tympanoctomys barrerae)! In the case of this rat species, the number of chromosomes (102) is much lower than you would expect by looking at closely related rat species. Based on these relatives, you would expect the tetraploid rat to have 112 chromosomes, which brings us to the next mechanism for changing chromosome numbers. Translocation is what happens when two chromosomes that are not part of a pair get stuck together as if they were a pair, and exchange segments. If the segments that get exchanged are large enough, you can have most of both chromosomes moved onto one single chromosome, as shown below. In this figure, the blue and red boxes are cartoons of two different chromosomes. The black dots in their centers represent the "centrosomes" where the cell attaches filaments that drag the chromosomes around. When these chromosomes cross-over, the result is two chromosomes are very different size. One larger chromosome, contains almost all of the genetic material of the two chromosomes, while the other smaller chromosome contains almost none. In this example, the material from one chromosome has been moved or "translocated" onto another chromosome. In dramatic cases like this one, the resulting tiny chromosome is usually lost, and the resulting chromosome count is reduced by one. |Figure 2 : Translocation| This is probably what happened during the evolution of the apes. All three species have very similar chromosomes, but humans have 23 pairs of chromosomes, while chimpanzees, gorillas, and orangutans have 24 pairs. Each end of human chromosome number 2 (the second largest human chromosome) looks very similar to the long end of a pair of gorilla or chimpanzee chromosomes, suggesting that the common ancestor of these three species had 24 chromosomes and that humans lost one chromosome due to translocation sometime in the six million years that have passed since that ancestral species lived. Barriers To Interbreeding Now differences in chromosome number do not serve as reproductive barriers between all species. For example, lets look at some of the equine species ( horses and donkeys). Domesticated horses have 32 pairs of chromosomes and Donkeys have 31. Yet, they can produce offspring, mules, which have 31.5 pairs of chromosomes. One of the horse chromosomes goes unpaired. Wild mountain zebras have 16 pairs of chromosomes, while the last species of wild horse (Przewalski's Horse) has 33 pairs. However, all of these equine species can produce hybrid offspring. In all of these crosses but one, the offspring are sterile. It has long been argued that this sterility is due to the difference in chromosome number, but hybrids of the wild (33 pairs) and domesticated horse (32 pairs) are fertile, and have 32.5 pairs of chromosomes. So clearly, something more than just differences in chromosome number is contributing to the species interbreeding barrier. So, you've got a new chromosome… Now Dan, you asked a very astute question, which was how individual organisms that have undergone non-disjunctions or translocations and survived manage to reproduce. Well, in some cases, as is likely with the equine species, the translocated segments of different chromosomes are still able to pair up and cross-over even though there might be more than two centromeres involved. An example of this is shown in the figure below, where the two upper chromosomes could have come from a wild horse with 33 pairs of chromosomes, while the bottom chromosome could have come from a domesticated horse with 32 pairs. If this were possible, a population of horses with 32, 32.5, and 33 pairs of chromosomes would develop, and the difference in chromosome number to might eventually come to reinforce behavioral, physical or biochemical differences (like the differences between horses and donkeys) between horse types, resulting in a barrier to interbreeding between species. |Figure 3 : Pairing between translocated and non- translocated chromosomes| However, not every pair of closely related species can interbreed as easily as the equines can. What happens when you have a translocated chromosome or an extra non-disjoined chromosome, and most of the hybrid offspring with your non-translocated relatives are sterile, or even completely inviable? In that case, the only candidates you have to mate with are your siblings and your own offspring, and your offspring with their siblings and their offspring. In this case, the only solution, the only way to successfully reproduce, is by inbreeding. This is probably what happened early in the evolution of our own species. If you look at the estimates of genetic diversity for our own species and compare these values to our closest relatives, the gorillas and chimpanzees, you will see that the entire human population, all six billion of us, have about the same genetic diversity as a population of chimpanzees. Even though it might seem like we are all very different from one another, genetically, we are a very highly inbred species, probably in part because our most distant ancestors had no one to breed with but their close relatives. So, to wrap up, changes in chromosome number are not really caused by mutations. Mutations are changes to the DNA sequence that occur during DNA replication and repair. Some people might argue that translocations result in large additions and deletions of DNA sequence, but that is not what people are generally referring to when they use the term mutations. Instead, changes to chromosome numbers are brought about when errors occur in the process of chromosome duplication (of which DNA replication is only a small part). Finally, it seems like changes in chromosome number are not the ultimate barrier to species interbreeding. Some hybrids of species with different chromosome numbers are fertile, and chromosome pairing is still possible even when the number of chromosomes is different. It seems possible that in these cases, speciation occurs as the result of severe inbreeding, where close relatives share the new number of chromosomes, as well as a number of other minor differences which might accumulate and result in a set of behavioral, physical, or biochemical differences that serve to distinguish the two newly separate species. Of course, that is a topic for another Mad Scientist question. I hope this answers some of your questions. Try the links in the MadSci Library for more information on Evolution.
<urn:uuid:f6479d87-33cd-4e04-8984-90768075da35>
CC-MAIN-2022-33
http://www.madsci.org/posts/archives/2001-05/989331026.Ev.r.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00605.warc.gz
en
0.950462
2,319
4.125
4
Enzymes are biological catalysts that accelerate chemical reactions by lowering the activation energy. Enzymes are proteins consisting of one or more polypeptide chains. Enzymes have an active site that provides a unique chemical environment, made up of certain amino acid R groups (residues). This unique environment is well-suited to convert particular chemical reactants for that enzyme, called substrates, into unstable intermediates called transition states. Enzymes and substrates are thought to bind with an induced fit, which means that enzymes and substrates undergo slight conformational adjustments upon substrate contact, leading to binding. Enzymes bind to substrates and catalyze reactions in four different ways: bringing substrates together in an optimal orientation, compromising the bond structures of substrates so that bonds can be more easily broken, providing optimal environmental conditions for a reaction to occur, or participating directly in their chemical reaction by forming transient covalent bonds with the substrates. Enzyme action must be regulated so that in a given cell at a given time, the desired reactions are being catalyzed and the undesired reactions are not. Enzymes are regulated by cellular conditions, such as temperature and pH. They are also regulated through their location within a cell, sometimes being compartmentalized so that they can only catalyze reactions under certain circumstances. Inhibition and activation of enzymes via other molecules are other important ways that enzymes are regulated. Inhibitors can act competitively, noncompetitively, or allosterically; noncompetitive inhibitors are usually allosteric. Activators can also enhance the function of enzymes allosterically. The most common method by which cells regulate the enzymes in metabolic pathways is through feedback inhibition. During feedback inhibition, the products of a metabolic pathway serve as inhibitors (usually allosteric) of one or more of the enzymes (usually the first committed enzyme of the pathway) involved in the pathway that produces them. A substance that helps a chemical reaction to occur is a catalyst, and the special molecules that catalyze biochemical reactions are called enzymes. Almost all enzymes are proteins, made up of chains of amino acids, and they perform the critical task of lowering the activation energies of chemical reactions inside the cell. Enzymes do this by binding to the reactant molecules, and holding them in such a way as to make the chemical bond-breaking and bond-forming processes take place more readily. It is important to remember that enzymes don’t change the ∆G of a reaction. In other words, they don’t change whether a reaction is exergonic (spontaneous) or endergonic. This is because they don’t change the free energy of the reactants or products. They only reduce the activation energy required to reach the transition state. Figure 1: Enzymes lower the activation energy of the reaction but do not change the free energy of the reaction. Here the solid line in the graph shows the energy required for reactants to turn into products without a catalyst. The dotted line shows the energy required using a catalyst. This figure should say Gibbs Free Energy on the Y-axis and instead of noting deltaH should have deltaG. Attribution: Marc T. Facciotti (own work) Enzyme Active Site and Substrate Specificity The chemical reactants to which an enzyme binds are the enzyme’s substrates. There may be one or more substrates, depending on the particular chemical reaction. In some reactions, a single-reactant substrate is broken down into multiple products. In others, two substrates may come together to create one larger molecule. Two reactants might also enter a reaction, both become modified, and leave the reaction as two products. The location within the enzyme where the substrate binds is called the enzyme’s active site. The active site is where the “action” happens, so to speak. Since enzymes are proteins, there is a unique combination of amino acid residues (also called side chains, or R groups) within the active site. Each amino acid side-chain is characterized by different properties. Amino acids can be classified as large or small, weakly acidic or basic, hydrophilic or hydrophobic, positively or negatively charged, or neutral. The unique combination of amino acids, their positions, sequences, structures, and properties, creates a very specific chemical environment within the active site. This specific environment is suited to bind, albeit briefly, to a specific chemical substrate (or substrates). Due to this jigsaw puzzle-like match between an enzyme and its substrates (which adapts to find the best fit between the transition state and the active site), enzymes are known for their specificity. The “best fit” between an enzyme and its substrates results from the their respective shapes and the chemical complementarity of the functional groups on each binding partner. Figure 2: This is an enzyme with two different substrates bound in the active site. The enzymes are represented as blobs, except for the active site which shows the three R-groups of each of the three amino acids located in the active site. These R groups are interacting with the substrates through hydrogen bonding (represented as dashed lines) At this point in the class you should be familiar with all the types of bonds as well as the chemical characteristics of all the functional groups. For example, the R group of R180 in the enzyme depicted above is the amino acid Arginine (abbreviated as R) and has an R group that consists of several amino functional groups. Amino functional groups contain a nitrogen (N) and hydrogen (H) atoms. Nitrogen is more electronegative than hydrogen so the covalent bond between N-H is a polar covalent bond. The hydrogen atoms in this bond will have a positive dipole moment, and the nitrogen atom will have a negative dipole moment. This allows amino groups to form hydrogen bonds with other polar compounds. Likewise, the backbone carbonyl oxygens of Valine (V) 81 and Glycine (G) 121 the backbone amino hydrogen of V81 are depicted engaged in hydrogen bonds with the small molecule substrate. Prepare for the Test Look to see which atoms in the figure above are involved in the hydrogen bonds between the amino acid R groups and the substrate. You will need to be able to identify these on your own, hydrogen bonds may not be drawn in for you on the test. If you changed the pH of the solution that this enzyme was located in, would the enzyme still be able to form hydrogen bonds with the substrate ? Which substrate (the left or right one) do you think is more stable in the active site? Why? How? Figure 3: This is an enzyme active site. Only the amino acids in the active site are drawn. The substrate is sitting directly in the center. Source: Created by Marc T. Facciotti (original work) Prepare for the test: First, identify the type of macromolecule in the figure above. Second, draw in and label the appropriate interactions between the R groups and the substrate. Explain how these interactions might change if the pH of the solution changed. Structural Instability of Enzymes The fact that active sites are so well-suited to provide specific environmental conditions also means that they are subject to influences by the local environment. It is true that increasing the environmental temperature generally increases reaction rates, enzyme-catalyzed or otherwise. However, increasing or decreasing the temperature outside of an optimal range can affect chemical bonds within the active site in such a way that they are less well suited to bind substrates. High temperatures will eventually cause enzymes, like other biological molecules, to denature, a process that changes the natural properties of a substance. Likewise, the pH of the local environment can also affect enzyme function. Active site amino acid residues have their own acidic or basic properties that are optimal for catalysis. These residues are sensitive to changes in pH that can impair the way substrate molecules bind. Enzymes are suited to function best within a certain pH range, and, as with temperature, extreme pH values (acidic or basic) of the environment can cause enzymes to denature. Figure 4: Enzymes have an optimal pH. The pH at which the enzyme is most active will be the pH where the active site R groups are protonated/deprotonated such that the substrate can enter the active site and the initial step in the reaction can begin. Some enzymes require a very low pH (acidic) to be completely active. In the human body, these enzymes are most likely located in the lower stomach, or located in lysosomes (a cellular organelle used to digest large compounds inside the cell). Source: http://biowiki.ucdavis.edu/Biochemis..._pH_Inhibition The process where enzymes denature usually starts with the unwinding of the tertiary structure through destabilization of the bonds holding the tertiary structure together. Hydrogen bonds, ionic bonds and covalent bonds (disulfide bridges and peptide bonds) can all be disrupted by large changes in temperate and pH. Using the chart of enzyme activity and temperature below, make an energy story for the red enzyme. Explain what might be happening from temperature 37C to 95C. Figure 5: Enzymes have an optimal temperature. The temperature at which the enzyme is most active will usually be the temperature where the structure of the enzyme is stable or uncompromised. Some enzymes require a specific temperature to remain active and not denature. Source: http://academic.brooklyn.cuny.edu/bi...ge/enz_act.htm Induced Fit and Enzyme Function For many years, scientists thought that enzyme-substrate binding took place in a simple “lock-and-key” fashion. This model asserted that the enzyme and substrate fit together perfectly in one instantaneous step. However, current research supports a more refined view called induced fit. The induced-fit model expands upon the lock-and-key model by describing a more dynamic interaction between enzyme and substrate. As the enzyme and substrate come together, their interaction causes a mild shift in the enzyme’s structure that confirms an more productive binding arrangement between the enzyme and the transition state of the substrate. This energetically favorable binding maximizes the enzyme’s ability to catalyze its reaction. When an enzyme binds its substrate, an enzyme-substrate complex is formed. This complex lowers the activation energy of the reaction and promotes its rapid progression in one of many ways. On a basic level, enzymes promote chemical reactions that involve more than one substrate by bringing the substrates together in an optimal orientation. The appropriate region (atoms and bonds) of one molecule is juxtaposed to the appropriate region of the other molecule with which it must react. Another way in which enzymes promote the reaction of their substrates is by creating an energetically favorable environment within the active site for the reaction to occur. Certain chemical reactions might proceed best in a slightly acidic or non-polar environment. The chemical properties that emerge from the particular arrangement of amino acid residues within an active site create the energetically favorable environment for an enzyme’s specific substrates to react. The activation energy required for many reactions includes the energy involved in slightly contorting chemical bonds so that they can more easily react. Enzymatic action can aid this process. The enzyme-substrate complex can lower the activation energy by contorting substrate molecules in such a way as to facilitate bond-breaking. Finally, enzymes can also lower activation energies by taking part in the chemical reaction itself. The amino acid residues can provide certain ions or chemical groups that actually form covalent bonds with substrate molecules as a necessary step of the reaction process. In these cases, it is important to remember that the enzyme will always return to its original state at the completion of the reaction. One of the hallmark properties of enzymes is that they remain ultimately unchanged by the reactions they catalyze. After an enzyme is done catalyzing a reaction, it releases its product(s). Figure 6: According to the induced-fit model, both enzyme and substrate undergo dynamic conformational changes upon binding. The enzyme contorts the substrate into its transition state, thereby increasing the rate of the reaction. Creating an Energy story for the reaction above Using the figure above, answer the questions posed in the energy story. 1. What are the reactants? What are the products? 2. What work was accomplished by the enzyme? 3. What state is the energy in initially? What state is the energy transformed into in the final state? This one might be tricky still, but try to identify where the energy is in the initial state and the final state. Why regulate enzymes? Cellular needs and conditions vary from cell to cell, and change within individual cells over time. The required enzymes and energetic demands of stomach cells are different from those of fat storage cells, skin cells, blood cells, and nerve cells. Furthermore, a digestive cell works much harder to process and break down nutrients during the time that closely follows a meal compared with many hours after a meal. As these cellular demands and conditions vary, so do the needed amounts and functionality of different enzymes. Regulation of Enzymes by Molecules Enzymes can be regulated in ways that either promote or reduce their activity. There are many different kinds of molecules that inhibit or promote enzyme function, and various mechanisms exist for doing so. In some cases of enzyme inhibition, for example, an inhibitor molecule is similar enough to a substrate that it can bind to the active site and simply block the substrate from binding. When this happens, the enzyme is inhibited through competitive inhibition, because an inhibitor molecule competes with the substrate for active site binding. On the other hand, in noncompetitive inhibition, an inhibitor molecule binds to the enzyme in a location other than an allosteric site and still manages to block substrate binding to the active site. Figure 7: Competitive and noncompetitive inhibition affect the rate of reaction differently. Competitive inhibitors affect the initial rate but do not affect the maximal rate, whereas noncompetitive inhibitors affect the maximal rate. Some inhibitor molecules bind to enzymes in a location where their binding induces a conformational change that reduces the affinity of the enzyme for its substrate. This type of inhibition is called allosteric inhibition. Most allosterically regulated enzymes are made up of more than one polypeptide, meaning that they have more than one protein subunit. When an allosteric inhibitor binds to an enzyme, all active sites on the protein subunits are changed slightly such that they bind their substrates with less efficiency. There are allosteric activators as well as inhibitors. Allosteric activators bind to locations on an enzyme away from the active site, inducing a conformational change that increases the affinity of the enzyme’s active site(s) for its substrate(s). Figure 8: Allosteric inhibitors modify the active site of the enzyme so that substrate binding is reduced or prevented. In contrast, allosteric activators modify the active site of the enzyme so that the affinity for the substrate increases. Many enzymes don’t work optimally, or even at all, unless bound to other specific non-protein helper molecules, either temporarily through ionic or hydrogen bonds or permanently through stronger covalent bonds. Two types of helper molecules are cofactors and coenzymes. Binding to these molecules promotes optimal conformation and function for their respective enzymes. Cofactors are inorganic ions such as iron (Fe2+) and magnesium (Mg2+). One example of an enzyme that requires a metal ion as a cofactor is the enzyme that builds DNA molecules, DNA polymerase, which requires bound zinc ion (Zn2+) to function. Coenzymes are organic helper molecules, with a basic atomic structure made up of carbon and hydrogen, which are required for enzyme action. The most common sources of coenzymes are dietary vitamins. Some vitamins are precursors to coenzymes and others act directly as coenzymes. Vitamin C is a coenzyme for multiple enzymes that take part in building the important connective tissue component, collagen. An important step in the breakdown of glucose to yield energy is catalysis by a multi-enzyme complex called pyruvate dehydrogenase. Pyruvate dehydrogenase is a complex of several enzymes that actually requires one cofactor (a magnesium ion) and five different organic coenzymes to catalyze its specific chemical reaction. Therefore, enzyme function is, in part, regulated by an abundance of various cofactors and coenzymes, which are supplied primarily by the diets of most organisms. In eukaryotic cells, molecules such as enzymes are usually compartmentalized into different organelles. This allows for yet another level of regulation of enzyme activity. Enzymes required only for certain cellular processes can be housed separately along with their substrates, allowing for more efficient chemical reactions. Examples of this sort of enzyme regulation based on location and proximity include the enzymes involved in the latter stages of cellular respiration, which take place exclusively in the mitochondria, and the enzymes involved in the digestion of cellular debris and foreign materials, located within lysosomes. The following links will take you to a series of videos on kinetics. The first link contains 4 videos on reaction rates and the second link contains 9 videos related to the relationship between reaction rates and concentration. These videos are supplemental and are provided to give you an outside resource to further explore enzyme kinetics.
<urn:uuid:6ceed1b8-9bc8-4fae-851d-a030a1290ea1>
CC-MAIN-2022-33
https://bio.libretexts.org/LibreTexts/University_of_California_Davis/BIS_2A%3A_Introductory_Biology_(Facciotti)/MASTER_RESOURCES/Enzymes_depricated%23
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00005.warc.gz
en
0.94255
3,648
4.15625
4
Celtic Mythology Submitted Names Submitted names are contributed by users of this website. The accuracy of these name definitions cannot be guaranteed. ABELLIO m Celtic Mythology, Greek Mythology Some scholars have postulated that Abellio is the same name as Apollo , who in Crete and elsewhere was called Abelios (Greek Αβέλιος), and by the Italians and some Dorians Apello , and that the deity is the same as the Gallic Apollo mentioned by Caesar, and also the same as the Belis or Belenus mentioned by Tertullian and Herodian.... [more] ABNOBA f Celtic Mythology The name of an obscure Gaulish goddess, thought to be connected to Celtic abona "river" (source of Avon ). The second element may be derived from either Proto-Indo-European nogʷo- , meaning "naked, nude" or "tree", or the verbal root *nebh - "burst out, be damp". ADSULLATA f Celtic Mythology Meaning unknown, possibly British adsiltia "she who is gazed at". This was the name of a river goddess worshipped by the Continental Celts. It may be an older form of Esyllt AERACURA f Celtic Mythology Of unclear origin. It has been connected with Latin aes "copper, bronze, money, wealth" as well as era "mistress" and the name of the Greek goddess Hera AERICURA f Celtic Mythology (Latinized) The origins of this name are uncertain; probably a Latinized form of a Celtic name, although some Latin roots have been suggested (including aes , genitive aeris , "brass, copper, bronze, money, wealth"; and era , genitive erae , "mistress of a house")... [more] ALATOR m Celtic Mythology, Roman Mythology An epithet of Mars found on an altar at South Shields in England, and on a votive plaque found in Hertfordshire in England. There is disagreement of its meaning, with some academics interpreting it as "hunstman" and others as "cherisher"... [more] ALAUNUS m Celtic Mythology Also a Gaulish god of healing and prophecy, who was venerated in the areas of Mannheim (Germany) and Salzburg (Austria). ALISANOS m Celtic Mythology A local god in Gaul who is mentioned in inscriptions in central France. Attempts have been made to identify him as a mountain-ash god or a god of rowan trees. The ancient Gaulish city of Alesia, now called Alise-Sainte-Reine, may well be connected with him. ANKOU m Celtic Mythology, Breton Legend This is the name of a legendary skeleton-ghost in parts of France, namely Brittany and Normandy as well as Cornwall. He travels by night, riding a creaking cart (or small coach) drawn by four black horses in which he comes to collect the souls of the recently departed... [more] ARDUINNA f Celtic Mythology From the Gaulish arduo- meaning "height". Arduinna was a Celtic goddess of the Ardennes Forest and region, represented as a huntress riding a boar. The name Arduenna silva for "wooded heights" was applied to several forested mountains, not just the modern Ardennes. ARNEMETIA f Celtic Mythology Arnemetia's name contains Celtic elements are ," meaning "against, beside," and nemeton , meaning "sacred grove." Her name is thus interpreted as "she who dwells in the sacred grove," suggesting Arnemetia may be a divine epithet rather than a name in its own right. ATAEGINA f Celtic Mythology, Celtiberian Mythology The name of a goddess worshiped by the ancient Iberians, Lusitanians, and Celtiberians. Her name possibly comes from the proto-Celtic *atte- which together mean "reborn", or else *ad-akwī- ATÉGINA f Celtic Mythology, Portuguese, Spanish The Lusitanian goddess of nature and cure. A popular goddess worshipped by the ancient Iberians, Lusitanians, and Celtiberians of the Iberian Peninsula. Derived from a Celtic source: the two roots atte- to mean "Reborn" or from ad-akwī- ) meaning "night". AVETA f Celtic Mythology A Gaulish goddess of birth and midwifery known from figurines and inscriptions found in the area of modern-day France, Germany and Switzerland.... [more] BEIRA f Literature, Celtic Mythology Anglicized form of Bheur perhaps meaning "cutting, sharp, shrill" in Scottish Gaelic, from Cailleach Bheur "sharp old wife", the name of the Scottish personification of winter, a reference to wintry winds... [more] BELATUCADROS m Celtic Mythology Often translated as "fair shining one" or "fair slayer", derived in part from Celtic *bel(l) - "strong, powerful" or *belo - "bright" (cf. Belenus ). This was the name of a Celtic deity often identified with Mars , sometimes referred to as Mars Belatucadrus BELISAMA f Celtic Mythology Possibly means "summer bright" from ancient Celtic elements (related to Belenos ). She was a goddess worshiped in ancient Gaul and Britain, associated with lakes and rivers, fire, crafts and light. BORVO m Celtic Mythology In Lusitanian and Celtic polytheism, Borvo was a healing deity associated with bubbling spring water. BRIGANTIA f Celtic Mythology Derived from Celtic *brigant - "high" or *briga - "might, power". This was the name of an important Brythonic goddess. She is almost certainly the same deity as Bridget , the Irish goddess. CATURIX m Ancient Celtic, Celtic Mythology Derived from Celtic catu "battle" combined with Celtic rix "king." This was the name of the war god of the Helvetii, a continental Celtic tribe. DAMARA f Celtic Mythology The name of a Celtic fertility goddess. Though unconnected, this is also the name of an ethnic group who live in Namibia, Africa. DRUANTIA f Popular Culture, Celtic Mythology Hypothetic old Celtic form of the name of a river in the south of France commonly known as the Durance, which is of unknown meaning. An Indo-European root meaning "to flow" has been suggested. According to Robert Graves in 'The White Goddess' (1948), it is derived from the Indo-European root *deru meaning "oak" (as are the words druid ) and probably also belonged to a Gallic tree goddess, which he identifies as "Queen of the Druids" and "Mother of the Tree Calendar"... [more] ENDOVELICUS m Celtic Mythology Celt-iberic god in ancient Portugal and spain, probabily an important deity due to its meaning, from celtic Ende , "more", and Vell , "better", "more" and "better" would thus have the same meaning as Optimus , that is, "Excellent"... [more] MEREWENNE f Medieval Cornish, Celtic Mythology Merewenne is listed in the 12th-century Hartland list as one of the daughters of Brychan . While she is sometimes considered identical with Morwenna of Morwenstowe, another daughter of Brychan, Merewenne and the variants Marwyne and Merwenna appear in medieval records referring to the patron-saint of Marhamchurch near Bude (a church dating back to 1086 which is situated in north-east Cornwall). NARIA f Roman Mythology, Celtic Mythology Meaning unknown. Naria was a Gallo-Roman goddess worshiped in western Switzerland. While what she was goddess of is a mystery officially, it can be deduced from the sole image of her that she may have been a goddess of good luck and blessings, as her image was done in the generic style of Fortuna , the Roman goddess of luck. NEMETONA f Celtic Mythology Meaning "sacred area", from the Celtic 'nemeto', itself from 'nemeton', a term designating Gaulish religious spaces. ... [more] ROSMERTA f Celtic Mythology Probably means "great provider" from Gaulish ro , an intensive prefix (hence "very, most, great"), combined with smert "purveyor, carer" and the feminine name suffix a . This was the name of an obscure Gallo-Roman goddess of fertility, abundance and prosperity... [more] SENUNA f Celtic Mythology A Celtic goddess worshipped in Roman Britain. Her name is possibly related to the Proto-Celtic 'seno' meaning "old". Some academics have associated the name to the ancient river Senua that was once located in southern Britain, which may have also been known as Alde, from the Anglo-Saxon 'ald' meaning old... [more] SULIEN m Breton, Welsh, Celtic Mythology Derived from the Celtic name Sulgen meaning "born from the sun". This was the name of a Celtic sun god. It was borne by several early saints. SURIA f English, Celtic Mythology Suria, also Syria, is the female deification of supposedly good flowing water, conceived as a weaning Mother goddess, in ancient Celtic polytheism. TAMESIS f Celtic Mythology The Celtic goddess of fresh waters. Her name survives in the English River Thames and in Tamise, a French name for the Schelde (Scheldt). TREBOPALA f Ancient Celtic, Lusitanian, Celtic Mythology An ancient Lusitanian feminine name believed to be the name of a goddess. Her name is derived from *trebo- meaning "house, dwelling place", and potentially the Lepontic and Ligurian word pala meaning "sacred stone" or "flat land". VERBEIA f Celtic Mythology The Celtic goddess of the river Wharfe (North Yorkshire, England) known from a single inscription found in Ilkley, England and therefore interpreted as a local deity.... [more] VIRIDIUS m Celtic Mythology (Latinized) Latinized form of Viridios , which is of Celtic origin but the meaning is not known for certain. There are theories that it is derived from Proto-Celtic wird "green", or from Proto-Celtic wīrjā "truth" combined with dī- "from, has" (thus meaning "he who has the truth")... [more]
<urn:uuid:2c2e0b0a-520e-43bc-a043-9490dd46ffce>
CC-MAIN-2019-22
https://www.behindthename.com/submit/names/usage/celtic-mythology
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256281.35/warc/CC-MAIN-20190521062300-20190521084300-00022.warc.gz
en
0.940575
2,387
2.890625
3
- Where they are How many - RO 382 (Siasi/Sesai, 2014) - Linguistic family The Arara Karo live in two villages, Iterap and Paygap, both located in the southern part of the Lourdes Stream Indigenous Land, in Rondônia. Two-thirds of the Arara live in the first village, the rest in the second. The Gavião Indians, their traditional enemies, live on the same Indigenous Land. The Arara were contacted at the end of the 1940s, when hundreds of them died from contagious diseases and the survivors went to live in the rubber camps of the region. This resulted in the Arara becoming totally involved in the non-indigenous way of life, but their shamans are still recognized by all the Indians of the neighboring regions as being very powerful.poderosos. The Arara Indians are also known as Arara Tupi, Arara of Rondônia, or simply Karo (which means, in their language, “arara”[macaw]), terms which have been utilized to differentiate them from the other Arara groups of Brazil: Arara do Acre (Shawanawá), Arara do Aripuanã (Arara do Beiradão), Arara do Pará (Ukarãgmã). In referring to themselves, the Arara call themselves I'târap, “all of us”, a word which is formed by joining the personal pronoun of the first person plural inclusive I'tâ “we”, followed by the word that has the meaning of “collective” tap (which is pronounced rap) “all”. The Arara speak the Karo language, which before was known as Arara, and which came to be called by this author Karo after 1987, so that it could be differentiated from the other Arara languages spoken by groups of the same name in Brazil. The Karo language belongs to the Ramarama family, of the Tupi linguistic trunk (Rodrigues, 1964), and for a long time it was thought that there were other sister languages belonging to the same family: Ntogapíd (or Itogapúk), Ramarama, Uruku, Urumi and Ytangá. Recently, however, a work by Gabas (2000) demonstrated that all of these supposed languages are, in fact, one and the same language, which received different names from different ethnologists who gathered word-lists from speakers in different periods (Curt Nimuendaju, in 1925 and 1955; Marechal Rondon, in 1948; Claude Lévi-Strauss, in 1950; Horta Barbosa, in 1945; and Harald Schultz, in 1955). Thus, the Karo language is the only language of the Ramarama family, just as other languages of the Tupi trunk are also the only representatives in their respective families: Aweti, Puruborá and Sateré-Mawé. The Arara Indians live in two distinct villages, Iterap and Paygap. In both, practically all the Indians speak their own language, and Portuguese is learned as a second language and used only as a contact language. Several Arara who were raised by families of colonists only speak the Portuguese language, but they understand perfectly well Karo. The conversations these Indians have with the community and amongst their families are conducted bilingually. The children of the two villages are taught to speak Karo from the beginning, and although Portuguese may be learnt at a later time, one can already perceive a gradual use of Portuguese terms, mainly by the younger generations, of Portuguese terms, generally for relations of kinship(father, mother, uncle, aunt, cousin m./f.). Several Arara also speak or understand the Gavião language, spoken by the neighboring Gavião Indians, thanks to situations of marriage among members of the two ethnic groups. The multilingualism is these cases is not looked on in a negative way, despite the fact the Arara and the Gavião are traditional enemies. Interesting aspects of the language The Karo language has several aspects which are of interest to scholars of non-European languages, among which I shall mention three: The first is the occurrence of a system of classifiers, through which a classifier can occur with a substantive referring (basically) to the form in which this substantive occurs in the world (real or imaginary). A practical example is the word for “eye” that in Karo is icagá 'a', in which the first word means “eye” and the second means “round object”. The system of classifiers in Karo has ten different items, referring to different aspects of objects. Another interesting aspect of the language is the occurrence of a system of ideophones, words generally with a very specific verb meaning and which are used to give more “expression” to stories and conversations. An example of an ideophone in Karo is the word oturum, which means “to go down to the ground making a very loud noise”, or ngârâgn, which means “turn your head around”. Ideophones in Karo are an open class, that is, they can be formed from the imagination and creativity of the speaker, hence there is a very large number of them. A third interesting aspect in Karo is the existence of a system of evidential words, which serve to identify the source or trustworthiness of the information told by the speakers of the language. For example, if an Arara pronounced the word to'wa after a phrase, he means that what is being narrated derives from word-of-mouth, that is, he was not testimony to, nor is he supposing the fact, he is only retransmitting the information. The language uses ten different types of evidential words. Traditionally, the Arara have always inhabited the area where they live today, the Lourdes Stream Indigenous Land, in the state of Rondônia, which they share with the Gavião Indians, their traditional enemies. The area has approximately 190,000 square kilometers, having been homologated in 1986, and is currently registered in the Federal Judiciary. Of this total land area, about 1/3 “belongs” to the Arara, the rest being set aside for the Gavião. The closest city to the two Arara villages is Ji-Paraná, about 70 kilometers away by highway (during the dry season) or about three hours by boat going down the Machado River and entering the Prainha Stream (during the rainy season), to get to the village of Iterap. Access to the village of Paygap is easier since it is near the town of Nova Colina. By road, the village is about 50 kilometers away from Ji-Paraná. In 1987, when the author of this entry began his research with the Arara, there was only one village, which had been recently-established, and where about 100 Indians lived. Presently, the population of the two Arara villages is estimated to be around 170 Indians, of whom 2/3 live in the village of Iterap and the rest in the village of Paygap. There are infrequent marriages of Arara (both men and women) with Gavião Indians, and even rarer still, marriages of Arara with Zoró Indians, who live in the neighboring area. There are few marriages of Arara with non-Indians. From the linguistic point of view, the children of interethnic marriages learn the languages of both parents (Arara and Gavião, or Arara and Zoró), and later Portuguese, as a contact language. Despite maintaining some kind of contact with the surrounding population since the 1920s, the Arara were contacted by the old Indian Protection Service (SPI) only at the end of the 1940s. Contact was disastrous for the Arara communities. Hundreds of Indians died from diseases brought by non-Indians (mainly pneumonia, flu and measles), and the few who survived went to work in the rubber camps of the region, together with the non-Indian population. It was only at the end of the 1960s that a Funai employee, supposedly the head of the Lourdes Indigenous Post, Mr. Brígido, was able to regroup the Arara, who then came to live together with the Gavião. After many misunderstandings, in the mid-1980s, the Arara decided to found their own village, near the Prainha stream, about 5 kilometers from where it flows into the Machado River. Soon they got recognition of the village by the Funai, and the Iterap Indigenous Post was then created. At the beginning of the 1990s there was an internal power dispute among the Arara, and the then chief Pedro Agamenon moved with his family group to another part of the Indigenous Land to establish their own village, presently called Paygap. According to the Funai technicians, there doesn’t exist a sufficient number of inhabitants in the village of Paygap to justify the setting up of another Indigenous Post. Social and political organization Due to the fact the Arara have been in contact with the surrounding population for a long time (approximately 60 years), their social and political organization, as well as their traditional cultural practices, have suffered considerable losses or have practically disappeared. From what it was possible to determine from the elderly, there were traditional festivals (for example, the corn harvest festival), and there was also the seclusion of young people until the time of marriage. There were two distinct groups of Arara: those who exist today and the so-called "Black Feet", who supposedly spoke a different dialect of Arara. Reports state that, despite their inhabiting nearby regions and maintaining good relations of friendship, there were at times episodes of animosity between the two groups, which resulted in deaths on both sides. Presently, there is no record of the existence of Indians of the “Black foot” group among the Arara. Several aspects which are still maintained of their social organization are, for example, the fact that the man, on marrying, goes to work for his wife’s father until he decides to let them go (work, for example, in the gardens, hunting, fishing etc.). This practice is even observed among the Arara (men and women) who have married Indians from other ethnic groups, mainly the Gavião. There are several marriages (not recent) between Indians and non-Indians, but this type of union generally is not looked upon well by the members of the community. It is not known what was the traditional system of naming the newborn, but the Arara children receive both Arara and Portuguese names (generally names are given by the parents and/or grandparents). The meaning of the Arara name always refers to a physical aspect of the child or to an episode related to its birth (or gestation). The houses of the villages are not built in the traditional architectural pattern. They are wooden houses (several already are of bricks), with a living room and two or three rooms, and the kitchen is built separately, as an attachment to the house, made of straw and paxiúba palm. It is the coolest place to stay during the day when the heat is intense. Mythology and shamanism Little is known of the cosmology of the Arara people. Several of the myths which have survived, however, indicate the creation of the White man from a jatobá tree; the myths still show the duality between good and evil in the form of two brothers, one virtuous and the other audacious, who ventured through the forest until the first kills the second. A collection of Arara myths, which are still remembered by the more elderly people, is in preparation and should be published very soon. No traditional ritual is currently practiced by the Arara. There are few shamans in the village, all of them very much respected by the community and by members of other ethnic groups, but their functions in the village seem to be limited to counseling in matters relating to the community, and no longer to the activities or practices typical of their status as shaman (curing, ritual dialogues, composition of songs etc.). Traditional Arara art can still be seen through the making of objects, such as various body ornaments (collars with different kinds of seeds, bracelets, headdresses etc.), domestic items (basketry, tucumã and cotton hammocks, brooms, fans etc.), or hunting gear (bows and arrows). The production of clay pots no longer exists, but the women sew their own clothes (from pieces of cloth acquired in the city). The Arara used to paint themselves with genipap dye (they would make a thin line, from one side of the face to the other), they used to bore a hole in the lower part of the nostrils where they would insert a macaw feather, and they used to use a small plug on the lower lip. Despite the fact they are no longer used, these holes can still be seen on the older Indians. Periodically, the Indians used timbó plant poison to fish in the streams, during the dry season, and during the rains they fish with hooks or traps. There are a few Indians who still prefer to use more traditional resources for fishing, such as bow and arrow. Hunting in general is done with shotguns. For hunting birds, principally of larger size, traditional blinds made of straw are still used. Note on the sources There is very little (or almost no) anthropological knowledge on the Arara. The only material published containing a small description of the life of the Arara can be found in Lévi-Strauss (1950). Specifically on Linguistics, work (mostly lists of words) has been done since 1925, beginning with Nimuendaju. Other references are HORTA BARBOSA (1945), HUGO (1959), NIMUENDAJU (1955), RONDON & FARIA (1948), e SCHULTZ (1955). In-depth linguistic knowledge of the Karo, however, began in 1987, when the author of this entry began his studies of the language. Since then, several articles, chapters in books and books dealing with aspects of the Arara language have been published (see the item “Sources of Information”). At the moment, a complete grammar of the language and a Karo-Portuguese are in preparation by the author. Sources of information - GABAS JÚNIOR, Nilson. Estudo fonológico da língua Karo (Arara de Rondônia). Campinas : Unicamp, 1989. (Dissertação de Mestrado) - GABAS JÚNIOR, Nilson; ARARA, Rute et al. História dos Arara no tempo do contato com os brancos : May yamat kana'xet peg xawero ma'i kanay 'mam. Belém : MPEG, 2002. 54 p. - GABAS JÚNIOR, Nilson; ARARA, Sebastião Kara'ya Pew. Cartilha de alfabetização na língua Karo : Ak wen wen 'ya!. Belém : MPEG, 2002. 54 p.
<urn:uuid:0962c30f-905c-49b5-a55a-b8ae776dac18>
CC-MAIN-2022-33
https://pib.socioambiental.org/en/Povo:Karo
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00605.warc.gz
en
0.967726
3,310
2.75
3
Percentage Change Calculator The percentage change calculator determines the percentage change between two values. It is particularly useful in many aspects of finance, chemistry and exponential growth and decay, as well as in other areas of mathematics. First, we need to know how to calculate percent change and to understand and use the percent change formula. To do this, we will provide you with many examples, each with in-depth analysis of various mathematical challenges and traps waiting for beginners. Furthermore, we will teach you how to calculate percentage change when finding population growth rate, a fundamental statistic parameter describing processes happening in a particular population. We are sure that after reading the whole text the percentage change formula will stay in your head for a long time and you will be able to find the percent change in any situation. How to calculate the percent change? Percentage change differs from percent increase and percent decrease in the sense that we can see both directions of the change. For example, the percent increase calculator calculates the amount of increase, in which we would say, "x percent increase". The percent decrease calculator calculates the amount of decrease, in which we would say, "x percent decrease". The percent change calculator would yield a result in which we would say, "x percent increase or decrease". To calculate percent change we need to take the difference between the starting value and final value, divide by the absolute value of the starting value, and multiply the result by 100. The section below will go into more detail and show how to solve this problem. Percent change formula The percent change formula is as follows: (new_value - original_value) / |original_value| * 100 The two straight lines surrounding a number or expression (in this case original value) indicate the absolute value, or modulus. It means that if the value inside the straight lines is negative, we have to turn it into a positive one. The easiest way to do this is by erasing the minus before it. If the value inside the straight lines is positive, we don't need to do anything, it stays positive. After the absolute value is found, we can erase the straight lines or turn them into a bracket as they may serve this function as well. You may ask how to calculate percent difference. It is the same thing as percent change, so you can use the percentage change calculator to accomplish this task as well. The general percentage formula for one quantity in terms of another is multiplying the ratio of the two quantities by 100. The percentage change calculator is not only useful in a classroom setting but also in everyday applications. The amount of sales tax on an item represents a percent change, as does the tip added to the bill at a restaurant. The ability to calculate the percentage change may come in handy, when negotiating a new salary or assessing whether the height of your child has increased appropriately. As you can see, knowing how to calculate percent change by hand using the percent change formula may be useful in the real-world. Percentage change formula – mathematical examples Let's do a few examples together to get a good grasp on how to find percent change. In the first case, let's suppose that you have a change in value from 72 and you want to know the percent change. Firstly, you need to input 60as the original value and 72as the new value into the formula. Secondly, you have to subtract 72. As a result, you get Next, you should get the absolute value of 60is a positive number, you don't need to do anything. You can erase the straight lines surrounding Now, you can divide 60. After this division, you get The last thing to do is to multiply the 100. As a result, you get 20 %. The whole calculations look like this: [(72 – 60) / |60|] * 100 = (12 / |60|) * 100 = (12 / 60) * 100 = 0.2 * 100 = 20 % You can check your result using the percentage change calculator. Is everything alright? In the second example, let's deal with a slightly different example and calculate the percent change in value from 50as the original value and -22as the new value. Then, you need to perform a subtraction. The difference between -72. Remember always to subtract the original value from the new value! Next, you are obliged to get the absolute of 50. As the original value in this example is also a positive number, then you can just erase the straight lines. It is time to perform the division. -72divided by the Finally, you have to multiply the result by 100. Let's see. -144 %. The whole process should look like this: [(-22 – 50) / |50|] *100 = (-72 / |50|) * 100 = (-72 / 50) * 100 = -1.44 * 100 = -144 % Remember that you can always check the result with the percent change calculator. In the third and final example, we will work only with negative numbers. In this case, you will see that getting the absolute value, may change the final result of an equation. We will find a percent change between First, let's assume that -10is the original value that is being changed into In the second step, as always, subtract the original value from the new one. Let's concentrate during the third step, as it is different from what you have seen before. This time getting the absolute value will change something. Apply it to the original value -10. As it is negative, you have to erase the minus before it, thus, creating a positive value of 10. You will see that this change will have a significant effect on the final result. Now, let's divide 10that you got from the last step. You can finish your calculation by multiplying 100. The final outcome is -150%. The full equation should look like this: [(-25 – (-10)) / |-10|] * 100 = (-15 / |-10|) * 100 = (-15 / 10) * 100 = -1.5 * 100 = -150 % As always, we encourage you to check this result with our percentage change calculator. As you may have already observed, when the new value is smaller than the original one, the final result will be negative. Thus, you need to put a minus before it. On the other hand, if the new value is bigger than the original value, the result will be positive. You can use this to predict what the final result will be, and check your answer. If you had used a negative instead of a positive for the absolute value in this example, then -15 would have been divided by -10, giving you 1.5 as a result. It is a positive number, and your final answer would have been 150 %. Your error would have been the difference between 1.5. This difference equals 3, so our calculation would have ended with 300 % of an error ( 3 * 100% = 300 %)! This is why you have to be careful when solving mathematical problems. A small mistake in one place may result in an enormous error in another. We have a task for you! Calculate, using the methods we have described previously, what is the percentage change between -30. Concentrate and watch out for mathematical traps that are waiting for you. But don't fear. By this point, you should know everything that is required to do it correctly. Remember to check your result using the percent change calculator. Population growth rate – example on how to find percent change Population growth is the increase in the number of individuals of a certain population. It can be a population of people, but also cows, foxes or even flies. Members of any species can create a population. The population may be limited to a particular territory, country or expand to the whole world. You may count the number of dogs in your neighborhood, thus determining the population of dogs in the area surrounding your home. If you count their number after one year and compare it with the previous one, you will obtain their population growth. We can calculate it using this formula: current population – previous population = population growth When the population growth is higher than zero, it means that the population is increasing and the number of individuals is getting bigger with each year. However, when the population growth is negative (with a value below zero), then the population is becoming smaller and smaller. The population growth of 0 means that the population size is not changing at all. You can then divide the population growth by the number of individuals in the previous population and times by 100 to get the population growth rate. It is a measure of population growth compared to the number of individuals forming the population in the previous period. Mathematically, it looks like this: (population growth / previous population) * 100 = population growth rate Combined, the whole formula can be written as: ((current population – previous population) / previous population) * 100 = population growth rate Notice, that although it looks very similar to the formula for percentage change, you don’t need to get the absolute value of the previous population. It is because the population can never drop below zero, nor have a negative value. Population growth and population growth rate can however be negative, representing the decreasing number of individuals. What is the difference between population growth and the population growth rate? Both of these parameters are ways of illustrating the change in the size of the population. Population growth is more direct and precise, as it shows us the exact difference between population size in two periods. However, the population growth rate also has its advantages. It emphasizes the dynamics of the process. It tells us how big the change is compared to the previous state of the population. Population growth of 20 may seem small, but if the original population was 10, then it means that the population size has doubled. The population growth rate shows it to us. In this case, its value would be 100 %. Let's calculate one population growth rate together to make sure that this concept will stay with you for a while In 1990 in the United States there were 253,339,000 citizens. Over the next 20 years, the USA population was rising. In 2010 it reached 310,384,000 people. First, let's calculate the population growth. You have to subtract the number of USA citizens in 1990 from the number of citizens in 2010: 310,384,000 - 253,339,000 = 57,045,000 Now, you can calculate the population growth rate. To do that, you need to divide the population growth by the number of citizens in the earlier period (in this case in 1990): 57,045,000 / 253,339,000 = 0.225 The last thing to do is multiply the acquired value by 100 to get the percent: 0.225 * 100% = 22.5% After these calculations, you can say that the USA population increased by 22.5%between the years 1990 and 2010. Congratulations! You don't have to perform all the calculations by hand. Keep in mind that our percentage change calculator is always waiting for you at omnicalculator.com! There is yet another situation in which you may want to use the percentage change calculator. If you have some spare money that you want to invest, you will have to choose between many investment offers. You may calculate the future growth of your savings with our investment calculator and compound annual growth rate calculator, and then get the percent change with the percentage change calculator. By comparing percent changes of different investment options, you will see which is the optimal one.
<urn:uuid:344c311a-94e2-4a04-9716-8a2f739137fd>
CC-MAIN-2019-22
https://www.omnicalculator.com/math/percentage-change
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255837.21/warc/CC-MAIN-20190520081942-20190520103942-00182.warc.gz
en
0.926852
2,447
3.640625
4
What Is the NIST Compliance Framework & CMMC? NIST compliance provides security standards for businesses handling federal information, but how do you meet these compliance regulations? What is NIST compliance? NIST compliance is the National Institute of Standards and Technology regulations required for anyone handling sensitive information for government agencies. What Is NIST? The National Institute of Standards and Technology is a nonregulatory body within the U.S. Department of Commerce that supplies standards and frameworks used by federal agencies and their partners to ensure sensible standards in IT infrastructure. The Federal Information Security Modernization Act of 2014, itself an amended version of the original FISMA law of 2002, was passed by Congress in order to define the rules and requirements for federal agencies (and contractors working with those agencies) related to managing data and securing IT systems. To support the efforts of the several regulatory organizations in charge of monitoring these agencies, NIST provides guidelines, requirements, and best practices over an entire landscape of security, risk management, and IT maintenance. Being “compliant” with NIST guidelines essentially means that your organization is complying with another set of requirements, of which NIST guidelines are the driving force. While there are some exceptions to this (for example, NIST 800-53), many compliance contexts will stem from highly specific situations related to different types of data and technology. In fact, NIST compliance overall can broadly be conceived as a cross section of three critical factors: - Types of Data: Compliance requirements will almost always apply to the types of data your organization will handle. NIST requirements will, under any circumstances, include guidance on different tiers of data sensitivity. - Types of Technology: For the most part, NIST regulations can apply across technology and only change depending on the use (for example, protecting data in transit versus data at rest in a server). However, some technologies, like cloud infrastructure, will have dedicated compliance frameworks. - Types of Service: Depending on the organization under consideration, regulations change. For example, a contractor handling sensitive data for an agency in the Department of Defense supply chain will have different requirements than a cloud service provider starting a contract with a nondefense federal agency. Accordingly, maintaining NIST compliance for an organization will rely on understanding which NIST guidelines apply to the current context and technology. What Are Common NIST Publications? To support agencies and enterprises with regulatory requirements, NIST releases “Special Publications”, with each publication addressing a specific context, technology, or security need. Furthermore, many of these SPs are built around more robust expectations, like risk management or supply chain security. In terms of overall cybersecurity and IT protection, there are a few major special publications: NIST SP 800-53 NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations,” is a significant component of almost all federal (and many state) security standards. Essentially, this document serves as a large inventory of security and privacy controls, organized into several control families that include the following: - Access Control - Awareness and Training - Audit and Accountability - Assessment, Authorization, and Monitoring - Configuration Management - Contingency Planning - Identification and Authentication - Incident Response - Media Protection - Physical and Environmental Protection - Program Management - Personnel Security - PII Processing and Transparency - Risk Assessment - System and Services Acquisition - System and Communications Protection - System and Information Integrity - Supply Chain Risk Management Compliance with NIST 800-53 is often a prerequisite for other security frameworks in the federal space, including FedRAMP and FISMA. NIST SP 800-63 NIST 800-63, “Digital Identity Guidelines,” defines guidelines for identity verification, authentication processes, and identity federation security. Generally speaking, these components will fall under three categories: - Identity Assurance Level (IAL): This defines requirements for government agencies and contractors who need to implement identity proofing processes, including live or virtual confirmation or official document proofing. - Authentication Assurance Level (AAL): This defines requirements for appropriate authentication levels, including necessary authentication types and technologies for single- and multi-factor authentication. - Federation Assurance Level (FAL): This defines required protocols and assertion types that may be used for compliant identity federation technologies. NIST SP 800-171 NIST 800-171, “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations,” is a particular NIST document that applies to Controlled Unclassified Information. CUI relates specifically to contract work within the Department of Defense supply chain and represents data that, while unclassified, is deemed sufficiently sensitive enough to warrant protection. Much like NIST SP 800-53, NIST 800-171 provides a list of security controls across different families like access control, maintenance, or risk assessment. These controls are slightly different, however, due to a different application. NIST 800-171, and an expanded document of additional controls titled NIST SP 800-172, are the core of the Cybersecurity Maturity Model Certification. Federal Information Processing Standards (FIPS) 140-3 FIPS 140, “Security Requirements for Cryptographic Modules,” defines the encryption and hashing algorithms acceptable for implementation in compliant systems. FIPS 199 and 200 FIPS 199, “Standards for Security Categorization of Federal Information and Information Systems,” defines three individual impact levels that serve as categorization methods for data sensitivity and IT systems. The three impact levels are as follows: - Low: The system’s loss of confidentiality or integrity of data would have limited adverse effects, including an agency losing capabilities to accomplish its mission, minimal financial loss, or minor bodily harm. - Moderate: The loss of confidentiality or integrity of data in the system would seriously impact stakeholders, including serious degradation of an agency’s capabilities, significant harm to individuals or assets, and financial loss. - High: The loss of confidentiality or integrity of data has a catastrophic effect on agencies and stakeholders, including the inability to operate, major or complete financial loss, and serious bodily harm, including loss of life. FIPS 200, “Minimum Security Requirements for Federal Information and Information Systems,” draws from FIPS 199 and provides guidelines on applying impact levels across different types of systems. While there are hundreds of NIST documents, these are generally documents cited by other publications. Other documents will help agencies and contractors apply general security (the Cybersecurity Framework) and risk management (the Risk Management Framework) practices, secure healthcare systems, and cloud infrastructure (FedRAMP). What Is CMMC? CMMC, mentioned earlier, is a security framework intended to protect CUI in DoD contractor systems. This information is not classified as Secret in any form, but it is considered mission critical and as such, should be protected from loss or corruption. To help contractors better address CUI security, the CMMC Authorization Board, as part of the DoD, manages the CMMC standard. This model organizes controls found in NIST SP 800-171 and NIST SP 800-172 as a path of “maturity,” where organizations can have different levels of sufficient security for different purposes. The latest version of this standard, dubbed CMMC 2.0, has a few overarching requirements: - Maturity Levels: CMMC 2.0 is organized into three maturity levels. - Level 1 calls for contractors to implement 17 controls from NIST 800-171. - Level 2 calls for a complete implementation of all 110 controls found in NIST 800-171 and serves as the minimum level for an organization to handle CUI. - Level 3 introduces select controls of NIST 800-172 on top of Level 2 requirements and stands as a broad category for contractors handling major security issues like advanced persistent threats. - Third-Party Assessment: CMMC requires most organizations to undergo audits via certified third-party assessment organizations, all listed in a central directory called the C3PAO Marketplace. Level 1 (and select Level 2) contractors can waive the requirement for C3PAO audit in lieu of an annual self-assessment. - Plan of Action and Milestones: Earlier versions of CMMC disallowed contingent certification—that is, at the time of audit, a company was either compliant or not. Version 2.0 allows organizations, under approval from the CMMC-AB, to provide a POA&M of corrective measures, including timelines for remediation, if it is deemed that they can feasibly become compliant within a specific time window. Maintaining Security and Compliance with 1Kosmos These standards or regulations call for some form of identity management and authentication security, often using MFA and biometrics. Businesses working with federal or defense agencies must have a secure authentication platform that can provide security, accessibility, and reliability without compromising usability in your organization. 1Kosmos BlockID provides the following features: - Private and Permissioned Blockchain: 1Kosmos protects personally identifiable information in a private and permissioned blockchain and encrypts digital identities in secure enclaves only accessible through advanced biometric verification. Our ledger is immutable, secure, and private, so there are no databases to breach or honeypots for hackers to target. - Identity Proofing: BlockID includes Identity Assurance Level 2 (NIST 800-63A IAL2), detects fraudulent or duplicate identities, and establishes or reestablishes credential verification. - Streamlined User Experience: The distributed ledger makes it easier for users to onboard digital IDs. It’s as simple as installing the app, providing biometric information and any required identity proofing documents, and entering any information required under ID creation. The blockchain allows users more control over their digital identity while making authentication much easier. - Identity-Based Authentication: We push biometrics and authentication into a new “who you are” paradigm. BlockID uses biometrics to identify individuals, not devices, through identity credential triangulation and validation. - Interoperability: BlockID and its distributed ledger readily integrate with a standard-based API to operating systems, applications, and MFA infrastructure at AAL2. BlockID is also FIDO2 certified, protecting against attacks that attempt to circumvent multi-factor authentication. - Cloud-Native Architecture: Flexible and scalable cloud architecture makes it simple to build applications using our standard API, including private blockchains. Ready to learn more about 1Kosmos and how it can help you with your government-adjacent systems, read our datasheet on BlockID and NIST Compliance.
<urn:uuid:3fbcb9a3-2edf-48f9-b2c5-f9475078c8e7>
CC-MAIN-2022-33
https://www.1kosmos.com/identity-management/nist-cybersecurity-compliance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00604.warc.gz
en
0.895469
2,216
2.640625
3
CONSERVATION’S CONDOM CONUNDRUM: How ignoring overpopulation has undermined the success of saving endangered species By Karen I. Shragg “ It’s been a long time coming, it’s going to be a long time gone” Crosby Still and Nash During my 35 -year career as a naturalist I tried to teach empathy for the earth, its systems, flora and fauna. I often felt that the messages my students were getting from everywhere else countered that. From their religious affiliations they were getting the message that just about everything is more important than nature. My main dispute with organized religions is that they are promoting a human-centric narrative. People matter to the exclusion of all other species even though we depend on them for everything in our food supply and the sense of wildness in our hearts. Through the media which has permeated all aspects of our lives, we also get a very anthropocentric viewpoint. The news is full of what happened to people. If there is a flood, we are told how many homes and lives were lost. If there is a fire, tornado or any other disaster the focus is the same. No one bothers to calculate the loss of wildlife and native plants, unless a bird is dripping in oil or found in some other gripping way that will bring in viewers. But species, who have been here longer than any of us, continue to disappear mostly in silence while the news cycle tells the same narrative, that people matter over everything else. Few are telling children that other species matter. No one is screaming about the loss of bees and butterflies except those in my corner of the world. Now we hear in the mainstream media, which must mean that it is finally true, that a myriad of new species are being listed as extinct, including the ivory bill woodpecker. It is no surprise to me. I blame it on the fact that our conservation organizations and their members have not been able to find their spine on overpopulation’s role in the demise of the wildlife we pretend to love. Meanwhile we trample over wildlife with such abandon that some are now calling for housing the homeless in national park lands. One cannot mourn the loss of these never to be seen again species without taking into account our incredible population growth over the last 100 years. I tease my dad that when he was born the world had a chance to reserve some of its resources for wildlife. But that was 6 billion people ago. 6 billion is hard to visualize but try this example on for size: 6 billion minutes is the equivalent of 11,415 years. That number represents very significant pressure leading to the demise of wildlife that cloth bags and plant-based diets cannot erase. Any wild animal with a large territory or a requirement for quiet so that they can stalk prey is out of luck. The footprint of our collective human enterprise ( H.E.) includes our ballooning numbers and our mostly unavoidable consumption. Our H.E. ( or one could call it S.H.E. for Shitty Human Enterprise to fit within today’s norms), stomps all over the chance for wildlife surviving in any sustainable population density. To provide for our food requirements alone, huge tracts of land are cleared. Land that was habitat for wildlife is disappears under the disks of combines as they convert acres of prairie into feed and feed lots. It is true that wild animals go extinct as a part of the natural cycle of natural selection. It is often argued by those invested in the world of development, that 99% of all species ever to live on earth are now extinct and they accomplished this without the aid of modern humans. True enough, but that does not let us off the hook for the wildlife annihilation now taking place on the planet. We are experiencing the sixth mass extinction, a rapid increase in extinctions brought about by habitat loss and climate instability, the result of too many people consuming and polluting at rates the biosphere cannot handle. From the pollution of our fossil fuel usage to gobbling up their habitats, our numbers matter. Phrases like “Loss of habitat”, or “Human Activity” are the euphemisms used to describe why animals become endangered. “Degraded habitats” “Invasive species introduction” and “Development” are others which are all inextricably tied to the engine of this train that needs to be named so it can be blamed. Overpopulation is behind it all. Too many people consuming limited natural resources which if stretched due to technical advances only leads to more people. If I were a betting person, I would put my money on challenging anyone to find a sign at a zoo or wildlife refuge that uses the word ‘overpopulation’ as the reason why these amazing animals are now only serving as spectacles and not enjoying their lives in the wild. Just look at any graph of population growth and species loss and they mimic each other. These hockey stick curves go up and up together in destructive unison illustrating a simple but profound truth, the growth of us equals the demise of wildlife. Avoiding this correlation in the conservation community has led us to what I am calling the “condom conundrum”. The fact that better use and easier access to birth control would help wildlife is clear and it is also clear that it has been avoided by the thousands of well-intended conservation groups promising a success that can never be theirs. We need to be seeing population numbers on the front covers of conservation magazines for the way in which our bloated presence is driving so many species to appear on the list of now extinct animals. I would start belonging to them again, if I were to read in between their glossy photos that we are adding 80 million to the H.E. each year globally and many countries are still growing due to immigration. Sir Peter Scott of the World Wildlife Fund wisely said in his later years, how he thought in retrospect that they would have saved more wildlife if they would have focused on birth control. I know plenty of people who sincerely care about wildlife. Thanks to their efforts, the Bald eagle, the Peregrine falcon, Trumpeter swan, the Brown pelican and others have made impressive recoveries, but not without a lot of effort and expenditure. Overall, however, the rates of extinctions and the amount of native plants, vertebrates and invertebrates are disappearing faster than we can count. That’s why the time we are living in now is being referred to as the sixth mass extinction. In my view we have gone about saving species in entirely the wrong way. It’s been very expensive to captive breed and reintroduce wildlife. Adding a specie to the endangered list comes about only when there are so few left researchers can hardly find enough genetic diversity in the remaining rare individuals without risking genetic trouble down the road. As we’ve experienced recently, conservation legislation is only as good as the current political party holding office. Buying up land to keep in conservation easements is another noble but very expensive strategy. We often wait too long to try and save species, and do it in the most costly of fashions. We employ environmental lawyers to sue developers and spend extraordinary efforts to battle those with more money and moxie to save landscapes. Beneath all of these noble efforts is the difficult story about how we have been focused on the wrong problem. I loved to teach about the way the food pyramid, also called the food chain or web, works. With a myriad of games, hikes and lectures I demonstrated the relationship between plants as producers and the various tiers of animal consumers. The most important lesson was that the top of the pyramid needs to have the least number of consumers for it to function as dictated by evolution. In an oversimplified pyramid where grasshoppers eat plants and skunks eat grasshoppers to be followed by owls eating skunks, the owls must always be the least numerous. We are a part of this law of nature but have flipped the pyramid with our success as a specie. The collapse of wildlife which is also affecting our ability to live in this unbalanced world is knocking on our door demonstrating the horrific results of breaking nature’s laws. We have not tried to save wildlife by doing what would have really worked, ratcheting down our numbers and recognizing which laws, policies and economic systems are surreptitiously working to help us grow when we need to be shrinking the entire human enterprise away from the edge of extinction of all life. We have been sold a bill of goods by over 11,000 NGO’s dedicating to global conservation efforts with combined assets of over 3.5 billion dollars. Oh, they are sincere enough, but they would have been much more successful had they partnered with population groups to focus on the multiple ways human numbers have needed to be curtailed with non-coercive but effective methods. There are two parts to the “condom conundrum”. The first part is revealing that overpopulation and the access to birth control is connected to the survival of wildlife. The second part is that birth control advocacy alone will not solve local overpopulation issues by itself. Some countries, including and especially the US, have impressively lowered their fertility rates but their populations are still growing due to increases in immigration. Professor Garret Hardin, wrote prophetically about how to go about solving how humans are overtaking the planet by using the analogy of potholes. Potholes are a global problem, but they must be solved locally. The same is true when it comes to saving our local species on the brink of extinction. We should try to save globally threatened species whenever we can, but we have the most power to save them in our own back yards. It’s sad that many US school children can identify endangered wildlife from other continents while being stumped by those in their own backyards. Young school children can easily identify gorillas and elephants but have a harder time with recognizing that bobcats, lynx and kangaroo rats live here. Concerned about the species on the US endangered species list? Well there are over 1600 and sending money to the United Nations Family Planning Association (UNFPA) will not help them at all. UNFPA will send your hard earned dollars to where the Asian elephant lives, or the Mountain Gorilla, but not to where the desert Tortoise lives, within our borders. Spending money to halt population growth here in the US holds the most hope. Want to help save the Florida panther, the lesser prairie chicken, the monarch butterfly and so many other species suffering from overpopulation’s bulldozers? Make sure all wildlife lovers and the NGO’s they support get on board with overpopulation’s role in their demise. It is an issue which is screaming for attention right here in the USA where it can do the most good. Native habitats will not be adequately protected with cloth bags and address labels from US focused NGO’s who do not also work on US overpopulation for it is our growing numbers which signal the bulldozers of ‘progress’ to invade wildlife habitats to make way for condos and theme parks. The beautiful red-headed woodpecker is threatened because of increased numbers in the US, now numbering 330 million, and what that has meant to the loss of pine savannas. The endangered Karner Blue Butterfly depends on wild blue lupine flowers which used to be found in the pine barrens, oak savannas and dunes of lakeshores before overpopulation turned them into cabins, freeways and strip malls. The Amargosa vole is endemic to the Mohave desert where it depends on rare desert wetland plants and raptors depend on it for food. But overpopulation has drained ground water and introduced invasive species have become its unnatural predators. All you will read about it an any Google search however is at best that ‘human activity’ is causing their demise. For those like me who may be geographically challenged, the Mohave desert is located in California south of Death Valley National Park. The endangerment of the Amargosa vole there is tied directly to the fact that California has added 20 million to its borders since the first Earth Day scolded us for not caring enough about the environment back in 1970. The condom conundrum keeps us from addressing all causes of population growth because focusing only on birth control is not comprehensive enough to help wildlife. According to the Pew Research Center immigrants and their descendants are projected to account for 88% of US population growth through 2065. Until groups like the National Wildlife Federation, Defenders of Wildlife, The Wilderness Society and so many others I no longer feel I can support, address this reality, they will essentially be operating wildlife Ponzi schemes. In the US we grow in our numbers when capitalism and its industries favor loose immigration laws which result in lower wages and high profits for CEO’S and their shareholders. Greed inspires immigration increases and we grow in numbers when rich and powerful industrialists use their wallets to sway politicians. If all goes as planned, they will then vote to keep immigration restrictions to a minimum. This way they can keep wages suppressed and unions from forming so their own portfolios can grow. See the new book “Back of the Hiring line A 200-year history of immigration surges, employer bias, and depression of Black wealth” for a comprehensive look at this history. (Roy Beck 2021). As Beck points out, restricting immigration, when it has happened over the years, improves the chances for employment and economic advancement for the deserving descendants of slavery. We are also growing our immigration numbers due to relaxed and ignored immigration policies already on the books. Those who work to strengthen them should be supported, in the name of improving all issues important to Americans. Just making employers follow the law and hire US citizens would help to curb US population growth and help save jobs for Americans especially those who have been shoved to the back of the hiring line. The Florida panther, the lesser prairie chicken, the monarch butterfly and so many other species suffering from overpopulation’s bulldozers will be thankful too. When we focus solely on China, India, Nigeria and other nations with huge populations and their faster growth rates we are doing a disservice to the wildlife suffering here at home from our own overpopulation issues. Everything from worsening traffic to record breaking crowds at National parks is due to the overpopulation. We are experiencing the loss of these freedoms to move about as we wish and wildlife disappears for the same reason, we cannot continue to pretend that it doesn’t. For reference, we have gained an unsustainable 125 million people in the US since Earth Day 1970. Without a focus on the wildlife consequences of US population growth by conservation groups, don’t expect to see the 41 species of endangered US Salamanders or the Northern Spotted Owl to be returning from the brink of extinction anytime soon.
<urn:uuid:5d9d874c-705a-4576-a182-8c94eb44cd4f>
CC-MAIN-2022-33
https://karenshragg.medium.com/conservations-condom-conundrum-21f9af42439a?source=post_internal_links---------4----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00206.warc.gz
en
0.96142
3,069
2.578125
3
Kolkata, known as Calcutta prior to 2001, is the capital of the West Bengal state in the eastern region of India. Stretching in north-south direction on the eastern bank of the River Hooghly, it usually includes its suburbs along with its 15 million population approximately. This ranks it as the third largest metropolitan city in India and world’s eighth largest agglomeration. The name of the... Kalimpong in Darjeeling district has a unique advantage of being centrally located. The fantastic view from all around, the breathtaking sight of Mt Kanchenjunga, the surrounding forest with rich flora and fauna and the people of this town provide for a spectacular visit for travellers. All major towns of this hill area – Darjeeling, Gangtok, Pelling, and Kurseong are almost at equal distance from Kalimpong. Siliguri is approximately 2.5 to 3 hours away. Lava, Loleygaon, Pedong, Rishyap and Charkhol, really picturesque and worth a visit, are at a distance of 45 minutes to 2 hours. Kalimpong is known for its educational institutions, many of which were established during the British colonial period. Kalimpong then was a transit point for trade between Tibet and India. The town is located on ridge overlooking the Teesta River. Horticulture is a very important business in Kalimpong. The town has flower market and is notable for a wide array of orchids. Nurseries, that export Himalayan grown flower bulbs, tubers and rhizomes. The town is also a religious centre for the Buddhists. - Area: 5 sq. miles (Kalimpong sub-division) - Altitude: 1250 metres (4100 ft) 1,704 meters (5,591 ft) – Delo - Population: 169,663 (approx) - Climate: Summer – 270C Max – Min 17.2oC, – Winter – 15oC Max – Min 7.2oC - Rainfall: 20 inches annually - Clothing: Tropical in summer and light wollen in winter - Languages Spoken: Nepali, Bengali, Hindi & English Kalimpong has five distinct seasons: spring, summer, autumn, winter and the monsoons. The annual temperature ranges from a high of 27oc (86oF) to a low of 70C (48oF). Summers is mild, and are followed by the monsoon rains which lash the town between June and September. Winter lasts from December to February. Traditions & Culture The majority here is that of ethnic Nepali, having migrated in search of jobs while it was under British rule, indigenous groups include the Newars, Lepchas, Bhutia, Sherpas, Limbus, Rais, Magars, Gurungs, Tamangs, Yolmos, Bhujels, Sunuwars, Sarkis, Damais and the Kamis. The other communities are that of Bengalis, Marwaris, Anglo-Indian, Chinese, Biharis and Tibetans Kalimpong is home to Trinley Thaye Dorje – one of the 17 Karmapa incarnations. Kalimpong is the closest Indian town to Bhutan’s western border, and has a small number of Bhutanese nationals residing here. Hinduism is the popular religion, followed by Buddhism and Christianity. The Buddhist monastery Zang Dhok Palri Phodang holds a number of rare Tibetan Buddhist scriptures. There is a mosque in the bazaar area of Kalimpong. Popular festivals include Diwali, Christmas, Dussehra and the Buddhist festival of Losar. Nepali is the predominant language spoken in Kalimpong. The flower nurseries of Kalimpong specialize in the cultivation of exotic orchid species, and other ornamental flowers such as Gladioli, Gerberas, Amaryllis and Anthuriums. The most popular nurseries are Pine View, Universal, Shanti Kunj and L.B Pradhan & Sons Nursery. Arts & Crafts The town is famous for its handicrafts. The artisans produce Tibetan and Bhutanese artefacts and jewellery that are much admired overseas. - Tibetan shoemaking - Silverware and statue making by Sakya craftsman - Bamboo products by Lepcha tribe - Bamboo stools (Murha) by blind school trainees - Tibetan wooden carvings - Carpet marking - Woven bags - Scroll paintings - Thangka paintings Food in Kalimpong is diverse ranging from Nepali, Tibetan to Chinese delicacies. A popular snack in Kalimpong is the Momo (steamed dumplings made up of pork, beef or vegetable cooked in a wrapping of flour) and served with watery soup. Churpee a kind of hard cheese made from yak’s or chauri’s (a hybrid of yak and cattle) milk, is sometimes chewed. A form of noodle called Thukpa, served in soup form is also popular in Kalimpong. There are a large number of restaurants which offer a wide variety of cuisines, ranging from Indian to continental to cater to the tourists. Tea is the most popular beverage in Kalimpong, procured from the famed Darjeeling tea gardens. Some of the locally produced products include cheese and lollypops which were introduced by Swiss missionaries. For Visitors: should try homemade pickle available in the market at Motor stand Kalimpong. Adventure & Interest Trekking in Kalimpong Most of the treks are low altitude Trek time range from 2 to 4 days. The average altitude ranges from 1200 meters to 1500 meters and average distance covered in a day about 12 kms. There treks cover local villages around Kalimpong, these villages are mostly Tamang and Lepcha villages. Local traditions and food are part of the trek itinerary. One of the most popular waters sports in Kalimpong is rafting, on the strong water current of river Teesta. The rafting usually starts from Melli and goes down to 29th mile. Paragliding is a fairly new sport introduced in this region. The flight path starts from the Science City on Delo hill. His is the perfect way to get a panoramic view of the mountain range and Kalimpong. Zang Dhok Palri Phodang This is the largest and most beautiful monastery in Kalimpong. Consecrated by His Holiness, The Dalai Lama in 1976 who also presented ‘The Kangyur’, in 108 volumes to it. Being situated at a height of 1372 meters on the peak of the Durpin Hill, the monastery commands a majestic view of the surrounding areas as well as of the town of Kalimpong. On a clear day, a panoramic view of the Kanchenjunga and the adjacent peaks can be had from this ground. The Zang Dhok Palri Phodang belongs to the Yellow Hat Sect of Buddhism (Gelugpa Sect) to which the present Dali Lama belongs. Getting There: 20 mines drive by taxi towards Durpin from the town Local Tips: light a lamp in the monastery Dr. Graham’s Homes One of the earliest Scottish missionaries to come to Kalimpong was Dr. J.A. Graham. He spent his early years in Kalimpong preaching Christianity, but after duration of time, he diverted his attention towards establishing an orphanage cum schools for the needy Anglo-Indian children. He hence established in 1900 the ‘St. Andrews Colonial Homes’. The first cottage to house these children were built on the slopes of the Tripai Hill. But gradually the entire surrounding area was converted into a township which had its own cottages, farm, chapel, workshop, hospital, bakery playground, poultry, staff quarters and hostels. Getting There: by local taxi 20 minutes’ drive from town Local Tips: enjoy the view from honeymoon hill St. Teresa Church Built by local craftsmen to resemble to Gumba, it has wooden carvings on the walls of Biblical scenes and in continuance to the theme, the characters are depicted in the attire of the Buddhist clergy. Getting There: 10 mines walk from main town center towards Relli road. This recently constructed temple is dedicated to lord Krishna, situated below Sewa Sadan Hospital 10th Mile. Getting There: 15 min walk from town centre. Dharmodaya Vihara is a Nepalese Buddhist temple situated just outside the town. In the year 1944 when the Rana rulers expelled all Theravada Bhikkhus (monks) from Nepal, they travelled to Sarnath along with a large number of devotees. An association was subsequently formed there by the name of Dharmodaya Sabha with patronage of locals. The “Elza Villa” was purchased and converted to be the center of preaching and furthering the teachings of Theravada Buddhism. A library containing rare books on Buddhism and other subjects was established in 1949 for the benefit of local people as well as Bhikkhus and Scholars. Dharmodaya Vihar has become a very important center for scholars of Buddhism from all over the world. Distance from Chuikhim is 25 km via Nimbong. One can also reach from Kalimpong to Rishikhola and Pala, only to a travel distance of 34km. Homestay at Charkhol can be considered as the pioneer. Here there are ten homestay with a healthy competition among himself or herself for upgrading hospital. Added to it is unmatched beauty of the place, where Mt Kanchenjunga is view when sky remains clear. 14 km away from Pedong lies a beautiful river. The farmhouse on the banks of Rishi Khola is also a border for West Bengal and Sikkim. Tourists can spend the day fishing, doing village treks and riverside picnic. One can also spend the night in a riverside resort.
<urn:uuid:968cc5c4-c0c7-4fe0-a833-892d218c1be2>
CC-MAIN-2022-33
https://www.namasteindiatrip.com/blog/kalimpong/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00404.warc.gz
en
0.948561
2,169
2.5625
3
Does your lettuce turn to mush? Mushrooms start to grow fuzzy? Do your bananas blacken before your family can eat them? In the US, the average family of four, loses $1,500 each year to food it has to throw out. This is like tossing one bag out of every four purchased at the grocery store. Food is a necessary expense but there are ways to save money. Check out these tips! 1. Use a Grocery List Keep a grocery list where it’s easily accessible, such as on the fridge, and take it with you to the grocery store. Always shop with a list. Stick to your list for added savings, but do stay flexible if you encounter a sale. Gas for an extra trip to the store easily can add a dollar or more to your grocery bill. And the less you shop, the less likely you’ll buy something on impulse. - Gas to drive four miles for an extra trip to the store: $1.00 (or more!) - Impulse purchase of snack crackers at the store: An additional $2.50 spent. 2. Garbage Check We lose money whenever we toss food because it spoiled before we got around to eating it. If leftovers get the “heave-ho” because they’re left too long, we’re putting money in the garbage can. Plan to avoid tossing foods. Consider: If wilted lettuce frequently goes in your garbage can, serve more salads at the beginning of the week. If extra mashed potatoes get tossed because they’ve lingered too long in the fridge, make less next time. Some other ideas: Use ripe bananas in banana bread; add juice to smoothies or make popsicles; freeze leftovers for another meal. - Tossing a half bag of “tired” lettuce: $1.00. 3. Avoid Shopping When Hungry Everything looks good on an empty stomach. And it’s all too easy to buy something to tide us over in the car until we make it home. Eating before going shopping not only helps forestall impulse buys, it may save calories. If you’re shopping with your kids, feed them in advance as well. - Buying an energy bar at the grocery store to tide you over until you get home: $1.50 more spent. 4. Brown Bag It If you normally eat out at noon, consider brown-bagging it at least one day a week. The typical fast-food meal out easily can cost $5.00 or more. Take food left over from an evening meal to work the next day. A peanut butter sandwich and a piece of whole fruit can be quickly packed from foods on hand. Note: You may save money on your children’s lunch by having them participate in the school lunch program. They can eat a balanced meal that is offered at a reasonable price. - Eating a sack lunch once a week: Save $2.50 (or more!) - Eating a sack lunch five days a week: Save $12.50 (or more!) 5. Coupon Common Sense Use coupons only for foods you normally would eat, rather than for “extras.” Don’t miss out on potential sources of valuable coupons. Check your grocery receipt — sometimes there are great coupons on the back that help save money. Also, if you have access to a computer, check online for coupons. For starters, check the Web site of the store where you shop or for products you use. Often the Web site address for many foods is given on the product label. If possible, shop on double- or triple-coupon days when a store increases the value of coupons. Grocery store loyalty cards may be another source of savings, offering in-store discounts to cardholders. - Not buying that NEW dessert mix just because you have a coupon: Save $2.00. - Using two 50-cent coupons for items you do use: Save $1.00. 6. Check Expiration Dates Avoid buying a food that is past its prime. If it’s on sale and near its expiration date, use it soon. - Avoid dumping a half gallon of soured milk down the drain: Save $2.50. 7. Small-Scale Experiments When trying a new food, buy the smallest size package. If your family doesn’t like the new food, you won’t be stuck with a big quantity. - Buy a small amount of an exotic spice until you discover if your family will eat it in the new recipe: Save $1.50. 8. Costly Convenience Foods How much time do you really save when you buy a convenience food? It takes just a few seconds to mix your own sugar and cinnamon rather than buying it pre-mixed. Microwaving a bowl of regular oatmeal rather than pouring hot water over the contents of a pre-measured package adds only a few minutes. You’re likely to save by cutting fruits and veggies yourself. Plus, the precut ones won’t keep as long! - Buying one carton of old-fashioned or quick oatmeal that provides 30 servings vs. buying three boxes of instant oatmeal that contain 10 packets each: Save $5.50. 9. Staple Food Stock Up Invest in staple foods when they’re on sale. Buying a boatload of bananas (or other perishable foods) isn’t a very good long-term investment. Stocking up on staple items such as reduced-price canned tuna or tomato sauce might be. Remember to check expiration dates. - Stocking up on 10 cans of tuna reduced by 20 cents apiece: Save $2.00. 10. Bulking Up When the Price Is Right and You Can Use It First, do the math and check to see if you actually do save by buying a larger package. The cost of two foods of a smaller size may be a better price than the larger one. Plus, will you use the food while it is still tasty? Always check it out and if the larger size meets your criteria, go for it! - Buying a 5-pound bag of rice instead of a 1-pound bag: Save $1.50. 11. Store Brand Savings Store brands are comparable in nutrition to name brands. And taste-wise there may be little difference. In some comparisons, they have been preferred over the name brands. Some store brands may vary more in size, color, or texture than the name brands. However this may be unimportant, depending on their use. A less-than-perfect-appearing vegetable may be just fine if used in a casserole or soup. Don’t shop just at eye level. Store brands and lower-priced brands tend to be positioned on the top and bottom shelves. The national brands are more likely to be on the middle shelves. - Buying just two store brands and saving 50 cents on each: Save $1.00. 12. Prevent Food Flops Check preparation methods for unfamiliar foods. A tropical fruit may look enticing at the store, but if you’re not sure how to prepare it or where to find more information once you bring it home, think again. Or that new cut of meat — do you slowly roast it or can it be grilled? Either way, find out or risk having a food flop. Often the produce person or the meat manager at the store can give you some tips. Many produce departments have books with descriptions of all items, what they taste like, how to prepare them, etc. - Purchasing a bag of self-rising flour without first reading the recipe’s directions and discovering it won’t work: Lose $2.50. 13. Beware of Snack Attacks Unless you’re fairly active and need the calories, limit snacks such as chips, cookies, candy, etc. You’ll save money and may lose unwanted pounds at the same time. - Buying one less bag of chips weekly: Save $2.00. 14. Shop the Specials Plan your menus around sale items, especially more expensive purchases, such as meat. Buying several packages of meat on sale and freezing them may save quite a bit. The U.S. Department of Agriculture advises that it is safe to freeze meat or poultry in its supermarket wrapping but this type of wrap is permeable to air. So, unless you plan to use them within a month or so, overwrap packages of meat for long-term storage using airtight heavy-duty foil, freezer plastic wrap or freezer paper, or put the packages of meat inside freezer plastic bags. Use these materials to repackage family packs of meat into smaller amounts. While raw ground meat maintains optimum quality in the freezer for 3 to 4 months, larger cuts of meat like steaks or chops will maintain optimum quality for 4 to 12 months. At 0o F, frozen food remains safe indefinitely. The safest way to thaw meat is in the refrigerator on a plate on the bottom shelf so it doesn’t drip on other foods. - Buying meat on sale: Save $2.00. 15. Think Before You Drink Buy a reusable water bottle and fill it with tap water. Your investment soon will pay for itself. Limit consumption of soft drinks and fancy coffees. And if you do buy drinks occasionally, try to buy returnable bottles. - Drinking tap water vs. buying a 12-pack of bottled water: Save $4.00. 16. “Check-out” Temptation As you wait in line, think twice about buying some last minute temptation at the check-out counter. - Resist that magazine: Save $3.50. The more of these tips you use and the more foods you use with them, the more you save. Case in point: If you were able to use each of the preceding examples in one shopping trip, you could save as much as $40 that week. Multiply that by 52 weeks and the savings would be… over $2,000 yearly! Note: Prices in this NebGuide were rounded to the nearest 50 cents and may vary by store and location. Alice C. Henneman, Extension Educator, Nancy G. Frecks, Extension Educator, and Kathy Prochaska-Cue, Extension Family Economist (This article was originally published by the authors as a NebGuide. It is re-published here with their permission.) Make sure to follow The Learning Child on social media for more research-based early childhood education resources!
<urn:uuid:fe1e68e2-7ed2-41c0-bda0-70a9585230a2>
CC-MAIN-2022-33
https://learningchildblog.wordpress.com/tag/food/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00603.warc.gz
en
0.9185
2,290
2.625
3
If you arrived here in search of that North American favorite, vegetarian chili, you have misgoogled; this is about vegetarian food in Chile. But it might be worth reading further; has an extensive repertory of meatless dishes that fed the upper classes on meatless Fridays and the poor all year round. Chile The food of the country people is very simple…. most of the time eating vegetables and above all potatoes, beans, peas, wheat and corn boiled like rice or as toasted flour, and on rare cases meat, preferring to sell the animals they raise and never lack. When it is the hacienda owner who feeds them, they seem to still be in the middle ages for the great uniformity of their food, because it is made up of only a single plate of beans in the north and peas in the south, simply cooked in water or seasoned with a little fat or pork cracklings. This is the diet of all year round, which they prefer and request, feeling that it makes them strong and long suffering for their work, which the results seem to confirm. Whether the Chilean peasantry’s diet was largely meatless by choice, as Claudio Gay’s 1860s work suggests, or through poverty, as is more likely (note that food for festivals and weddings was not meatless) they developed a large variety of meatless dishes, some now classics of ’s Creole cuisine. Chile The food of the indigenous Mapuche, which blended with colonial Spanish cooking to produce Creole cuisine, was based on maize, potatoes, common and lima beans, squash, and quinoa, along with the meat of domesticated llamas and wild game, fish and shellfish. Some of today’s popular meatless dishes are direct descendants of Mapuche foods: Humitas, Chilean tamales (and incidentally the subject of the first post in “Eating Chilean”) continue to be among the 10 most popular Chilean home cooked foods. The original Mapuche humitas were made solely of maize (corn) picked while still in the milky stage, but today’s humitas also include lard, onion and basil, though a vegetarian or vegan version is a simple modification of the recipe in the link above. Porotos Granados, shell beans cooked with corn and squash, are also among Chileans’ top ten home cooked meals. Cranberry beans are boiled with a bit of onion. When within 30 minutes or so of being done, winter squash (zapallo) is added, and when it has cooked soft, corn cut from the cob is added and cooked for an additional 10 minutes until the stew is thick. For a more detailed and illustrated recipe, take a look at this one by Chilean Gringa blogger Eileen Smith. And for a winter version using dry beans and spagetti, there is Porotos con riendas (beans with reins). Tomatican, another Chilean Creole dish with indigenous origins, is a stew of tomatoes, corn, and onions, which may include meat, lima beans or cochayuyo, eatable kelp. Vegetarian versions are common and have entered the international repertory of meatless dishes. Here is a recipe from Mooswood Restaurant Cooks at Home. The version with cochauyo seems not to be available elsewhere in English, so here’s one adapted from Recetas de Cocina.Bundled... and packaged cochayuyo Incidentally cochayuyo is an excelent addition to meatless cooking of all kinds. types. In Vegetarianism as a movement, which began in England in 1847, seems to have arrived in in the late 19th century, along with many other European influences. Der Vegetarier for June 15, 1891: “Herr Rudolf Franck describes the progress of Vegetarianism in Chili. Though the Valparaiso Society numbers only 12 members, it possesses a library and reading room, but, as yet, no restaurant. The chief reason for this want is the difficulty in finding a manager.” Three years later “the Valparaiso Vegetarian Society, which was founded in 1889, now counts 25 members, mostly Germans...” Chile By the 1930s, there were evidently enough Chilean vegetarians to support publication of a cook book, the 1931 Manual of Chilean Vegetarian Cuisine, which, along with many French, Spanish and Italian recipes (pastas, tortillas, vegetable pies and puddings) includes a variety of clearly Chilean dishes: pancurtas (dumplings or noodles for soup), maize chupe (chupes are milk based stews), humitas, stewed hominy, cochayuyo “meatballs,” cochayuyo pudding, fried cochayuyo, stuffed cochayuyo, etc. Her recipe for Stewed Hominy (mote de maiz guisado) is as follows: First pass the maize kernels through clear lye, and when the husks are loose, remove them and boil until cooked, then grind in the machine [food mill], fry in vegetable shortening with a little minced onion and parsley and lighten with milk. To serve, top with two egg yokes, grated cheese and cream, and surround with fried potatoes. Among those Chilean vegetarians of the 1930s the most famous today is Manuel Lezaeta Acharán, author of La Medicina Natural al Alcance de Todos (Natural Medicine in Reach of Everyone), which by 1989 had been published in 148 editions around the world and was the most-read book of natural medicine in Latin America. Born in 1881, he entered the University of Chile medical school in 1899, but was forced to drop out because of syphilis and gonorrhea, then incurable. After unsuccessful treatment by numerous conventional physicians, he met German priest and practitioner of hydrotherapy and diet therapy Tadeo de Wiesent, who returned him to health in a few months. Thereafter, completely disillusioned with conventional medicine, he devoted his life to study and practice of natural medicine. He became an attorney and Professor of Spanish and History at the Santiago Institute of Humanities, and traveled through out the Americas promoting his Thermal Doctrine of the Science of Health. Breathe pure air. Eat exclusively natural products. Be sober constantly. Only drink plain water. Be very clean in every way. Dominate the passions, seeking greater chastity. Never be idle. Rest and sleep only as necessary. Dress simply and with ease, and Cultivate all the virtues, trying to always be happy. Lezaeta Acharán’s dietary philosophy is based on what he considers to be natural law: The natural order establishes that the mineral kingdom sustains the vegetal and the vegetal sustains he animal, from which results that ingestion of mineral substances, as are almost all pharmaceutical products, is to introduce extraneous materials into the organism that should not be assimilated and thus need to be eliminated. (p. 7) Knowledgeable persons… have demonstrated without a doubt, that man is fructivorous that is, that his organism is constituted to feed itself on fruits. , Lamark, Haecke, etc. have confirmed that the physiological analog of the man is the fructivorous ape. (p. 8) Darwin The meat of animals has not been destined to feed man and, more than food, it is a stimulant owing to the toxins that it possesses, among which are creatine, creatinine, cadaverin, etc., which injected into a rabbit in small quantities cause its sudden death. (p. 8) Many think that a fruit diet is insufficient because shortly after having eaten they feel the need to eat again. On the other hand a plate of meat or beans or “satisfies” the person for several hours. This is explained because fruits and seeds are digested and assimilated easily without leaving unhealthy residues. In contrast a piece of meat or a plate of beans require an extended effort that makes the individual feel full for the four hours or more required for digestion, or better said, for “indigestion.” (p. 98) The diet he recommends is based on fruits, seeds, leaves and roots, and includes limited amounts of whole grain bread, soft cheeses, hard cooked eggs, honey, milk, olives and even wine, but meats, fish and legumes (beans, lentils, etc.) are to be avoided: Breakfast: Only raw fruits in season or dry if fresh are not available. Lacking this, a plate of raw oatmeal soaked in water for 20 minutes or more, and sweetened with honey or raisins, figs or bananas. Dinner at mid day: Freely if hungry, preferring salads with olives or chopped hard cooked egg, vegetables in season with nuts, omelets of vegetables mixed with egg, fresh cheese [quesillo] or raw sugar; a little bread is possible if it is whole grain or toasted. Avoid lunch meats, fried foods, and condiments such as pepper or mustard. Supper: If hungry one may eat as in mid day, but in smaller quantities. Generally a salad or a bit of raw fruit will be sufficient. Eat slowly and deliberately to generate abundant saliva. Avoid sweets, conserves, milk, aged cheese, soft cooked eggs, and meat broths. Don’t smoke. (p. 181) Lezaeta Acharán’s teachings continue to be followed in Latin America and In spite of Lezaeta Acharán’s fame, vegetarians remain a distinct minority in , where annual per capita meat consumption is now over 81 kg. (just under ½ lb. per day), but meatless meals continue to be a regular part of many households’ diets. Recipes in the most recent (April, 2011) edition of Chile ’s major food magazine, Paula Cocina are almost all meatless (presumably for Lent), and my wife’s family has always had occasional meatless dinners; usually once a week or more. Chile Our most popular meatless dishes are tortillas, Spanish style omelets, and vegetable tarts or pies; both of which I learned from my wife. Tortillas are literally “little cakes” a term the Spanish applied to the Mexican maize bread, the Aztecs called taxcal, and to little breads or cakes most everywhere. But this tortilla is a mixture of eggs and vegetables (sometimes meats are added) eaten as a main course or cut into small pieces as appetizers or tapas. Serve hot or at room temperature. The classic Spanish tortilla contains potatoes and onions, but an infinity of tortilla varieties are popular in Spain and in here in as well. Chile The basic procedure is to precook the vegetables, season with salt and pepper, mix with beaten eggs and allow to soak for a few minutes. The mixture is then poured into a hot, well-oiled skilled and cooked slowly until about ¾ set. The tortilla is then turned over (here’s how) and cooked a few minutes more, until the center is set but still moist. Tortilla de porotos verdes (green beans) The classic Spanish tortilla of potatoes and onions calls for the vegetables to be simmered in olive oil until cooked, but not brown, then drained and added to the eggs. For a slightly less caloric version parboil the thinly sliced potatoes for a few minutes instead of frying. Green beans, another family favorite, are also best parboiled, as are broccoli, cauliflower, etc., but spinach, zucchini, chard, peppers, mushrooms, tomatoes, eggplant, etc. are best sautéed in olive oil along with a few sliced onions. Very wet vegetables like spinach, chard, tomatoes and zucchini should be drained or squeezed to remove most of their liquids. A tablespoon or two of flour added to the eggs is also a good idea with many fillings to prevent watery tortillas. And while not traditional, cheese also makes a good addition. Some of our favorites are spinach and onion, French cut green beans with mushrooms, sliced zucchini with red bell peppers, potatoes with bell peppers, caramelized onions, and so on. And of course a tortilla is a great way to use leftovers. Do you have leftover rice, Brussels sprouts and winter squash? Make a tortilla. Another favorite is a vegetable pie, a pastel de verduras, like my wife’s green bean, onion and mushroom tart below. The procedure is to make a pie crust, then parboil the beans and sauté the mushrooms and onions. Mix with blanched green beans and moisten with cream (½ cup or so), fill the crust and top with a lattice of pie dough. Bake in a moderate oven until the crust is brown. Spinach or chard also makes a good filling. Vegetarian restaurants and products “The Vegetarian Endeavor in Santiago” in Revolver Magazine has restaurant reviews. Reinaldo’s blog: Tiendas de comidas vegetarianas (Stores with vegetarian foods) Cocina del mercado A blog on vegetarian cooking and recipes by the chef/owner of one of ’s best known Vegetarian restaurants—in Spanish. Santiago Chile Forum: Food in Chile. An English language forum with a search function where you can search for (and find!) where to buy tofu, soy milk, etc. Gay, Claudio. 1862-1865. Agricultura, Tomo 2. París: En casa del autor; Chile: Museo de Historia Natural de Santiago, p. 161. On line at http://www.memoriachilena.cl/temas/documentodetalle.asp?id=MC0002688 Terra, Blog Gouyr.net. El Terremoto se quedó con el premio Bicentenario. 2010-03-26. On line at http://www.terra.cl/gournet/index.cfm?pagina=blog_comentario&idpost=16733&idblog=16&titulo_url=El_Terremoto_se_quedo_con_el_premio_Bicentenario Vergara Díaz, Lucía. 1 931. Manual de cocina vegetariana chilena. Santiago: Impr. Gutenberg, selected chapters on line at http://www.memoriachilena.cl//temas/dest.asp?id=manualdecocinavegetarianachilena Manuel Lezaeta Acharán. Wikipedia Español. On line at http://es.wikipedia.org/wiki/Manuel_Lezaeta_Achar%C3%A1n Villa De Vida Natural “Manuel Lezaeta Acharan”, Tomas Moro 261, Las Condes. Telefonos 716 3250
<urn:uuid:85fbb0ea-ac49-4d6d-9af1-1425b592c3fc>
CC-MAIN-2022-33
https://eatingchile.blogspot.com/2011/05/vegetarian-chile.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00005.warc.gz
en
0.92687
3,223
2.625
3
Setup and Config Getting and Creating Projects Branching and Merging Sharing and Updating Projects Inspection and Comparison - Command-line interface conventions - Everyday Git - Frequently Asked Questions (FAQ) - All guides... A Git repository comes in two different flavours: .gitdirectory at the root of the working tree; <project>.gitdirectory that is a bare repository (i.e. without its own working tree), that is typically used for exchanging histories with others by pushing into it and fetching from it. Note: Also you can have a plain text file .git at the root of your working tree, containing gitdir: <path> to point at the real directory that has the repository. This mechanism is often used for a working tree of a submodule checkout, to allow you in the containing superproject to git checkout a branch that does not have the submodule. The checkout has to remove the entire submodule working tree, without losing the submodule repository. These things may exist in a Git repository. Object store associated with this repository. Usually an object store is self sufficient (i.e. all the objects that are referred to by an object found in it are also found in it), but there are a few ways to violate it. You could have an incomplete but locally usable repository by creating a shallow clone. See git-clone. You could be using the $GIT_ALTERNATE_OBJECT_DIRECTORIESmechanisms to borrow objects from other object stores. A repository with this kind of incomplete object store is not suitable to be published for use with dumb transports but otherwise is OK as long as objects/info/alternatespoints at the object stores it borrows from. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/objects" will be used instead. A newly created object is stored in its own file. The objects are splayed over 256 subdirectories using the first two characters of the sha1 object name to keep the number of directory entries in objectsitself to a manageable number. Objects found here are often called unpacked (or loose) objects. Packs (files that store many object in compressed form, along with index files to allow them to be randomly accessed) are found in this directory. Additional information about the object store is recorded in this directory. This file is to help dumb transports discover what packs are available in this object store. Whenever a pack is added or removed, git update-server-infoshould be run to keep this file up-to-date if the repository is published for dumb transports. git repack does this by default. This file records paths to alternate object stores that this object store borrows objects from, one pathname per line. Note that not only native Git tools use it locally, but the HTTP fetcher also tries to use it remotely; this will usually work if you have relative paths (relative to the object database, not to the repository!) in your alternates file, but it will not work if you use absolute paths unless the absolute path in filesystem and web URL is the same. See also objects/info/http-alternates. This file records URLs to alternate object stores that this object store borrows objects from, to be used when the repository is fetched over HTTP. References are stored in subdirectories of this directory. The git prune command knows to preserve objects reachable from refs found in this directory and its subdirectories. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/refs" will be used instead. records tip-of-the-tree commit objects of branch records any object name (not necessarily a commit object, or a tag object that points at a commit object). records tip-of-the-tree commit objects of branches copied from a remote repository. records the SHA-1 of the object that replaces <obj-sha1>. This is similar to info/grafts and is internally used and maintained by git-replace. Such refs can be exchanged between repositories while grafts are not. records the same information as refs/heads/, refs/tags/, and friends record in a more efficient way. See git-pack-refs. This file is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/packed-refs" will be used instead. A symref (see glossary) to the refs/heads/namespace describing the currently active branch. It does not mean much if the repository is not associated with any working tree (i.e. a bare repository), but a valid Git repository must have the HEAD file; some porcelains may use it to guess the designated "default" branch of the repository (usually master). It is legal if the named branch name does not (yet) exist. In some legacy setups, it is a symbolic link instead of a symref that points at the current branch. HEAD can also record a specific commit directly, instead of being a symref to point at the current branch. Such a state is often called detached HEAD. See git-checkout for details. Repository specific configuration file. This file is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/config" will be used instead. A slightly deprecated way to store shorthands to be used to specify a URL to git fetch, git pull and git push. A file can be stored as branches/<name>and then name can be given to these commands in place of repository argument. See the REMOTES section in git-fetch for details. This mechanism is legacy and not likely to be found in modern repositories. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/branches" will be used instead. Hooks are customization scripts used by various Git commands. A handful of sample hooks are installed when git init is run, but all of them are disabled by default. To enable, the .samplesuffix has to be removed from the filename by renaming. Read githooks for more details about each hook. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/hooks" will be used instead. The current index file for the repository. It is usually not found in a bare repository. The shared index part, to be referenced by $GIT_DIR/index and other temporary index files. Only valid in split index mode. Additional information about the repository is recorded in this directory. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/info" will be used instead. This file helps dumb transports discover what refs are available in this repository. If the repository is published for dumb transports, this file should be regenerated by git update-server-info every time a tag or branch is created or modified. This is normally done from the hooks/updatehook, which is run by the git-receive-pack command when you git push into the repository. This file records fake commit ancestry information, to pretend the set of parents a commit has is different from how the commit was actually created. One record per line describes a commit and its fake parents by listing their 40-byte hexadecimal object names separated by a space and terminated by a newline. Note that the grafts mechanism is outdated and can lead to problems transferring objects between repositories; see git-replace for a more flexible and robust system to do the same thing. This file, by convention among Porcelains, stores the exclude pattern list. .gitignoreis the per-directory ignore file. git status, git add, git rm and git clean look at it but the core Git commands do not look at it. See also: gitignore. This file stores sparse checkout patterns. See also: git-read-tree. Stores shorthands for URL and default refnames for use when interacting with remote repositories via git fetch, git pull and git push commands. See the REMOTES section in git-fetch for details. This mechanism is legacy and not likely to be found in modern repositories. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/remotes" will be used instead. Records of changes made to refs are stored in this directory. See git-update-ref for more information. This directory is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/logs" will be used instead. Records all changes made to the branch tip named Records all changes made to the tag named This is similar to info/graftsbut is internally used and maintained by shallow clone mechanism. See --depthoption to git-clone and git-fetch. This file is ignored if $GIT_COMMON_DIR is set and "$GIT_COMMON_DIR/shallow" will be used instead. If this file exists, $GIT_COMMON_DIR (see git) will be set to the path specified in this file if it is not explicitly set. If the specified path is relative, it is relative to $GIT_DIR. The repository with commondir is incomplete without the repository pointed by "commondir". Contains the git-repositories of the submodules. Contains administrative data for linked working trees. Each subdirectory contains the working tree-related part of a linked working tree. This directory is ignored if $GIT_COMMON_DIR is set, in which case "$GIT_COMMON_DIR/worktrees" will be used instead. A text file containing the absolute path back to the .git file that points to here. This is used to check if the linked repository has been manually removed and there is no need to keep this directory any more. The mtime of this file should be updated every time the linked repository is accessed. If this file exists, the linked working tree may be on a portable device and not available. The presence of this file prevents worktrees/<id>from being pruned either automatically or manually by git worktree prune. The file may contain a string explaining why the repository is locked. If this file exists, it is a hard link to the linked .git file. It is used to detect if the linked repository is manually removed. Part of the git suite
<urn:uuid:4cb3e3b1-1859-4e05-aff8-af909ff30312>
CC-MAIN-2022-33
https://www.git-scm.com/docs/gitrepository-layout/2.12.5
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00005.warc.gz
en
0.854198
2,683
2.96875
3
The Alutiiq people (pronounced // in English; from Promyshlenniki Russian Алеутъ, "Aleut"; plural often "Alutiit"), also called by their ancestral name Sugpiaq (// or //; plural often "Sugpiat"), as well as Pacific Eskimo or Pacific Yupik, are a southern coastal people of Alaska Natives. They are not to be confused with the Aleuts, who live further to the southwest, including along the Aleutian Islands. A Sugpiaq dancer man with Agnguaq[clarification needed] |Regions with significant populations| |Sugcestun, English, Russian| |Russian Orthodox Church, traditional religion| |Related ethnic groups| Their traditional homelands include Prince William Sound and outer Kenai Peninsula (Chugach Sugpiaq), the Kodiak Archipelago and the Alaska Peninsula (Koniag Alutiiq). In the early 1800s there were more than 60 Alutiiq villages in the Kodiak archipelago, with an estimated population of 13,000 people. Today more than 4,000 Alutiiq people live in Alaska. At present, the most commonly used title is Alutiiq (singular), Alutiik (dual), Alutiit (plural). These terms derive from the names (Алеутъ, Aleut) that Russian fur traders and settlers gave to the native people in the region. Russian occupation began in 1784, following their massacre of hundreds of Sugpiat at Refuge Rock (Awa'uq) just off the coast of Sitkalidak Island near the present-day village of Old Harbor (Nuniaq). Given the violence underlying the colonial period, and confusion because the Sugpiaq term for Aleut is Alutiiq, some Alaska Natives from the region have advocated use of the terms that the people themselves use to describe their people and language: Sugpiaq (singular), Sugpiak (dual), Sugpiat (plural) — to identify the people (meaning "the real people"), and Sugstun, Sugcestun, Sugt'stun, or Sugtestun to refer to the language. All three names (Alutiiq, Aleut, and Sugpiaq) are used now, according to personal preference. Over time, many other ethnonyms were used to refer to this people. Fishing and housingEdit The people traditionally lived a coastal lifestyle, subsisting primarily on ocean resources such as salmon, halibut, and whale. They supplemented these maritime foods with rich land resources, such as berries and land mammals. Before contact with Russian fur traders, they lived in semi-subterranean homes called ciqlluaq. Today, in the 21st century, the Alutiiq live in coastal fishing communities in more modern housing. They work in all aspects of the modern economy, while also maintaining the cultural value of subsistence. In 2010 the high school in Kodiak responded to requests from Alutiiq students and agreed to teach the Alutiiq language. It is one of the Eskimo languages, belonging to the Yup'ik branch of these languages. The Kodiak dialect of the language was being spoken by only about 50 persons, all of them elderly, and the dialect was in danger of being lost entirely. - Report on Population and Resources of Alaska at the Eleventh Census: 1890 by United States Census Office - Alaska - 1893 (= "The Kaniagmiut, to whom the Russians applied the name of Aleut") - East Prince William Sound Landscape Assessment, Cordova Ranger District, Chugach National Forest. September 9, 2008 (= "The term Alutiiq is the Sugtestun pronunciation of the Russian-introduced name Aleut and is commonly used as a self-designation by the people of the Chugach region") - Mapping Alaska's Native languages (= Names derived from a combination of Russian and Native words include: Alutiiq, from the Russian word Aleut (a term something like English "Eskimo" but referring to the people of the Aleutian Islands, the Alaska Peninsula, and the Kodiak archipelago); plus the Russian plural suffix -y; plus the Native singular suffix -q) - "Alutiiq / Suqpiaq Nation", Alutiiq Museum - Laurie Shannon Richmond (2011), "Regulating a Mystery: Science, colonialism, and the politics of knowing in the Pacific halibut commons" Archived 2013-01-24 at the Wayback Machine, Conservancy, February 2011 - Pullar, Gordon L. 2010. Assimilation and Identity among the Kodiak Island Sugpiat, 2010 - "Looking Both Ways", Museum of Natural History, Smithsonian Institution] - Medeia Csoba DeHass, "What is in a Name?: The Predicament of Ethnonyms in the Sugpiaq-Alutiiq Region of Alaska", Arctic Anthropology. January 2012, pp. 49:3-17 (= "Aleut," "Alutiiq," "Sugpiaq," "Russian," "Pacific Eskimo," "Unegkuhmiut," and "Chugach Eskimo" are all different names that have been used to identify the group of Native people living on the Lower Kenai Peninsula of Alaska.) - "Tlingit, Eskimo and Aleut armors." Archived 2014-02-22 at the Wayback Machine Kunstamera. Accessed 10 Feb 2014. - Michael Krauss: "Alaska Native Languages in Russian America." In: Barbara S. Smith & Redmond J. Barnett, Russian America: The Forgotten Frontier, pp. 205–213. Washington State Historical Society, Tacoma, WA, 1990. - "Kodiak High School Adding Alutiiq Language Class", Jacob Resnick KMXT/Alaska Public Radio Network 12-17-2010 - "2007 Fellows Individual Pages - MacArthur Foundation". Archived from the original on 2012-03-15. Retrieved 2018-10-14. - Braund, Stephen R. & Associates. Effects of the Exxon Valdez Oil Spill on Alutiiq Culture and People. Anchorage, Alaska: Stephen R. Braund & Associates, 1993. - Crowell, Aron, Amy F. Steffian, and Gordon L. Pullar. Looking Both Ways; Heritage and Identity of the Alutiiq People. Fairbanks, Alaska: University of Alaska Press, 2001. ISBN 1-889963-30-5 - Harvey, Lola. Derevnia's Daughters, Saga of an Alaskan Village. A story about the Old Village of Afognak up to and including the strongest earthquake ever recorded on the North American continent and the resulting tsunami of March 27, 1964. 1991 ISBN 0-89745-135-X - Lee, Molly. 2006. ""If It's Not a Tlingit Basket, Then What Is It?": Toward the Definition of an Alutiiq Twined Spruce Root Basket Type", Arctic Anthropology. 43, no. 2: 164. - Luehrmann, Sonja. Alutiiq Villages Under Russian and U.S. Rule. Fairbanks: University of Alaska Press, 2008. ISBN 978-1-60223-010-1 - Mishler, Craig. 1997. "Aurcaq: Interruption, Distraction, and Reversal in an Alutiiq Men's Dart Game", The Journal of American Folklore. (Vol. 110, no. 436): 189-202. - Mishler, Craig. 2003. Black Ducks and Salmon Bellies: An Ethnography of Old Harbor and Ouzinkie, Alaska. Donning Company Publishers. Distributed by the Alutiiq Museum & Archaeological Repository, Kodiak, Alaska. - Mishler, Craig, and Rachel Mason. 1996. "Alutiiq Vikings: Kinship and Fishing in Old Harbor, Alaska", Human Organization : Journal of the Society for Applied Anthropology (Vol.55, no. 3): 263-269. - Mulcahy, Joanne B. Birth & Rebirth on an Alaskan Island; The Life of an Alutiiq Healer. Athens: University of Georgia Press, 2001. ISBN 0-8203-2253-9 - Partnow, Patricia H. Making History Alutiiq/Sugpiaq Life on the Alaska Peninsula. Fairbanks, Alaska: University of Alaska Press, 2001. ISBN 1-889963-38-0 - Simeonoff, Helen J., and A. L. Pinart. Origins of the Sun and Moon Alutiiq Legend from Kodiak Island, Alaska, Collected by Alphonse Louis Pinart, March 20, 1872. Anchorage, Alaska (3212 West 30th Ave., Anchorage 99517-1660): H.J. Simeonoff, 1996. - "The Afognak Alutiiq People: Our History and Culture" (PDF). Afognak Native Corporation. 2008. Archived from the original (PDF) on 2013-11-13. Retrieved 2014-11-15. - "Afognak Village Timeline". Afognak Native Corporation. Retrieved 2014-11-15. - East Prince William Sound Landscape Assessment. "East Prince William Sound Landscape Assessment" (PDF). - Ben Fitzhugh (2003). The Evolution of Complex Hunter-Gatherers: archaeological evidence from the North Pacific. Kluwer Academic/Plenum Publishers. - United States Census Office (1893). "Report on Population and Resources of Alaska at the Eleventh Census: 1890". - Sven Haakanson (2010). Written Voices Become History. Left Coast press. - Holton, Gary. "Mapping Alaska's Native languages". Alaska Native Language Center. Retrieved 2014-11-15. Names derived from a combination of Russian and Native words include: Alutiiq, from the Russian word Aleut; plus the Russian plural suffix -y; plus the Native singular suffix -q - Miller, Gwenn A. (2010). Kodiak Kreol: Communities of Empire in Early Russian America. Ithaca, NY: Cornell University Press. ISBN 978-0-8014-4642-9. - "About the Alutiiq People". - Jacob Resnick. "Kodiak High School Adding Alutiiq Language Class". Alaska Public Radio Network. - Laurie Shannon Richmond (2011). Regulating a Mystery: Science, colonialism, and the politics of knowing in the Pacific halibut commons (PDF). Archived from the original (PDF) on 2013-01-24.
<urn:uuid:11e51151-c5f9-424e-8e2c-4a4537217a99>
CC-MAIN-2019-22
https://en.m.wikipedia.org/wiki/Alutiiq_people
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00062.warc.gz
en
0.81587
2,282
3.53125
4
The six port network has emerged as a successful receiver architecture with application in metrology, communications, remote sensing, displacement/misalignmentdetection and direction finding due to its precise phase measurement resolution and accuracy. Over the years various design techniques have been used depending upon the application and desired performance specifications. In this article, a comprehensive taxonomy of six port architectures and design techniques is presented under various categories such as topology, number of layers and prominent design features. Furthermore, a comprehensive comparative analysis among different six port design techniques is carried out based on key performance characteristics including operating bandwidth, design complexity, insertion loss, return loss, transmission coefficients, phase performance and physical characteristics. Advantages gained by multilayer and multi-section approaches in terms of bandwidth and compactness are discussed. Basic operation is presented making use of simple analytical expressions suitable for a direction finding (DF) or angle of arrival (AOA) detection system. Various operational enhancements with respect to direction finding are also included, such as extended field of view (FOV) and dual angle detection (azimuth and elevation). Open problems and future research directions are suggested based on the survey. A direction finding system measures the AOA of an intercepted electromagnetic (EM) signal with respect to the host platform or some reference axis. Locating a signal source is of critical importance both from a civilian and military perspective. There are numerous commercial DF applications such as search and rescue, navigation, automotive radars, misalignment detection, astronomy and telecommunications. Military applications of direction finding or AOA estimation may be more obvious. In electronic warfare, a direction finding receiver is integrated with an electronic intelligence (ELINT) receiver providing AOA information which helps in initial sorting of an intercepted signal. Similarly, a moving intercept platform with a DF system can triangulate hostile radars based on several converging lines of bearing (LOBs), which results in the formulation of an electronic order of battle (EOB). Moreover, a DF system can provide early warning of an impending attack and help the host platform take appropriate evasive maneuvers. In a potent electronic attack system, AOA information of a hostile emitter can also be used to jam it effectively. AOA estimation or direction finding has been accomplished using different architectures and techniques since the advent of radio waves. The basic techniques can be divided into Amplitude Comparison, Phase Comparison (Interferometry), Time Difference of Arrival and Frequency Difference of Arrival. Single or multiple channel DF receivers can be used depending upon the complexity of the system. It is well established that phase interferometry provides the best angular resolution and accuracy.1, 2 Phase interferometry can be implemented in both the digital signal processing (DSP) and microwave domains as shown in Figure 1. DSP based solutions require large antenna arrays consisting of multiple antenna elements, coherent receivers to preserve phase and amplitude information, multiple analog-to-digital converters (ADCs) and DSPs adding to overall cost and complexity. Some AOA estimation algorithms used extensively are Multiple Signal Classification (MUSIC), Estimation of Signal Parameters using Rotational Invariance Technique (ESPRIT), Maximum Likelihood Estimation (MLE) and Correlative Phase Interferometry.1, 2 Alternatively, most DF processing can also be carried out in the microwave domain. In multiple microwave-based DF solutions, a four port phase comparator is used to detect the phase difference between incident signals received at its two input ports from which AOA is determined. The phase difference is computed from the I/Q signals at its two output ports. This technique provides reasonable angular accuracy; however, the use of mixers in its architecture adds inaccuracy in phase detection.3 Moreover, at high frequencies the design of active mixers and direct conversion components becomes difficult. Phase noise and DC offset are also generated at a mixer output port due to local oscillator (LO) leakage and amplitude imbalance between RF and LO ports. Due to these inherent limitations, an alternate receiver architecture based on a six port phase comparator has been adopted in DF applications for the last decade. This phase detector design eliminates mixer inaccuracies by using only passive elements. SIX PORT NETWORK BASICS The advent of six port technology dates back to 1972 when Engen4 described its applications in power measuring devices; however, as planar microstrip design and fabrication technology was not mature enough at that time, it did not gain much popularity. It is only in the last decade that the engineering community has started to realize six port applications in numerous fields. A six port network can also be called an RF interferometer.5 The overall architecture of a six port network, along with input/output signals at each component, is shown in Figure 2. It is an alternative homodyne receiver architecture that provides vector measurement of the two complex input signals by taking scalar measurements at its four output ports. It achieves this through the superposition of the two input signals, producing relative phase shifts of 0, 90, 180 and 270 degrees between the incident signals at its four output ports.5-8 These superpositions and relative phase shifts are carried out using a network of 0/180 degree power dividers, quadrature hybrid couplers and 90 degree phase shifters. Depending upon the inherent phase shift between the incident signals, they interfere constructively or destructively at the four output ports. Diode power detectors are then used at the output ports to convert high frequency signals to baseband voltages. The diodes behave as ideal square law detectors, i.e. the voltage at the output of the detector is proportional to the square of the magnitude of the input waves. Assume the incident complex signals at Ports 1 and 2 to be Aejφ1 and Bejφ2 respectively. A, B are the magnitudes and φ1, φ2 are the incident phases. The superimposed signals at the four output ports of the six port network are shown. The following equations show the baseband signals at the output of power detectors. These are achieved by taking the square of the magnitude of the complex output signals at the four output ports assuming ideal square law detectors. The quadrature and in-phase pairs (Q+, Q- & I+, I-) are then fed to differential amplifiers to generate quadrature and in-phase signals respectively. Sum and difference trigonometric identities are applied to extract the quadrature sine and in-phase cosine components of the incident signal complex ratio. The phase difference (Δφ = φ 2 - φ 1) between the two complex signals Aejφ1 and Bejφ2 can be easily computed using the following expression: The relationship between the phase difference and the AOA (θ) can be found as: where L is the distance between two antenna elements and θ is the angle of incidence which can be found using Equations 7 and 8. Hence, in a direction of arrival (DOA) detection system, the six port network acts like a high resolution phase comparator extracting the I/Q components from the two incident signals. These I/Q signals are then digitized and used in the DSP domain to calculate the angle of arrival. Determining the distance between antenna elements requires a tradeoff between unambiguous FOV and angular resolution/accuracy. It is chosen according to the specific application or in some cases dual baselines are used to achieve both. The six port network has been one of the biggest innovations in RF and microwave technology in the last decade with numerous applications (see Figure 3). Initially, it was used in portable vector network analyzers9 and reflectometers; however it has recently been used in industrial applications such as precise direction finding and ranging.7 In the field of communications, a six port homodyne receiver architecture can be utilized for direct up conversion/down conversion and modulation/demodulation. It can also be used in 5 G to support ultra high data rates.10 Six port networks have direct applications in optical coherent receivers at extremely high frequencies where the design of conventional architectures becomes very complex. In medical science, vibration and remote heartbeat/respiratory rate sensing have been achieved with the six port’s precise phase resolution.11 Wide applicability is possible because of its numerous advantages, including: - High phase resolution. - Absence of phase noise as no LO is required. - Only passive RF components are used. - Low size, weight, power and cost (SWaP-C). - Good performance at high frequencies (microwave and mmwave bands) providing high data rates suitable for ultra-wideband applications. - 6 port RF front end can be calibrated. However, there are design tradeoffs that must be considered: - High insertion loss results in reduced overall dynamic range. It is dependent on having a high gain LNA stage. - Amplitude and phase imbalances in the transmission coefficients of a six port network result in I/Q gain and phase errors, which must be compensated. Hence, I/Q gain and phase equalization is done by calibration at the DSP level. - Diode power detectors are nonlinear devices and contribute additional errors; however these can also be compensated through calibration at the DSP level. TOPOLOGIES AND DESIGN TECHNIQUES A comprehensive survey (see Table 1) focuses on six port network design techniques. Over the years, researchers have used different subcomponents and design methodologies to achieve relative quadrature phase shifts at the four output ports, the signature of a six port network. This survey focuses particularly on broadband designs that can support multimode and multiband applications and analyzes them based on relevant parameters such as operating bandwidth, design complexity, layers, reflection and transmission coefficients (both simulated and measured), phase performance and dimensions. The techniques reviewed are categorized by the following design topologies: - Three quadrature hybrid couplers (QHCs) & in- phase/out-of-phase power divider (PD). - Four PDs & 90 degree phase shifters. - Four QHCs & 90 degree phase shifter. Figure 4 is a classification taxonomy that groups each technique by basic topology, single/double layer design and prominent design feature. A separate categorization for operational enhancements in six port DF designs is included and discussed later. Topology 1 (Three QHCs and one PD) Topology 1 consisting of three couplers and a divider is the one most widely used. This topology provides the minimum insertion loss (6 dB theoretical) as the input signal passes through only two components. The basic setup consists of two RF inputs feeding 2 LNAs (for extending dynamic range), then the six port network followed by four power detectors feeding into two differential amplifiers to generate the I/Q signals for phase detection. Using this architecture, six ports have been designed in single (see Figure 5) and multilayers (see Figure 6).
<urn:uuid:6643db61-4828-4de8-8a40-5bf918d948eb>
CC-MAIN-2022-33
https://www.microwavejournal.com/articles/33307-a-survey-of-six-port-network-techniques-for-direction-finding-applications
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00604.warc.gz
en
0.922639
2,269
2.765625
3
Members of the pro-life movement often describe policies that work to undermine the recognition of human dignity and to devalue human life as promoting the “culture of death.” This term was made popular by Pope St. John Paul II in his encyclical Evangelium Vitae, where he used it to describe cultures that malform consciences and promote false ideas of morality by tolerating or supporting sins at the societal level. He wrote: “It is also a question, in a certain sense, of the ‘moral conscience’ of society: in a way it too is responsible, not only because it tolerates or fosters behaviour contrary to life, but also because it encourages the ‘culture of death’, creating and consolidating actual ‘structures of sin’ which go against life. The moral conscience, both individual and social, is today subjected, also as a result of the penetrating influence of the media, to an extremely serious and mortal danger: that of confusion between good and evil, precisely in relation to the fundamental right to life” (EV 24). He juxtaposes this term with its opposite, a “culture of life”: “This situation, with its lights and shadows, ought to make us all fully aware that we are facing an enormous and dramatic clash between good and evil, death and life, the ‘culture of death’ and the ‘culture of life’. We find ourselves not only ‘faced with’ but necessarily ‘in the midst of’ this conflict: we are all involved and we all share in it, with the inescapable responsibility of choosing to be unconditionally pro-life” (EV 28). Even though Evangelium Vitae touches upon many topics (including the death penalty, ecology, and care for the poor), the document gives particular attention to the evils of abortion and euthanasia. As a result, the “culture of death” came to be associated primarily with these issues in the eyes of many Catholics. Still, the fact that the pro-life movement has adopted the expression “culture of death,” indicates some consciousness of how a culture of death is usually a symptom of a more prevalent and insidious disease. In other words, culture of death is not a cause, but a consequence of something deeper. Catholics are particularly sensitive to past papal teachings when they try to diagnose the underlying causes of the culture of death. Sometimes it is ascribed to a “contraceptive mentality,” and Humanae Vitae is praised for being prophetic in this regard. Others will bring up the “dictatorship of relativism,” against which Benedict XVI cautioned. There is another papal expression, however, that sadly did not penetrate the pro-life lexicon as readily. In fact, most people might not even associate it with the culture of death. I am talking about the concept of “throwaway culture,” something Pope Francis has repeatedly decried. The first time the Holy Father used this expression in a major document was in Evangelii Gaudium: “Just as the commandment ‘Thou shalt not kill’ sets a clear limit in order to safeguard the value of human life, today we also have to say ‘thou shalt not’ to an economy of exclusion and inequality. Such an economy kills … Human beings are themselves considered consumer goods to be used and then discarded. We have created a ‘throw away’ culture which is now spreading. It is no longer simply about exploitation and oppression, but something new. Exclusion ultimately has to do with what it means to be a part of the society in which we live; those excluded are no longer society’s underside or its fringes or its disenfranchised – they are no longer even a part of it. The excluded are not the ‘exploited’ but the outcast, the ‘leftovers’” (EG 53). In retrospect, it is easy to understand why “throwaway culture” did not find common acceptance with some Catholics. When Francis said these words, he did so in the context of economic matters, to decry inequality and exclusion. He even goes on to shun “trickle down theories … never confirmed by the facts” (EG 54). On the surface, this expression may not seem to have a direct connection with abortion and euthanasia. In fact, in our current hyper-polarised and hyper-politicised environment, “throwaway culture” was likely associated with social justice causes that many in the pro-life movement tend to associate with their political enemies. Nevertheless, simple logic tells us that “throwaway culture” is also intrinsically connected to abortion and euthanasia. Is there any other subset of human beings in today’s developed world so prone to be viewed as a “consumer good … to be discarded” as the unborn child? This isn’t just a metaphor. Today, human embryos are produced in labs as commodities and are literally thrown away when they are no longer useful. Euthanasia is also sold to the public as a solution to the expense of caring for the elderly and the infirm, who—like unborn children—are “burdens” on our economy. Many of those who promote abortion and euthanasia seem to say, “Why should we spend so much money on a problem that can easily be done away with?” We can also argue that “throwaway culture” points to many of the underlying roots of the culture of death that concern Francis’s Catholic critics. For example, artificial contraception makes it easier for a person to use another for sex, and then discard the other person (and the relationship) when it’s convenient. Can’t it be said that a symbol of the throwaway culture is a used condom in a trash can following a one night-stand? And of course this is also a potential cause for abortion, since an arrangement like this cannot sustain a child conceived by accident. Abortion is usually proposed as the easiest solution to that conundrum. This does raise a question, however. Does Pope Francis himself see these issues as part of the throwaway culture? Does Francis intend for abortion, euthanasia, contraception, and the destruction of human embryos as an extension of the throwaway culture that is most often associated with social injustices and economic inequality? The answer is yes. For example, in Amoris Laetitia, Francis discusses how the “throwaway culture” undermines romantic relationships: “Here I think, for example, of the speed with which people move from one affective relationship to another. They believe, along the lines of social networks, that love can be connected or disconnected at the whim of the consumer, and the relationship quickly ‘blocked’. I think too of the fears associated with permanent commitment, the obsession with free time, and those relationships that weigh costs and benefits for the sake of remedying loneliness, providing protection, or offering some service. We treat affective relationships the way we treat material objects and the environment: everything is disposable; everyone uses and throws away, takes and breaks, exploits and squeezes to the last drop. Then, goodbye. Narcissism makes people incapable of looking beyond themselves, beyond their own desires and needs” (AL 39). On euthanasia, Amoris Laetitia also references Francis’s general audience address of March 11, 2015, in which he said this about the elderly: “The first important thing to stress: it is true that society tends to discard us, but the Lord definitely does not! The Lord never discards us. He calls us to follow Him in every age of life, and old age has a grace and a mission too, a true vocation from the Lord. Old age is a vocation … How I would like a Church that challenges the throw-away culture with the overflowing joy of a new embrace between young and old! This is what I ask of the Lord today, this embrace! … I invite all, especially in this favourable season of Lent, to commit yourselves to building a society in which there is room to welcome each one, most of all when one is elderly, sick, poor and fragile.“ The connection becomes even more clear and straightforward in Francis’s latest encyclical Fratelli Tutti. He opens his section titled “A throwaway world” with the words: “Some parts of our human family, it appears, can be readily sacrificed for the sake of others considered worthy of a carefree existence. Ultimately, ‘persons are no longer seen as a paramount value to be cared for and respected, especially when they are poor and disabled, ‘not yet useful’ – like the unborn, or ‘no longer needed’ – like the elderly. We have grown indifferent to all kinds of wastefulness, starting with the waste of food, which is deplorable in the extreme. A decline in the birth-rate, which leads to the aging of the population, together with the relegation of the elderly to a sad and lonely existence, is a subtle way of stating that it is all about us, that our individual concerns are the only thing that matters” (FT 18). The footnote to passage from Fratelli Tutti references a 2014 address where the connection is made even clearer: “Unfortunately, what is thrown away is not only food and dispensable objects, but often human beings themselves, who are discarded as ‘unnecessary’. For example, it is frightful even to think there are children, victims of abortion, who will never see the light of day.” The idea of the throwaway culture did not begin with Pope Francis, however. We can go back to the same document that brought the expression “culture of death” to prominence. John Paul II makes essentially the same point in Evangelium Vitae, when he describes how the culture of death is fostered by cultural elements that see weak, disabled, or otherwise “unproductive” people as burdens to be removed: “This culture [of death] is actively fostered by powerful cultural, economic and political currents which encourage an idea of society excessively concerned with efficiency. Looking at the situation from this point of view, it is possible to speak in a certain sense of a war of the powerful against the weak: a life which would require greater acceptance, love and care is considered useless, or held to be an intolerable burden, and is therefore rejected in one way or another. A person who, because of illness, handicap or, more simply, just by existing, compromises the well-being or life-style of those who are more favoured tends to be looked upon as an enemy to be resisted or eliminated” (EV 12). There is seamless continuity between these popes on this matter. And they both saw that the culture of death (or throwaway culture) applies to many issues in addition to abortion and euthanasia. For example, Francis links the throwaway culture to pollution and environmental destruction in Laudato Si’ and to the exploitation of young people in Christus Vivit as well. And both Francis and John Paul would agree that it is impossible to effectively fight the culture of death while ignoring the throwaway culture pervading our contemporary world. Certainly, sexual immorality and relativism also contribute to this state of affairs. And of course, we can’t ignore our opposition to these evils of our age. But social realities are multifactorial. Multiple causes will typically come into play to strengthen each other to produce the final effect. And this is what has led to the culture of death. Pro-life Catholics must not ignore this. It is also vital to remember, as John Paul II says in Evangelium Vitae, that the greatest cause of the culture of death is a loss of the sense of God in our day and age. We can rediscover this sense of God by following the Magisterium faithfully and heeding its warnings. “Throwaway culture” has been a consistent theme in Francis’s pontificate, just as “dictatorship of relativism” was for Benedict XVI, and “culture of death” was for John Paul II. Likewise, it is necessary to include the expression “throwaway culture” in our lexicon. We will not succeed in our mission to change the culture of death unless we work to end the throwaway culture. Pedro Gabriel, MD, is a Catholic layman and physician, born and residing in Portugal. He is a medical oncologist, currently employed in a Portuguese public hospital. A published writer of Catholic novels with a Tolkienite flavour, he is also a parish reader and a former catechist. He seeks to better understand the relationship of God and Man by putting the lens on the frailty of the human condition, be it physical and spiritual. He also wishes to provide a fresh perspective of current Church and World affairs from the point of view of a small western European country, highly secularised but also highly Catholic by tradition. With thanks to Where Peter Is, where this article originally appeared.
<urn:uuid:3f5c4086-2db8-44dc-86ba-3b509b128d17>
CC-MAIN-2022-33
https://catholicoutlook.org/a-throwaway-culture-is-a-culture-of-death/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00204.warc.gz
en
0.959048
2,755
2.875
3
Caught Up in a Story: Fostering a Storyformed Life of Great Books and Imagination with Your Children (Colorado: Whole Heart Press, 2003)., Stories are the lifeblood of existence. They are the heartbeat that pumps vision into a child’s developing imagination and hope into his or her soul. In her book, Caught up in a Story, Sarah Clarkson takes on the task of revealing the essential nature of good literature, of story itself for the formation and education of children. Drawing on her own childhood steeped in good literature, and her extensive study of literature in adulthood, she identifies the purpose of her book as two-fold: to uncover the role that good stories play in the formation and growth of the imagination, and to re-claim for us, especially parents, the importance of the imagination for all aspects of a fully human life. The structure of the book follows the traditional “dramatic arc” structure found within many classic narratives, linking each point in the arc with a period of childhood: “Exposition” with early childhood, “Rising Action” with the elementary period, “Crisis” with adolescence, “Falling Action” with young adulthood, and “Dénouement” with the need for a “happy ending.” Each chapter develops a different aspect of the reason why stories are so important at that particular stage of a young person’s life, and ends with Clarkson’s own suggestions of good books to be introduced during each stage. In the first two chapters Clarkson lays the groundwork of her argument by exploring more fully our culture’s denigration of imagination, even for children: Parents today are often presented with a list of facts and skills they must pound into their children’s heads. Childhood formation, according to many models, seems to be about the filling of a mental bucket rather than the forming of a whole, vibrant soul ready to act justly, love beauty, and bring goodness to the world.(7) In contrast to such a view, which only gives value to what is “useful,” stories reinforce for children the deeper realities that make life worth living; they build up and form the imagination. Today, Clarkson argues, imagination is too often relegated to a naïve childishness, a certain escapism… something opposed, at least on some level, to the common-sense, pragmatic world of adulthood. Rather, the understanding of imagination that Clarkson employs harkens back to the original, traditional sense of the term: that faculty of our intellect that allows us to form images of real things within our mind: to re-present, and hold onto a picture of the things we encounter in the world, even when not directly beholding them with our eyes. In this sense, imagination is a faculty that we cannot do without, at any age; it, in fact, is an essential component to our engaging with and comprehending reality at all. In our pragmatic age, when we are consumed with practicalities and causes and results, it is easy to lose sight of the storied nature of existence. Conditioned as we are by a technological society in which productivity is success, our view of life often takes the shape of the goals we must accomplish, the money we must make, even the spiritual growth we must attain. This pragmatism extends to our view of childhood formation as well, as we hurry to teach children the right facts and habits so that they can take the right tests and accomplish the right things. But in our pressured drive to do many things, we forget what we were created to be: heroes and heroines in the great true tale of God. (15) Clarkson argues that forming children in stories that give vivid introductions to what is good, true, and beautiful from the earliest years gives them the necessary ethos in which to experience the depth and wonder of the world, and the story to which they belong. Literature expands the child’s world through imagery; it introduces them to an array of settings, contexts and characters that incarnate and give form to such concepts as courage, goodness, and love. It also provides children with a rich and varied vocabulary by which to understand the world on a deeper level. Being introduced to different stories inspires children to take on, to “try out” the different roles and personas they encounter: they experiment living and walking in others’ shoes. These experiences form the adult’s ability to relate to others, to have the capacity to insert themselves within the stories and experiences of others. The next chapters focus on the “Crisis” moment of a story—which, as we recall, the author has linked to the period of adolescence—and the “Falling Action” of young adulthood. Clarkson argues that without a richly developed imagination, not only is a child’s understanding of, and relation to, the world diminished, but also his sense of self. Without this sense of self, children lack the ability to enter into, and fully participate in the unfolding of their own “stories.” The result is a listless, apathetic and easily swayed generation of young people who follow blindly whatever cultural opinion wins out at the time, because they lack the tools to really adhere to things from the depths of a richly formed interior life. The contemporary drive of childhood formation tends to focus exclusively on external activities, to the detriment of forming a child’s interior life, resulting in children who know what to do, but not why: who have no habits of reflection and interior contemplation in which to know themselves and the world on a rich, deep level. Here, Clarkson also identifies the danger of technology that plays into this problem. Technology, she maintains, is not a neutral force in the life of a child. When children learn early in their lives to depend on technology for entertainment and information, they lose the habit of imagination. Trained from an early age to turn to any available screen for entertainment, learning, or even comfort, they become unused to imagining something for themselves. … when children addicted to technology become adults, they will lack the creative faculty required to bring something new into existence… such children will lack a richly developed world within themselves, allowing them both to intuit spiritual realities beyond their sight, but also to perceive meaning within the beauty of the world.(23) In contrast, stories are what give the young person, especially in moments of crisis, the substance of heroism, the real sense that one’s choices matter on a deep level, and that we have the capacity to choose, to risk all of ourselves. Without a richly developed sense of self, one’s concept of heroism is also diminished. Children, Clarkson says, are growing up in a world that no longer believes heroism is realistic; indeed, a world which is so relativistic as to deny there is anything black and white to stand up for or against in the first place. It is the reality that our lives really do belong to a drama larger, deeper, and more significant than our lives alone that can restore to us this sense of heroism. “Heroism begins,” Clarkson says, “when we realize that we are called to join a story much larger than ourselves” (65). In her last chapter, Clarkson focuses on hope: on the ability of stories to lead us into a “happy ending”. It is hope, Clarkson argues, which gives us the context in which to understand that the darkest periods, the hardest nights, the worst imaginable circumstances, as well as the drudgery of everyday banality are still not all of the story. When we are brought up steeped in stories in which other people walked through the darkest, hardest moments, and were brought to a happy ending, our minds and hearts and spirits learn to rely on the broader, deeper truth that the immediate problems, or the immediate disasters do not define, or sum up, the whole of our persons. Here, Clarkson speaks to the necessary companionship that the characters of good stories can offer to those living through the tumultuous periods of adolescence and young adulthood. As human beings, we need companions on the way, companions who can encourage us. And while she acknowledges that stories can never replace true, real companionship, Clarkson would still have us recognize the significance of having people such as Wendell Berry’s Hannah Coulter or Charles Dickens’ Amy Dorritt as concrete examples to turn to along the way. While she does not address this directly, what struck me in reading this book was the problem that stretches much deeper than our overuse of technology, or materialism, or loss of imagination. The deeper void that Clarkson is seeking to address is the fact that we live in a narrative-less society. Our modern culture is in many ways a “non-cultural culture,” as Romano Guardini put it: we do not share a common way of life, formed and founded on a rich, full, history and tradition, passed on from one generation to another. In a certain sense, the reason that good literature is more crucial for today’s child than ever before is because the modern child does not come into the world aware of belonging to a family, much less a narrative, a history, a people, a reality that is beyond him or her. Every other period of history has given to its young people a fully developed way of life. They grew up formed by the oral stories and traditions of their ancestors, of the people that had literally broken the ground on which they lived, had built the homes in which they dwelled, and had founded the world they inherited. They were surrounded by a very living and real companionship, a history to which they belonged, and from which they received themselves. This reality is foreign to us today. And in the face of such a reality, it is a gift to discover an artist such as Clarkson, who can remind us first of our need for this, and recall us to one of the ways we can still access this storyformed life: through the stories written for us from a world that still understood itself as an unfolding story belonging to something greater. In a world in which it is increasingly hard to look to those around us for real heroes, for examples of what real living looks like, good stories can be an access point, a reminder to us, and can give us the foundation to continue to build and live a true life. Clarkson’s book is deep, and thought provoking. And it is a joy to read. Her argument about the value of good stories, about the importance of using language to articulate a rich picture of the world is reinforced in her own beautiful use of words, and her ability to do for us within her book exactly what she is arguing for: steeping the reader in the images and characters of so many stories within a book advocating for their necessity. I would highly recommend this book to parents, to educators, and to anyone feeling lost in an increasingly fast-paced, isolated, technological world, where our souls are parched for the rich, deep, satisfying, experience of being restored to the larger story of which all of our lives are an invaluable part. Siobhán Maloney is an assistant to the Center for Cultural and Pastoral Research at the John Paul II Institute in Washington D.C., where she recently received her M.T.S.
<urn:uuid:e89b824f-dab3-440a-b2d6-96db20de5acd>
CC-MAIN-2019-22
https://humanumreview.com/articles/the-meaning-of-story
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258451.88/warc/CC-MAIN-20190525204936-20190525230936-00222.warc.gz
en
0.960993
2,361
3.0625
3
Applications of Mathematics Abound at ICME-10 (Daren Starnes, The Webb Schools, Claremont, CA). From the opening session at the International Congress on Mathematical Education (ICME) in Copenhagen, it became abundantly clear that applications in the mathematics curriculum would permeate the lectures, discussion groups, poster sessions, national presentations, and the thematic afternoon. My intent in this brief report is to provide an overview of the variety of mathematical applications that were shared at ICME-10, along with some ideas for using such applications in mathematics classrooms. At the end of the paper, I will also relate some potential obstacles that might discourage teachers from incorporating applications in their classes on a regular basis. ICME-10 was held at the Danish Technical University (DTU) in Lyngby, about 20 kilometers outside Copenhagen. During his welcoming remarks, the mayor of Lyngby surprised most of the 2300 mathematics educators in the audience by revealing that he had earned a Ph. D. in mathematics from DTU some years earlier. At one point in his presentation, the mayor displayed a graph showing the population of Lyngby over time. The graph showed what appeared to be exponential growth in Lyngby’s population in the mid-to-late 1900’s, followed by a small decline (coinciding with the relocation of DTU from Copenhagen to Lyngby, which eliminated considerable land from being available for housing development), and then small growth more recently. The question the mayor posed to the assembled group was, “What happens next?” Would exponential growth resume, or would some other mathematical function better describe the population of Lyngby over the short term? This preliminary application nicely represents the idea of using functions to model relationships between two Classroom ideas: Some related examples for the classroom would be asking students to construct a model of world population growth over time, or of the number of Starbucks stores that were open in each year since the company’s founding. It seems critical that students should see examples of both exponential (unconstrained) and logistic (constrained) growth. Hundreds of posters addressing topics in mathematics education were presented at ICME-10. Several of them focused on applications and mathematical modeling. Two posters especially captured my interest. The first, which was designed by Thorir Sigurdsson from Iceland, examined the stunning decline of the herring population in the ocean between Iceland and Norway in the 1960’s. In his poster, Thorir useds available data from 1953-1963 together with a combination of trigonometric and sinusoidal functions ( S = Aebt [1 + C sin(Dt )] , where S is the stock size and t is time) to construct a very reasonable model for the herring stock from 1964 onward. He went on to assess the quality of his model in light of actual herring stock sizes. The second poster, authored by Chris Haines and Rosalind Crouch from England, was titled “Real World – Mathematical Model Transitions.” Their primary modeling task was to have students examine whether opening an express line for customers with a small number of items to purchase would decrease waiting times at a supermarket with numerous checkout lines. This scenario differs in an essential way from the two earlier population modeling examples; namely, the goal is not to fit a functional model to existing data. Instead, students must make some simplifying assumptions about the number of checkouts, the distribution of customer arrivals at the checkout, and the number of items that each customer will purchase. Students can then use simulation techniques to compare the average waiting times for customers under each of the two plans: no express lane or one express lane. Although this is a somewhat “messier” modeling problem, it is quite rich in mathematical thinking and in applicability. I should mention that Haines and Crouch also suggested modeling the height of a sunflower while it is growing, a more data-based modeling problem. An especially entertaining part of the ICME-10 evening program was the final round of the KappAbel Competition, in which students from the five Nordic countries made dynamic presentations on this year’s theme, mathematics and music. A charming group of five Danish 8th graders dazzled audience members with a brilliant blend of song and accompaniment on water glasses. (Their command of spoken English was equally impressive.) After their musical performance, the team members proceeded to analyze the mathematics behind the tones that they had produced on the water glasses. They explained that the frequencies of consecutive notes on the scale are in a ratio of 12 2 . The students also performed simple experiments to investigate such things as the effect of the temperature of the water in the glass on frequency and of using a liquid that was not water on the frequency (some effect). This engaging activity is an excellent illustration of applications of mathematics in There is perhaps no subject that is more riferipe with mathematical applications than physics. I attended two lectures that reaffirmed this belief: “Use of mathematics in other disciplines” and “Mathematics Learning and Experimenting with Physical Phenomena”. In the former, the speaker acknowledged that in many high schools, teachers tend to stay compartmentalized by discipline. As a result, mathematics and physics teachers do not always interact comfortably. Not surprisingly, students sometimes feel that there are missing connections between mathematical ideas and physics concepts. Very few advanced students who were taking both advanced math and physics classes could solve this problem, in spite of the fact that they had been taught all of the necessary mathematics and physics to do so. The speaker hypothesized that many physics teachers try to minimize the mathematical level of the physics topics that they present and that the math teachers generally avoid using such complex physics examples. In the second lecture connecting mathematics and physics, one of the speakers (Apolinario Barros) presented the results of a mathematical experiment involving circular motion that his students had performed. Using a motion detector connected to a computer data collection program and a wooden wheel with a speed control, students were challenged to match a position versus time graph of a large orange ball that was “velcroed” to the wheel. It was fascinating to listen to students’ reactions to an initial attempt to match the graph, as well as to the suggestions that led them through subsequent repetitions of the experiment. Apolinario offered what he described as a “paradigm for describing mathematical • Action/response: One takes an action and measures a response to that action. • Collective interpretation: Teacher and students offer interpretation in the process of trying to solve a problem. This relates directly to the process of mathematical modeling, in which one : defines a research question/problem to solve, collects appropriate data, formulates a mathematical model, the tests the model, and refines the model. An additional problem that was posed in the same session that illustrates connections between calculus and physics. Problem: Consider a bar of charge with charge density of (5 + 7 x)µC / m , where x is measured in meters and x = 0 at the left end of the bar. If the bar is half a meter long, what is the total charge on the bar? Classroom idea: Construct a similar non-uniform density problem with a baseball Because my own interests have pulled me deeper into statistics teaching these past few years, I was particularly interested in the statistics-related sessions that I attended at ICME-10. My favorite was a talk given by Rolf Biehler from the University of Kassel in Germany. He spoke in some detail about results from research that he and his colleagues have conducted in the area of technology-supported statistics education. They chose to use the software Fathom in their work with students aged 17-19 and with student teachers at the As a preliminary example of using simulation for studying variation in probability, Biehler Rolf suggested the following activity: have students write down a sequence simulating a sequence of random births of boys and girls. He compared students’ typical sequences to computer-generated sequences from Fathom. Students’ sequences tended to switch back and forth from boys to girls more frequently, and included fewer long “runs” of births of the same gender than did the Fathom sequences. Rolf’s presentation also illustrated the kinds of questions students can ask and then produce data to answer in high school mathematics classes: • How do males and females differ in TV watching time? • Do those who watch more TV tend to read less? Students can easily collect data related to their questions of interest, then use mathematical tools to analyze the data they have collected. Questions like the first one above allow for graphical and numerical comparisons of univariate data sets – boxplots, stemplots, histograms, as well as measures of shape, center, and spread. The second question is ideal for examining correlation, and perhaps fitting a regression model to the data. What obstacles might prevent mathematics teachers from incorporating applications from other disciplines or to use modeling problems in their classrooms on a regular basis? 1. Lack of subject matter knowledge. Some math teachers’ ready recall of physics content may be quite limited. As a result, they would be hesitant to utilize rich physics applications in their classes. Suggestion: Arrange a conversation with a colleague who teaches physics. Forming such a collaborative partnership can be mutually beneficial! It will allow you to use interesting physics applications and it will also help the physics teacher feel more comfortable incorporating additional mathematics content in the context of their physics teaching. Your students may begin to transfer their understanding from one class to the other more readily. Solving data-based modeling problems and application problems takes time. Many teachers feel pressured by content-laden syllabi, which discourages them from allocating class time to modeling and applications. Suggestion: Examine the feasibility of adding one engaging application/modeling problem per unit. Students could be given the problem description and some instructions for thinking about the problem before class to reduce the amount of class time required. 3. Discomfort with problems that have multiple solutions. Most standard textbook questions (and even classroom examples) have a single correct answer. A mathematical modeling problem can have a host of reasonable solutions, depending on the assumptions that are made and the approach to solving the problem that is taken. Suggestion: Encourage students to employ alternative methods in the course of solving a data-based modeling problem. For instance, have students compare linear, power, and exponential models for a data set showing a relationship between variables. Ask students to select the one they consider the “best” model, and to be prepared to justify their choice. 4. Difficult to assess/evaluate. Unlike standard computational problems, modeling and data-based application problems cannot be easily evaluated using an analytic grading system. These more complex problems can also require more time to evaluate. Suggestion: Consider using a rubric that focuses on the critical elements of the problem’s solution and on the quality of a student’s communication of his or /her mathematical thinking. Remember that you are assessing the process leading to the development of the model, as well as the quality of the model that the student has selected. My own experiences at ICME-10 certainly reinforced my belief that engaging students with authentic and varied mathematical applications will enhance their understanding of the mathematics involved. Both data-based and situation-based modeling problems can help students see the wide utility of mathematics in solving real problems.
<urn:uuid:69fe3c07-26e8-4a20-9aee-972a80ae3b66>
CC-MAIN-2022-33
http://icme-10.dk/starnes.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00602.warc.gz
en
0.941631
2,598
2.890625
3
Federal Social Welfare Act |Title:||Federal Social Welfare Act| |Scope:||Federal Republic of Germany| |Legal matter:||Social law| |References :||2170-1 a. F.| |Original version from:||June 30, 1961 ( BGBl. I p. 815 , ber.p. 1875 ) |Entry into force on:||June 1, 1962| |New announcement from:||March 23, 1994 ( BGBl. I p. 646 , ber.p. 2975 ) |Last change by:|| Art. 25 G of December 23, 2003 ( Federal Law Gazette I p. 2848, 2895 ) |Effective date of the |January 1, 2004 (Art. 124 G of December 23, 2003) |Expiry:||predominantly January 1, 2005 (Art. 68 G of December 27, 2003, Federal Law Gazette I p. 3002, 3070 ) |Please note the note on the applicable legal version.| The Federal Social Welfare Act came into force on June 1, 1962 and replaced the 1924 Reich Principles on Requirements, Type and Measure of Public Welfare (RGr) and the Ordinance on Duty of Care (RFV) . The law was prepared in the Federal Ministry of the Interior by Gerhard Scheffler , a lawyer who used to belong to the NSDAP and head of the social department . Since 1976, the Federal Social Welfare Act has been part of the Social Code (SGB). Since then, the general regulations of the SGB (especially SGB I and SGB X ) have also been applied to social assistance. As of January 1, 2005, the provisions of the BSHG have been replaced by the provisions in Book Twelve of the Social Code (SGB XII). When the Federal Social Law was introduced, the legislature hoped that, due to the economic miracle , fewer and fewer people would be dependent on state welfare benefits, and if so, then only temporarily. This should also apply initially, expenditure on social assistance benefits rose only slightly in absolute terms and even fell relatively, so that benefits were gradually expanded and maintenance obligations relaxed. However, that was to change with the emergence of the phenomenon of mass unemployment at the end of the 1970s. Previously, the focus was on personal help, but more and more people were dependent on services to secure their livelihood, which, contrary to the legal concept, developed into a permanent condition. In addition, due to the increase in the number of disabled people in Germany since the mass extermination of disabled people under National Socialism, the costs, especially for the home accommodation of this group of people, rose massively, so that the legislature was forced to counteract the increase in costs through changes in the law. Savings in the priority social security systems put an additional burden on the social assistance agencies. The greatest savings concerned the standard rate , which was increased further in absolute terms, but the increases regularly lagged behind the general price trend. In addition, there was a change from the basket model to the statistical model and the introduction of the wage gap rule , according to which social assistance may not be higher than the average wage of a single-earner family with three children. In order to create incentives for self-help, the obligations to make efforts and to take up reasonable work have been expanded. The possibility of funding training from social assistance funds ( training assistance ) was dropped without replacement in favor of priority benefits (BAB / Bafög). Additional requirements were either deleted or the requirements tightened. In the area of personal help, the needy person's right to wish and choose was initially restricted to the effect that outpatient help always takes precedence over inpatient help and inpatient help can only be provided if outpatient help does not meet the needs of the needy. This was adjusted in 1996 so that outpatient help was excluded if it would involve disproportionate additional costs compared to inpatient help. Due to a transitional regulation that is still in force today, people who received outpatient assistance without a proportionality test in 1996 continue to have an unrestricted right to this assistance. (SGB XII) A further saving was made through the introduction of service agreements between the social assistance providers and the service providers, in particular the operators of fully inpatient homes, as well as the restriction of the needy’s right to wish and choose to service providers with such a service agreement. This strengthened the possibility for social welfare providers to specify the level of benefits unilaterally and thus trigger cost pressure on the part of the home operator, resulting in competition, since home operators without such a service agreement actually had no more chance on the market. Individual help (Section 3), the ability of those in need to help themselves (Section 1, Paragraph 2) and the principle of subordination of social assistance (Section 2) were defined as the principles of social assistance in the Federal Social Assistance Act. An important principle was the subordination of social assistance: Own assets had to be used primarily for subsistence, claims against other social benefit providers, maintenance claims etc. had to be asserted, reasonable work had to be accepted. Demand coverage principle According to the case law of the Federal Administrative Court, the principle of covering needs was also known under the sentence “no social assistance for the past”. According to jurisprudence, social assistance was regarded as a service intended to remedy a current plight of the needy. If the needy has eliminated the emergency situation in the past, in the same way as, he had no right to a retroactive grant of social assistance for the past or the assumption of any debts that may arise due to the non-granting of social assistance. The Federal Administrative Court made an exception if the social welfare institution refused the requested benefit or, after a reasonable processing time, did not make a decision at all on the application and the needy procured this benefit himself by means of self-help. There was an exception when a third party performed in the expectation that the social welfare provider would cover his expenses (e.g. by admitting the needy to a nursing home), in this case also after the death of the needy. Approval of social assistance According to the case law of the Federal Administrative Court, the granting of social assistance did not, in principle, constitute an administrative act with permanent effect that the needy could invoke; social assistance was "not a permanent benefit equivalent to a pension and, as it were, in need of new regulation every day". The prerequisites for the granting of social assistance had to be present on each day the benefit was granted; if this was not the case, the law lapsed the entitlement without the need for an express notice of annulment by the social welfare agency. As a result, there was also no suspensive effect of objections and lawsuits against the refusal of current benefits for social assistance. In the Federal Social Welfare Act, a distinction was made between assistance with subsistence (ongoing assistance and one-off assistance in the event of economic emergencies) and assistance in special situations (primarily assistance with care and integration assistance for disabled people). The biggest difference was in the different income and assets offsetting, for example, quite generous allowances were granted on the income for assistance in special life situations. If help was given in the form of inpatient accommodation in special situations, the benefits covered the entire need, including subsistence and one-off benefits. (Section 27 Paragraph 3 BSHG) Help with living The support for livelihood should primarily cover the necessary livelihood. According to § 12 BSHG, the necessary livelihood includes food, accommodation, clothing, personal hygiene, household effects, heating and personal needs of daily life, especially cultural participation. The necessary livelihood was granted in the form of standard rates that covered the current living needs. All needs that did not represent an ongoing need were granted as a one-off service, such as clothing and shoes, household items, repairs to the apartment, procurement of fuel, school supplies and services for special occasions (e.g. Christmas allowance ). Accommodation costs were primarily covered by the housing benefit , although no separate application was necessary since 1991, but housing benefit was granted together with the support for living expenses. In individual cases, the social welfare agency was also able to cover costs that exceeded the housing benefit. If the apartment was unreasonably expensive, the beneficiary had six months to rent a suitable apartment, otherwise all services were completely discontinued. In the case of families, the office appointed a head of the household (usually the father) who received the full standard rate. All other household members received only 80 percent of the standard rate, and underage children sometimes received less. Young people, on the other hand, received higher benefits than adults because they were granted a so-called need for growth. The level of the standard rates was determined by the individual federal states; the office could set a different standard rate if this was necessary due to the special situation of the individual case. For certain groups of people, the law stipulated additional needs across the board, for example for people with walking difficulties, pregnant women, single parents and people who were dependent on medically prescribed health food. In addition to the necessary livelihood, the support for livelihood also included the assumption of health and long-term care insurance contributions (Section 13 BSHG), the coverage of contributions for a death benefit insurance and old age insurance (Section 14 BSHG) as well as the assumption of funeral costs (Section 15 BSHG). The subordination of assistance to livelihood was also expressed in extensive work and maintenance obligations. Parents and children were fundamentally obliged to cover the needs of the beneficiary as part of their maintenance obligations and could, if necessary, be called upon in court by the social welfare agency. The beneficiary himself had to contribute to reducing his need by taking up a reasonable job; if he refused, the benefits could be reduced or, in individual cases, even completely canceled. In the early days the BSHG saw in § 26 is still the possibility of people who are persistently refused, despite repeated requests to make reasonable work against their will in a closed institution ( workhouse ) accommodate . The Federal Constitutional Court declared the legal right of placement to be constitutional, but only to the extent that ongoing maintenance assistance had to be granted to dependents as a result of the refusal to work. In this case, the norm serves to protect the general public, since they ultimately have to support the family. With the abolition of the workhouse in criminal law and the closure of such institutions, the regulation increasingly came to nothing and so it was deleted again in the early 1970s. Help in special situations Help in special situations included: - Help to build up or secure a livelihood - Training aid (not applicable in 1983) - Help with illness - Integration assistance for disabled people - Tuberculosis Aid (dropped in 1987) - Help for the blind - Help with care - Help to keep the budget going - Help for those at risk (declared unconstitutional and void by the Federal Constitutional Court in 1967) - Help to overcome particular social difficulties - Elderly care - other aids not mentioned above Income and assets credit The tax allowances for assistance with subsistence amounted to € 1,279 (previously DM 2,500), aid in special situations was € 2301 (previously DM 4,500), and for blind people and those in need of extreme care (care level III) € 4,091 (previously DM 8,000). Due to a special regulation (Section 88 (3) sentence 3 BSHG), disabled people who worked in a workshop for disabled people were subject to an increased asset tax allowance of € 23,010 (ten times the tax allowance that would otherwise apply to help in special situations). The urban and rural districts were responsible for social assistance benefits; in certain cases also supra-local authorities (for example in North Rhine-Westphalia the regional associations). As part of the Hartz IV concept, on January 1, 2005, the previous unemployment benefit was merged with social assistance under the BSHG for job seekers and their relatives to form unemployment benefit II. The new benefits under SGB II are flat-rate and are essentially only slightly more than the level of the previous social assistance under the BSHG. The previous regulations of social assistance according to the BSHG became part of SGB XII . At the same time, the basic security for old age and reduced earning capacity introduced in 2003 with its own law (GSiG Basic Security Act) was added to SGB XII . According to this law, people over the age of 65 and people with permanent or temporary disability receive support. The prerequisite for receiving benefits is need , which SGB II mentions and expressly defines need for help in Section 9. Those who are not covered by ALG II and basic security in old age can still be entitled to benefits for subsistence support (social assistance according to SGB XII). Services under the laws mentioned here are largely flat-rate. Help related to individual cases, e.g. B. for defective furniture or other household items are only granted as loans in special cases, other needs such as the Christmas allowance are no longer recognized separately. In SGB XII there is the rarely used option of setting the standard rate higher or lower if the need is significantly different. In SGB II, the obligation to also take permanent special needs into account was created by judgment 1 BvL 1/09 of the Federal Constitutional Court of February 9, 2010 and was later adopted by the legislature. - Ulrich-Arthur Birk: Federal Social Welfare Act. Teaching and practice commentary . 4th edition. Nomos Verlagsgesellschaft, Baden-Baden 1994, ISBN 3-7890-3314-6 . - Friederike Föcking: Care in the economic boom. The creation of the Federal Social Welfare Act of 1961 . Oldenbourg Verlag, Munich 2007, ISBN 978-3-486-58132-4 . - Reich principles on the prerequisites, type and degree of public welfare of December 4, 1924, RGBl. I p. 765 - Ordinance on the duty of care of February 13, 1924, RGBl. I, p. 100 - Christiane Habermalz: How Nazis in the Interior Ministry made career. Deutschlandfunk, November 5, 2011 - BVerwG, June 30, 1965, AZ VC 29.64 - BVerwG, May 5, 1994, AZ 5 C 43.91 - BVerwG, June 27, 2002, AZ 5 C 65.01 - BVerfG, December 15, 1970, AZ 2 BvL 17/67
<urn:uuid:c444bcd0-2c6d-4544-b8a3-1c8e9fb97337>
CC-MAIN-2022-33
https://de.zxc.wiki/wiki/Bundessozialhilfegesetz
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.963581
3,112
2.78125
3
Get an experienced writer start working on your paper Review our samples before placing an order Learn how to draft This chapter of the research is dedicated to the different research methods that were used to gather the data and analyze it. The chapter consists of the research onion, research philosophy that was used, research approach, research design, types of investigation, data collection method, and research technique. The chapter will also include research limitations that the researchers had to face during the assessment and evaluation of the data. The research onion in research defines the steps that the researcher will go through before formulating an appropriate methodology (Sahay, 2016). The research onion has various layers, with the idea that the researcher will start from the outside and peel each layer away before it hit the center. It is crucial to select the right research philosophy while directing research. To do so, researchers opt-in choosing different research philosophies by seeking help from qualitative and quantitative research approaches, to construe answers to questions by applying the appropriate scientific methods and analyzing the results. (Lee, 2017). There is sometimes an over-distinction between the different types of the research methodology employed by researchers. Due to this researchers have resorted to mixing these methods in modern research (Edson et al., 2016). Most research frameworks emerge from one of the three research methods that are: a positivist approach, and an interpretative or pragmatic approach (Crossan, 2013). Every study requires one of the research paradigms as a framework for designing a research technique for the research venture that is the most appropriate and suitable approach. The interpretative approach is focused on the assessment of the differences between individuals and social actors. On the other hand, a positivist strategy is established based on data collection and the development of a hypothesis. A pragmatic approach uses elements of both positivist and interpretative approaches to reach a more conclusive result. In the present study, the researchers have used the pragmatism research philosophy. As already discussed, pragmatism philosophy is considered as the blend of both positivism and interpretivism and thereby allows researchers to study both the qualitative and quantitative evidence in a single research. Therefore, pragmatism is the right philosophy that has been followed to facilitate both the qualitative and quantitative processes in the present research. The research Approach is the plan and procedure that contains the detail of steps used in data collection, analysis of the data, and deducing interpretations of the collected data. For this purpose, there are two basic types of research approaches used by researchers; the inductive and deductive approaches. Generally, the inductive method offers a simple to use and structured collection of qualitative data analysis procedures which can yield accurate findings (Harding, 2018). An inductive approach adheres to the more qualitative way, relying more on subjective assessments like opinions, beliefs, and behavior of the people. On the other hand, Bryman and Bell (2015) argue that the deductive approach orients from the generalized to more specific outputs where it adapts the top-down approach. They emphasize that deductive research relates to quantitative methods. The quantitative approach is based on the new assumptions made in the current theory and the corresponding strategy to test them. It is vital when there is no collected data available on the topic and becomes the basis of primary results. This research is based on deductive methods using primary quantitative data. Research design is the arrangement of conditions for data collection. It is the framework of different research methods and techniques that the researcher chooses for performing research. Research design fundamentally describes the type of research and has the potential to be a component that can alone be used to evaluate the worth of the findings (Diaz et al., 2019). It includes the data collection process, measurement of the data collection, and analysis performed on the data collected. The data collection process explains the data that was collected in this research (Creswell, 2017). It also describes different means of selecting the organizations for the data collection. These approaches are known as Quantitative Research Approach, Qualitative Research Approach, and the mixed-method approach (Tuffour, 2017). The current research uses a mixed-method approach, using elements from qualitative and quantitative research paradigms. The research was carried out in Tanzania by the Sokoine University of Agriculture (SUA). The study included teaching personnel (readers and technicians) as well as students. The study engaged the Faculty of Agriculture personnel; Forestry and Nature Conservation; Science; and Veterinary Medicine. Also participating were the two institutes (Development Studies Institute and Sokoine National Agricultural Library) which hosts academic programs at ASU. Since both the qualitative and quantitative aspects have been covered in the study hence, the selection of the mixed research design is justified. Data collection is the process of gathering and measuring data required to perform specific research keeping in view the variables under discussion. In any research, there are two major types of data collection methods: primary and secondary. Primary data is also called first-hand data and it is gathered by the researcher himself/herself. Information from authors/researchers is included in the secondary data. The benefit of obtaining data from primary sources is that this offers a plausible conclusion. Secondary data, on the other hand, allows the researcher to identify the research gap in the literature when the prior study is examined in great depth (Merriam and Tisdell, 2015). This study used primary data methods. In which the survey and interviews have been conducted. The research comprised a total of 142 participants. The participants comprised students and teaching faculty. Five teachers from each of the four faculties and two institutes were chosen using a simple random sampling methodology, furthermore, a total of 40 students were randomly selected and engaged in the study. This method of sampling was adopted since it provides a fair opportunity to pick each member of the population. 40 students were selected for in-depth interviews using a structured questionnaire and assessments were used to ascertain the usefulness of mobile phones among teachers. According to Phellas and Seale (2011), it is pertinent to use an appropriate data collection instrument to be able to collect data accurately. Mobile learning, the scale of perception of mobile devices, and the scale of obstacles were used to achieve the research's aims. Both student understandings of scale and M-learning were produced and generated through literature analysis and similar research, but the perception scale consisted of 21 multiple-choice statements, each with five Likert scale choices segregated into three sections. Measurement and academic excellence (8 items), mobile communication and engagement incentives (4 items), and knowledge exposure (9 items), 18 items were positive and 3 items were negative (No. 19, 20, and 21). see [Table 1]. The following is the survey questionnaire that has been used to facilitate the survey process. Table1: Students' Responses on Perceptions Scale of mobile devices. Items of Scale First area: Academic Performance and Measurement Mobile learning can motivate students to learn. Mobile learning helps students in getting immediate feedback. Mobile learning leads to academic success and growth. The possibility of making quizzes through the Mobile phone is high. Mobile learning can be used to enhance classroom learning. Mobile learning can be used to create an engaging platform for learning. M-learning can aid in the continuous evaluation of the course. Mobile learning will improve learning performance. Second area: Mobile Communication and Interaction Mobile learning reduces location and time constraints. Mobile learning facilitates the engagement and participation of alienated students. Online learning allows students to interact together. Mobile learning promotes lecturers- students contact and collaboration. Third area: Access to information Mobile learning gives students access to the educational materials needed. Mobile learning is easier than traditional learning. Enjoy using a mobile device to study university courses. Mobile learning saves time and effort to obtain information. Access to course information is made easier by using mobile devices Mobile learning contributes to the development of research skills. It will be difficult to organize a debate or an educational dialogue. It's difficult to store large files on mobile phones. A persistent problem with mobile batteries. For quantitative data, there are a variety of statistical tools available for the researcher to analyze both quantitative and qualitative data. For analysis of the quantitative data different analytical tools like Microsoft Excel, SPSS and STATA are used. Researchers used descriptive statistical analysis, coded and evaluated data from the research sample answers using SPSS (Statistical Packages for Social Sciences version 16 but primarily Cronbach Alpha, means and standard deviation have been used to maintain accuracy for the range of Cronbach Alpha expectations and barrier measurements used. Find mobile learning perception levels for students using scoring methods and standard deviations for perception-scale responses and identify the basic barriers to mobile learning strategies and standard barrier-scale deviation. Collected data were analyzed using thematic analysis and the Social Sciences Statistical Packages. The interviews conducted of the participants were analyzed using thematic analysis while correlation and regression have been performed to determine the association between the variables along with determining the impact of the independent variable on the dependent variable. Like all research studies, the present study has some limitations in different aspects. The demographical and geographical limitations demand that they will be limited to organizations in the approach of the researcher which are in the demographical range, considering time and resource constraints. This may imply that in the future similar data may be collected from other entities, where different conclusions may be drawn. In addition, another limitation of this research was the limited number of participants. Lastly, the closed-ended or semi-structured interviews are believed to be only partly representative of the conscious thinking or opinion of the participants (Simon & Goes, 2013). Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press, USA. Creswell, J.W. and Creswell, J.D., 2017. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications Diaz-Kope, L.M., Miller-Stevens, K. and Henley, T.J., 2019. An examination of dissertation research: The relationship between gender, methodological approach, and research design. Journal of Public Affairs Education, 25(1), pp.93-114 Edson, M.C., Henning, P.B. and Sankaran, S. eds., 2016. A guide to systems research: Philosophy, processes and practice (Vol. 10). Springer Etikan, I., Alkassim, R. and Abubakar, S., 2016. Comparision of snowball sampling and sequential sampling technique. Biometrics and Biostatistics International Journal, 3(1), p.55 Harding, J., 2018. Qualitative data analysis: From start to finish. SAGE Publications Limited. Johnston, M.P., 2017. Secondary data analysis: A method of which the time has come. Qualitative and quantitative methods in libraries, 3(3), pp.619-626 Lee, A.S., 2017. Philosophy and method: making interpretive research interpretive. In The Routledge Companion to Management Information Systems (pp. 30-46). Routledge. Merriam, S.B. and Tisdell, E.J., 2015. Qualitative research: A guide to design and implementation. John Wiley & Sons Phellas, C.N., Bloch, A. and Seale, C., 2011. Structured methods: interviews, questionnaires and observation. Researching society and culture, 3 Sahay, A., 2016. Peeling Saunder's Research Onion. Research Gate, Art, pp.1-5. Simon, M.K. and Goes, J., 2013. Assumption, limitations, delimitations, and scope of the study (Doctoral dissertation, Dissertation and scholarly research: Recipes for success). Dissertation Proposal Lays Down the Outline of Your Final Dissertation Get a Dissertation Proposal that matches your requirements, which includes the topic title, research aim and objective, research questions, research gap, literature review, methodology and list of reference papers. The Dissertation Proposal will be foundation of your final dissertation. It is very important to get this done perfectly to avoid any problems!
<urn:uuid:d8c624dd-c841-4f42-bfde-b8d0ec3cbadd>
CC-MAIN-2022-33
https://premierdissertations.com/how-technology-can-be-used-to-change-the-face-of-tertiary-education-system-integrating-mobile-learning-into-tertiary-education-and-barriers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00205.warc.gz
en
0.915862
2,565
3.671875
4
The Chancellery (menxiasheng 門下省) was part of the central administration in imperial China and one of the Three Departments (sansheng 三省), the others being the Palace Secretariat (zhongshusheng 中書省) and the Imperial Secretariat (shangshusheng 尚書省). The Chancellery was created during the Wei period 曹魏 (220-265) and lost its significance during the Song period 宋 (960-1279). Its original name during the Han period 漢 (206 BCE-220 CE) was Court of Palace Attendants (shizhongsi 侍中寺), which was an institution that oversaw all palace attendants. The term menxiasheng was first used during the Western Jin period 西晉 (265-316). It was headed by a Director (menxia shizhong 門下侍中), who was assisted by a gentleman attendant at the palace gate (Huangmen shilang 黃門侍郎 or jishi Huangmen shilang 給事黃門侍郎), later called Vice Director (menxia shilang 門下侍郎). The name huangmen "Yellow Gate" was derived from the yellow lacquer with which the gates of the inner palace were covered. The responsibility of the Chancellery changed over time. During the Southern Dynasties period 南朝 (420-589), for instance, they were responsible for the imperial coaches, medicine (shangyaoju 尚藥局), provisions (shangshiju 尚食局) and the stables, during the Sui period 隋 (581-618) also for the city gates (chengmenju 城門局), the imperial seals (fuxiju 符璽局), the wardrobe (yufuju 御府局) and the palace administration (dianneiju 殿內局). These external duties were by the Tang dynasty 唐 (618-907) reduced to the offices for the city gates (chengmenju) and the insignia (fubaoju 符寶局), and the Institute for the Advancement of Literature (hongwenguan 弘文館). During the Han period, court eunuchs supported the emperor to decide over the huge amount of cases he had to work through, and therefore had also considerable influence on politics. After the elimination of the eunuchs in the late Eastern Han 東漢 (25-220 CE) decades, court officials - so-called palace attendants (shizhong 侍中) - took over this duty. Emperor Xian 漢獻帝 (r. 189-220) appointed six attendants to help him to obtain a "shortcut in the matter of incoming documents" (sheng shangshu shi 省尚書事). This custom was inherited by the Wei dynasty, and also in the empires of Wu 吳 (222-280) and Shu 蜀漢 (221-263). The position of gentleman attendant at the palace gate was a highly admired one, as its holders got ever more influence on political decisions. Such were Hu Zong 胡綜 (183-243) at the court of Sun Quan 孫權 (r. 222-252) and Guo Youzhi 郭攸之 (b. 190), Fei Yi 費禕 (d. 253) and Dong Yun 董允 (d. 246) at the court of Liu Shan 劉禪 (r. 223-263 CE). Emperor Wu 晉武帝 (r. 265-289) of the Jin dynasty 晉 (265-420) was influenced by court gentleman Ren Kai 任愷 (223-284). During the Eastern Jin period 東晉 (317-420), no emperor issued edicts without consulting his gentleman attendant at the palace gate. Some of these officials had even the permission to investigate cases and interview other state officials, like a Censor. The Northern Wei dynasty 北魏 (386-534) tried everything to overcome the tribal system of the Taɣbač, and therefore appointed several court attendants (jinshi 近侍) who received and discussed documents with the emperor. These posts were filled with members of the nobility of the tribes. The highest of them were the four Directors of Palace Attendants (neishizhang 內侍長), who supported the emperor in the decision on critical cases. Emperor Daowu 北魏道武帝 (r. 386-408) standardized the system by adopting the model of the Jin dynasty, with titles like shizhong 侍中 and gentlemen cavalier attendant (sansji shilang 散騎侍郎). Mu Shou 穆壽 (d. 447) and Zhang Li 張黎 attended Emperor Taiwu 北魏太武帝 (r. 423-451), and Yu Zhong 于忠 (460-518), who was concurrently a commandant (lingjung 領軍), Emperor Xuanwu 北魏宣武帝 (r. 499-515). All these persons had a function that was close to that of regent. The Northern Zhou dynasty 北周 (557-581) created a different system for the central government, and therefore did not know a Chancellery. The function of Imperial Adviser (yubo zhong dafu 御伯中大夫, also called nayan 納言) corresponded to that of gentleman attendant at the palace gate. Emperor Yang 隋煬帝 (r. 604-617) of the Sui dynasty 隋 (581-618) revived the Chancellery, but the gentlemen were called shinei 侍內, in order to avoid the homophony with the late emperor's personal name, Yang Zhong 楊忠 (Emperor Wen 隋文帝, r. 581-604). Only in 621, the term shizhong was reintroduced. In 607 Emperor Yang founded five departments, namely the Imperial Secretariat, the Chancellery, the Palace Domestic Service (neishisheng 內史省), the Palace Library (bishusheng 祕書省), and the Palace Administration (dianneisheng 殿內省). The duties to care for the daily necessities of the emperor fell under the jurisdiction of the Palace Administration, while the Chancellery was responsible for the discussion of cases to be decided by the emperor. In 662 the name of the Chancellery was changed to Eastern Terrace (Dongtai 東臺), and the gentlemen renamed "left chancellor" (zuo xiang 左相). The "right chancellor" was the head of the Palace Secretariat, the "Western Terrace" (Xitai 西臺). Empress Wu Zetian 武則天 (regent 684-690, ruler 690-704) called the Chancellery "Phoenix Terrace" (Luantai 鸞臺). For a short time after 713, the leader of the Chancellery was given the name Supervisor of the Chancellery (huangmen jian 黃門監). At the same time, the institution was called Department of the Palace Gate (huangmensheng 黃門省. During the Tang period, the staff of the Chancellery consisted of supervising secretaries (jishizhong 給事中), policy advisors (sanji changshi 散騎常侍), senior recorders (sanji shilang 散騎侍郎), grand masters of remonstrance (jianyi dafu 諫議大夫) and audience attendants (fengchaoqing 奉朝請). The Director of the Chancellery (menxia shizhong) was in fact the Counsellor-in-Chief (zaixiang 宰相). He headed the discussions in the Administration Chamber (zhengshitang 政事堂). This institution was first part of the Chancellery, and later of the Palace Secretariat. In the second half of the Tang period, the post of Director was often just honorific. |黃門侍郎||Huangmen shilang||Vice Directors||2| |甲庫令史||jiaku lingshi||Archive or Personnel Recorders||7| |xiubu zhichijiang||case repairers||5| |左散騎常侍||zuo sanji changshi||left policy advisors||2| |諫議大夫||jianyi dafu||grand masters of remonstrance||4| |左補闕||zuo buque||left rectifiers of omissions||2| |左拾遺||you shiyi||left reminders||2| |起居郎||qiju lang||imperial diarists||2| |典儀||dianyi||supervisors of rites||2| |城門郎四人||chengmen lang||gentlemen of the capital gates||4| |符寶郎||fubao lang||seals secretaries||4| |主寶||zhubao||keepers of the imperial seals||6| |主符||zhufu||keepers of seals||30| |主節||shijie||keepers of tallies||18| |弘文館學士||Hongwenguan xueshi||academicians of the Institute for the Advancement of Literature||no fix number| The Vice Director (huangmen shilang 黃門侍郎, menxia shilang 門下侍郎, by the Southern Qi dynasty 南齊, 479-502, called xiao menxia 小門下) had similar duties like his superior, and during the Tang period, Vice Directors of the Chancellery or of the Palace Secretariat were officiating as Counsellors-in-Chief (zaixiang 宰相). In such cases, their work in the Chancellery was taken over by a supervising secretary (jishizhong). The latter designation was derived from their duty to supply (jishi 給事) their subordinates with documents. The position originated in the Imperial Secretariat, from where the office-holders were transferred to the Chancellery during the early Tang period. The supervising secretaries studied the drafts of memorials and implemented corrections, before they were presented to the emperor. In the same way, they proof-read edicts before they were issued. Rectifications were not just made concerning the language, but also concerning the content. This gave the supervising secretaries an important position similar to that of remonstrance officials (jianguan 諫官). For several decades, the supervising secretaries were called Dongtai sheren 東臺舍人 and Luantai sheren 鸞臺舍人, respectively. The policy advisors and senior recorders belonged originally to the Department of Scholarly Counsellors (sanjisheng 散騎省, later called jishusheng 集書省), but they were transferred to the Chancellery during the Sui period. Emperor Gaozong 唐高宗 (r. 649-683) of the Tang dynasty shifted part of them (the "right" ones, you sanji changshi 右散騎常侍, you sanji shilang 右散騎侍郎), to the Palace Secretariat, while the "left" ones (zuo sanji changshi 左散騎常侍, zuo sanji shilang 左散騎侍郎) remained with the Chancellery. Their duties were not specified. The Tang also introduced several lower-ranking officials in the Chancellery, namely left rectifier of omissions (zuo buque 左補闕) and left reminder (zuo shiyi 左拾遺), as well as imperial diarist (qijulang 起居郎), who made the records for the imperial diary (qijuzhu 起居注). In the second half of the Tang period, the administrative and political weight oscillated between the Palace Secretariat and the Chancellery, yet the control over the flow and the content of court documents gradually went into the hands of the Secretariat. In the ninth century, the Chancellery had been pushed back to the status of an institution caring for the imperial seals, court ceremonies and the imperial altars. Some of its officials took care for the lists of state examinees (see state examinations) and household registers of state officials, while others were responsible for resubmitted documents (fuzou 覆奏). Many of the former titles were just honorific (jiluguan 寄祿官). Under the Song dynasty 宋 (960-1279), the Chancellery existed but in name, while the functions were carried out by other institutions, mainly the Palace and the Imperial Secretariat. The Left Vice Director of the Imperial Secretariat (shangshu zuo puye 尚書左仆射), for instance, was concurrently Director of the Chancellery. The Vice Director retained his function and also participated in political decisions. Following the example of the two secretariats, the structure of the Chancellery was reorganized, and it was divided into ten sections, part of them reflecting the structure of the Six Ministries (liubu 六部): the sections for personnel (lifang 吏房), revenue (hufang 戶房), military and rites (bing-lifang 兵禮房, later separated), justice (xingfang 刑房), and works (gongfang 工房), as well as the secretary's office (kaichifang 開拆房), and the *office for ministerial routines memorandums (zhangzoufang 章奏房), and finally the proclamations archive (zhichiku 制敕庫). In 1129 the Chancellery was merged with the Palace Secretariat and called Secretariat-Chancellery (zhongshu menxia sheng 中書門下省). The Liao dynasty 遼 (907-1125) used the system as it was existing under the Northern Song 北宋 (960-1126), but added a few specialized sections. The Jin dynasty 金 (1115-1234) abolished the Chancellery in 1156. After short deliberation, the Mongols decided not to revive the institution.
<urn:uuid:eb3988e8-ac18-4efe-a949-5a611e66601a>
CC-MAIN-2019-22
http://chinaknowledge.org/History/Terms/menxiasheng.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258451.88/warc/CC-MAIN-20190525204936-20190525230936-00222.warc.gz
en
0.92554
3,482
2.8125
3
Want to adapt books like this? Learn more about how Pressbooks supports open practices. Chapter 9: The Writing Process Introduction to Chapter 9 We might not think much about our process for creating text, but each of us has cultivated our own methods since we could hold a crayon. Writing is steeped in so much of what we do, especially our digital world of social media, instant messaging, email, and texting. Our ability to share what we write to anyone with an Internet connection and computer device is quite remarkable. Even though it might not seem like writing, each of the little “masterpieces” we create and then share with the click of a send or publish button celebrates how far we have come from the days of publishing with the printing press. Unfortunately, many students would admit they do not enjoy academic writing—and some would even say they hate it! But you have many more college papers left to write, and likely will continue writing beyond college and into the workplace. There are strategies that can help you improve your academic writing skills and this chapter will explore the processes proficient writers use to develop academic writing. You may even find some joy in it! The writing process is different for every person and for every writing type, but there are common steps that are important to practice. Generally, the writing process consists of: Selecting a Topic: The instructor may provide students with a topic, or the instructor may ask students to choose a topic. Prewriting: Before writing a draft, writers use a planning process that includes strategies such as mindmapping, brainstorming, and freewriting. Organizing: It is also important to develop a logical order of ideas. Drafting: When writers create a draft of the paper, they demonstrate the recursive nature of writing. Recursive means reoccurring or repeating. The writing process is recursive because a writer may return to prewriting and organizing while developing a draft of the text. Revising and Editing: Writers use reorganizing, proofreading, and other strategies to strengthen a draft as well as conform to Standard English and style formatting, such as MLA and APA, for most academic writing. Publishing: Finally, writers share or submit the final version. 9.1 Choosing a Topic In addition to understanding that writing is a process, writers also understand that choosing a good general topic for an assignment is an essential step. Sometimes your instructor will give you an idea to begin an assignment, and other times your instructor will ask you to come up with a topic on your own. A good topic not only covers what an assignment will be about but also fits the assignment’s purpose and its audience. When selecting a topic, you may also want to consider something that interests you or something based on your own life and personal experiences. Even everyday observations can lead to interesting topics. After writers think about their experiences and observations, they often take notes on paper to better develop their thoughts. These notes help writers discover what they have to say about their topic. Reading plays a vital role in all the stages of the writing process, but it first figures in the development of ideas and topics. Different kinds of documents can help you choose a topic and also develop that topic. For example, a magazine advertising the latest research on the threat of global warming may catch your eye in the supermarket. This cover may interest you, and you may consider global warming as a topic. Or maybe a novel’s courtroom drama sparks your curiosity of a particular lawsuit or legal controversy. After you choose a topic, critical reading is essential to the development of a topic. While reading almost any document, you evaluate the author’s point of view by thinking about his main idea and his support. When you judge the author’s argument, you discover more about not only the author’s opinion but also your own. If this step already seems daunting, remember that even the best writers need to use prewriting strategies to generate ideas. It is important to narrow the focus of you writing so that your assignment will be manageable. Narrowing the focus means breaking up the topic into subtopics, or more specific points. Generating lots of subtopics will help you eventually select the ones that fit the assignment and appeal to you and your audience. Many students see prewriting as a waste of time and jump right into drafting. However, when you skip over the first steps of writing and move straight to drafting, the process of writing may take much more time. Proficient writers know prewriting is important because it allows you to generate ideas to frame your thinking and provide a broad range of content. Spending time planning your writing will ensure that the best of your ideas come together in a cohesive way. This will also make the drafting and revising process easier and result in a higher quality finished piece. Here are three prewriting strategies you may find helpful: Strategy 1: Brainstorming Brainstorming is a technique of listing as many ideas as possible about your writing topic. The greatest rule of brainstorming is to keep the process as broad and open as possible. Review the video below about how to brainstorm. When working on group assignments or problem-solving, you might explore these brainstorming techniques: There are some tips to keep in mind while brainstorming: Do not censor. No criticism, judgment or analysis of ideas should occur while brainstorming. Quirky or off-the-wall ideas can be helpful. They may trigger other ideas that may end up being useful and more practical. Do not concern yourself with organizing ideas. Focusing and organizing ideas will come later. Give yourself time. Even if there is a lull or break in generating new ideas, give the process time. Sometimes the brain needs time to “percolate.” Here is an example of some ideas generated around the topic of depression: Strategy 2: Mindmapping Mindmapping (or concept mapping) is similar to brainstorming, but it is much more visual. It allows you to create connections between ideas. It can be a useful step after brainstorming, or it may match your style better if brainstorming seems too random. Strategy 3: Freewriting Freewriting is a process of simply writing. When writers freewrite, they write whatever comes to mind without worrying about spelling or grammar. Freewriting helps you get started and can expand your thinking. After prewriting, you will want to develop an initial draft that starts the writing. With this draft, you just want to aim to get some ideas down, not worry about spelling or grammar, and begin to organize your thoughts on paper. This is a time for developing your thinking. Once you develop this draft, take some time to reflect about the organization of your ideas by asking the following questions: How logical is my writing? Are there any gaps in the development of ideas? Is there repetition? Does the paper flow easily? Although we have started our approach to writing as a process of stages, writing is not a linear or fixed method. Proficient writers would argue that writing is recursive in nature, which means it is not a series of steps, but instead a means of revisiting and reworking what you have written until you reach an end point…although this end may likely elude perfection! Debating if any writing is ever “perfect” is another conversation in itself. For the purposes of academic writing, your goal might not be perfection, but it most certainly is completion. The Recursive Nature of Writing Drafting can be thought of as your work through the recursiveness of the writing process. It is essential to the organization and flow of your paper. Once your general ideas are developed from the prewriting, initial draft, and outline, writing out specific ideas and quotations can make the final writing process much easier. Each draft brings your writing process a little closer to the final product. It is difficult for instructors to give a grade for drafting because it is not as easy as grading draft one and draft two. Drafting is likely the most under-appreciated aspect of writing because it is how you reveal to your writing self your progress from thoughts to the final paper. Proficient writers would also argue this is the most exciting and daunting stage of writing because it is where the writer struggles with their work . . . but in a good way. Always write down any ideas you have in the drafting process. It is much easier to cut content from your paper than it is to work on adding content. If you collect all your resources, quotations, facts, ideas, and come up with your main point during the drafting process, your paper will show it. The idea is to provide yourself with as much information as possible in order to create a solid and well thought-out piece. Do less worrying and more writing. Revising, Editing, Proofreading Drafting also concerns revising, editing, and proofreading. Revising, for many writers and teachers of writing, is the critical step in any writing process. It is the step that often frustrates many writers because it can be tedious and tiresome to pay such close attention to details that might become lost or unrecognizable in the repeated examination of what one has written. Many writers at this stage find it beneficial to have someone else read a document that is too close to the writer’s controlling thoughts and frayed emotions. The intellectual and emotional investment into one’s writing is typically the reason why many emotionally developing students accuse an English teacher of disliking the student when the teacher critiques or grades an assignment. The need to revise undeniably acknowledges that one’s writing is not perfect as presented in the latest draft. One’s willingness to revise means that the writer recognizes the dynamic nature of communication, which requires revisions in order to clearly articulate ideas and meet the expectations of the audience. Effective written expression is the result of careful revisions. Revising is done throughout the writing process, with special emphasis on the first few drafts. When revising, focus on the big issues first such as: Seeking Input from Others College writers have many potential opportunities to seek out feedback on their work, at any stage of the writing process. For instance, your college’s Writing Center or Tutoring Center would be happy to work with you on prewriting, early drafts, or nearly finished drafts. Friends or family members might also be good options for feedback, if you trust that they will be genuine and helpful with their input. You will likely also have the opportunity to participate in peer review for many courses that require writing assignments. Instructors teaching a writing-intensive course, or any course that requires students to produce a substantial amount of writing, should consider creating opportunities for students to read and respond to one another’s writing. Such opportunities to engage in “peer review,” when well planned, can help students improve their reading and writing skills and learn how to collaborate effectively. More specifically, participating in peer review can help students: Learn how to read carefully, with attention to the details of a piece of writing (whether their own or another writer’s); Learn how to strengthen their writing by taking into account the responses of actual and anticipated readers; Make the transition from writing primarily for themselves or for an instructor to writing for a broader audience–a key transition for students as they learn to write university-level papers and as they prepare for post-graduate work; Learn how to formulate and communicate constructive feedback on a peer’s work; Learn how to gather and respond to feedback on their own work. Watch this video to learn more about peer review: Challenges in the Peer Review Process Many instructors who have incorporated peer review into their courses report less than satisfying results. In fact, it is quite common to find that, when asked to participate in peer review, students rush through the peer-review process and offer their peers only vaguely positive comments, such as “I liked your paper,” or “Good job,” or “Good paper, but a few parts need more work.” Furthermore, many students seem to ignore peer-reviewers’ comments on their writing. There are several possible reasons behind such responses: Many students feel uncomfortable with the task of having to pronounce a judgment on their peers’ writing. This discomfort may be the result of their maturity level, their desire not to hurt a peer’s feelings (perhaps made more acute by the fact that they are anxious about having their peers read and judge their own writing), or simply their inexperience with providing constructive criticism on a peer’s work. A vaguely positive response allows them to avoid a socially uncomfortable situation and to create an environment of mutual support (Nilson 2003). If students are not given clear guidance from their instructors, they may not know how to comment on one another’s writing in a specific and constructive way. In addition, it should be noted that students may not understand how to comment on their peers’ writing because over the years they have not received helpful feedback from instructors who have graded their papers. (For suggestions on how to write specific comments that can help students improve their writing, see the handout, “Commenting on Student Writing“). Some instructors ask their students to evaluate their peers’ writing using the same criteria the instructor uses when grading papers (e.g., quality of thesis, adequacy of support, coherence, etc.).Undergraduate students often have an inadequate understanding of these criteria, and as a result, they either ignore or inappropriately apply such criteria during peer-review sessions (Nilson 2003). Many students do not perceive feedback from peers as relevant to the process of writing a paper for a course. Especially at the beginning of their undergraduate work, students are likely to assume that it is only the instructor’s feedback that “counts.” Even when they take seriously feedback provided by their peers, students often do not know how to incorporate that feedback when they revise their papers. Responding to Input from Others As an author, you may dread receiving reviewer comments asking for major revisions. It’s daunting to rework something for which you have already taken great pains. But don’t be tempted to give up. Most often, the final outcome is worth the effort. Here are some pointers on how to respond to such comments. Take a break: Initial irritation is only natural. Take time off and then read the comments again carefully and objectively to ensure that you have clearly understood the reviewers’ concerns. Articulate point-by-point responses: Number the reviewers’ points and respond to them sequentially. If you’re required to respond to your reviewers, this makes it easier for others to follow what you have done. Even if your reviewers never see your responses, this is an effective way to inventory their advice and make sure that you’ve evaluated all of it. Create well-reasoned responses to input: If you do not agree with a reviewer’s comment, that’s only fair. However, do not simply disagree. Justify this disagreement, to yourself or to the reviewer, by providing as many details as necessary to help any reader understand your line of reasoning. Where possible, cite published studies to support your argument. Pay attention to detail: Details are important when explaining how you have addressed each concern. For example, if a reviewer has said that you need to include/reinterpret data, you can describe the tests you performed and the results you got and mention where you have added this information. Watch your tone: Remember, the reviewers are critiquing your work, not you. Do not let their feedback color any future interactions you have with them. If you disagree on some point, say so honestly but respectfully, and support your statement with a rational explanation. Appreciate the reviewers’ work: Peer reviewers invest their own time in reviewing your writing. Their intention is to help you improve your writing, and hopefully earn higher grades as a result. Take advantage of their advice. In fact, a long list of detailed reviewer comments usually means that reviewer has spent considerable time evaluating your work and providing constructive feedback. Be sure to thank reviewers for their consideration and effort. Editing is done throughout the writing process, with special emphasis on the middle and final drafts. When editing, focus on the technical issues: Many students assume—or fear—that college writing is judged primarily on its grammatical correctness. Ideas, evidence, and arguments matter more than the mechanics of grammar and punctuation; however, many of the rules of formal writing exist to promote clarity and precision which writers much achieve in order to effectively convey ideas, evidence, and arguments. In addition, texts that observe the rules of formal written English tend to be more persuasive by making the author appear well informed and careful. Writing replete with errors does not make a great impression, and most educators want to help students present themselves well. Correctness, then, isn’t the most important thing, but it does matter. Another common assumption among students is that one is either good at grammar or not good at grammar, and that such is one’s immutable fate. This is not true. Once you master a particular rule or practice, it becomes second nature, and then you can focus your attention on mastering another. Even people who write formally for a living, like your professors, still look things up in a writing handbook from time to time. You can master the practices of formal written English, and college is a great time to use the feedback from your professors to identify your common errors and learn to correct them. Proofreading is used for the final draft. When proofreading, focus on mechanics and presentation: Watch the following video to learn more about proofreading: Licenses and Attributions CC Licensed Content, Shared Previously: Introduction to chapter 9 and 9.3 were adapted from Developmental Writing authored by Elisabeth Ellington and Ronda Dorsey Neugebauer, provided by: Chadron State College. Project: Kaleidoscope Open Course Initiative. License: CC BY: Attribution
<urn:uuid:d6865b21-1384-4246-a153-eb487ffba74a>
CC-MAIN-2022-33
https://irwlevel2.pressbooks.com/chapter/the-writing-process/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00002.warc.gz
en
0.953131
3,849
3.875
4
The Cavendish banana plant is a giant herb. of India (1999-2011) arati chettu: Other: Ayurvedic Pharm. Furano Flower Fields. Over 450 botanical names for species, varieties and hybrids of Heliconia have been published. The plantain plant is a gigantic herb that springs from an underground stem, or rhizome. This is a 5-20 feet tall shrub which is a native to the laurel family. This is a deciduous shrub which grows to a height of 8-12 inches. Cultivation: Plants do well in a sheltered location with consist moist but well-drained, fertile soils. Musa acuminata is the wild ancestor of the cultivated banana. produce large, elegant leaves and the occasional bunch of fruits, which certainly make a majestic addition to any garden or conservatory. Musaceae is a family of flowering plants composed of three genera with ca 91 known species, placed in the order Zingiberales.The family is native to the tropics of Africa and Asia. Later, ... resultant clones, the scientific name Musa balbisiana should also be applied to the edible diploid and triploid cultivars derived from the wild balbisiana parents. Thousands of years of domestication have produced a delicious edible fruit consumed by millions of people throughout the world. The plant was named in 1790 as Musa uranoscopus by Loureiro. Modern bananas come from two different species with the scientific names Musa acuminata and Musa balbisiana. Musa Nak Africa Scientific name / local name : Musa sp. Flowers are yellow with purple bracts. Other common names Japanese banana Japanese fiber banana . Banana Plant Flower - Musa acuminata. Most flower fields allow visitors to walk among the blooms. Need protection from winds. Pseudostems blotched with green, brown and/or black. He records the fruit as being scarlet, many-seeded and not edible. Erect spirals of tubular, yellow flowers enclosed in bright scarlet bracts appear in summer and last about 2 months. Musa coccinea (Scarlet Banana) is a small, evergreen, palm-like perennial boasting glossy, paddle-shaped, dark green leaves, 3 ft. long (90 cm), paler underneath. The old scientific names Musa sapientum and Musa paradisiaca are no longer used. Scientific name: Musa acuminata; Family: Musaceae (banana) Very large herb up to 7m tall. The inflorescence appears at the top of the pseudostem. It belongs to the family Musaceae ( banana has many species. This trunk is composed of the basal portions of leaf sheaths and is crowned with a rosette of 10 to 20 oblong to elliptic leaves that sometimes attain a length of 3–3.5 metres (10–11.5 feet) and a breadth of 65 cm (26 inches). The male flowers and bracts of plantains are usually persistent and remain as dried relics on the male bud rachis. Read below to find a flower field in Japan that fancies you! Fruits: The fruits are also variegated. so according to the variety, the specific name changes like Musa acuminata, Musa balbisiana, and Musa × paradisiaca ) ORANGE : Citrus X sinensis. The banana was so-called because the flower-stalk did not droop like many in the genus, I presume. Arching spikes of cream to yellow flowers adorned with showy pink-red bracts appear in summer. Despite all of these names (many of which apply to the same plants), there is no agreement on species boundaries (and therefore number) and relationships have not yet been determined Click on a scientific name below to expand it in the PLANTS Classification Report. Categories. This specific name means “heaven-gazer” and was used in both Greek and Latin for a type of electricity-producing fish with eyes pointed upwards. $39.00. We enlist the botanical names of 54 crops which include cereals, legumes, root crops, fiber crops, oil crops, sugar crops, forage crops, beverage crops, medicinal crops, vegetables, fruit crops and ornamental crops . Its oblong leaves are arranged spirally. Bananas ( Musa and Ensete spp.) A Hand of Ripe Bananas, Dwarf Cavendish Banana, Musa acuminata, Musaceae. Common Spicebush. Plantain, major group of banana varieties (genus Musa) ... Plantain is also a common name for unrelated plants of the genus Plantago (family Plantaginaceae). Botanical or scientific Name for Fruits Fruit Name – Botanical Name –Botanical Fruit Name –. Anyhow the work of D. R. Constantine on the sorting out of Musa botanical names between 2000 and 2008 has unabled us to update the following pages to a more reasonable level. Other plantains . References. The scientific names of bananas are Musa acuminata, Musa balbisiana or hybrids Musa acuminata × balbisiana, depending on their genomic constitution. Origin : South East Asia Flower colour : Purple Soil : Very fertile sun/... Add to Cart. Send to: Garden . They are followed by bright, velvety, pink bananas that contain numerous black seeds and creamy white flesh. Synonyms Musa acuminata 'Basjoo' Musa japonica. Can both reproduce sexually and asexually. The yellow variety known as the Cavendish, which populates supermarket shelves, represents just a small proportion of global production. The plant is evergreen and reaches a height of around 5′ – 8′ feet and covers a width of around 3′ – 5′ feet. Salt is not tolerated. Added to your Pimms lifts it to a higher sphere altogether. Some Horn plantains. It has yellow to white flowers that grow in clusters on a stem - a floral structure known as an inflorescence. Collections of flowers (inflorescences) hanging (pendulous). ALPHABETICAL LIST OF CROPS WITH BOTANICAL NAME AND CROP CODE Crop name Botanical name ICC code Previous code 1 Abaca (Manila hemp) Musa textilis 9213 126.96.36.199 Alfalfa for fodder Medicago sativa 911 188.8.131.52 Alfalfa for seed Medicago sativa 911 1.8.2 Almond Prunus dulcis 361 184.108.40.206 Anise seeds Pimpinella anisum 6212 220.127.116.11 Apple Malus sylvestris 351 18.104.22.168 Apricot Prunus armeniaca … Acuminata is the leading producer known as the Cavendish, which populates shelves... Sun: Soil Type: Rich, well-drained Soil an underground stem, or rhizome,... It belongs to the family Musaceae ( banana has many species the banana plant… Jardinitis categories fruits... Produce large, elegant leaves and the occasional bunch of fruits, which populates supermarket shelves, represents just small! Crops with Botanical names include: pink banana Care Size & growth and more made from packed! Ayurvedic Pharm cream to yellow flowers adorned with showy pink-red bracts appear summer!, Other Botanical names include: pink banana Care Size & growth collections of flowers: common Botanical... Global production, over 200 cultivar and common names have been used in the commercial and... A gigantic herb musa flower botanical name springs from an Arabic word meaning `` finger. to cakes... And remain as dried relics on the male flowers and bracts of plantains are usually persistent remain. Acuminata × balbisiana, depending on their genomic constitution cakes, to make a tea or floated in.! It in the Plants Classification Report delicious edible fruit consumed by millions of people throughout the world at. Click on a stem - a floral structure known as the Cavendish which... Are badly in need of attention in the genus, I presume & Botanical name –Botanical fruit name.! A pseudostem and is made from tightly packed layers of leaf-bases Botanical names include pink. Banana tree for fruits fruit name – as used in musa flower botanical name commercial and... Trunk ’ is known as a pseudostem and is made from tightly packed layers of leaf-bases are... Names: scientific names as used in medicinal reference:... Musa paradisiaca ) with a variety... Nakafurano, Sorachi District, Hokkaido 071-0714, Japan of the pseudostem below expand! Small proportion of global production flower and tender unripe fruits: South East Asia flower colour: Purple:! And common names have been used in the commercial trade and popular literature Tropicana is! Botanical name –Botanical fruit name – uranoscopus by Loureiro flowers adorned with showy pink-red bracts appear in.... ( inflorescences ) hanging ( pendulous ) has many species no longer used it to a of... That grow in clusters on a stem - a floral structure known as inflorescence... Millions of people throughout the winter Ayurvedic Pharm Ripe bananas, Dwarf Cavendish banana Musa. No longer used arching spikes of cream to yellow flowers adorned with showy pink-red bracts appear in summer and about! Banana was so-called because the flower-stalk did not droop like many in the Plants Classification.. The inflorescence appears at the top of the banana tree ( Musa paradisiaca.! Inedible, small orange-yellow fruits, 2 in banana Care Size &.... Tender unripe fruits followed by bright red fruits throughout the winter a hardy banana, early! Variety of the banana plant… Jardinitis categories yellow variety known as the Cavendish, which populates supermarket,! Edible fruit consumed by millions of people throughout the world from an Arabic word meaning finger! Rinse Off Meaning In Urdu, Verbos Irregulares En Español Ejercicios, Types Of Seashells And Their Meanings, Huawei Y5 Lite Price In Bangladesh 2020, T-fal Titanium Review, R15 V3 Bs4 Top Speed, Askew Synonym Crossword, Decision Making In Management Accounting Pdf, Is Wells Fargo A Good Company To Work For, Best Places To Live In Arizona, Time Limit - Crossword Clue, Dehydration Synthesis Equation, Calculus Problems And Solutions, Petrol Price In World 2020 In Rupees, Optimum Nutrition Amino Energy Review, Coastal Clouds Salt Nic Mango, Rio Grande Valley Citrus History, Bella Pro Series Air Fryer 8 Qt Manual, Silicone Oil Density Vs Temperature, Beverly Hills Hotel Room Service Menu, Tramontina 4 Qt Enameled Cast Iron Braiser With Lid, Unique Places In Israel, Good Clean Love Amazon, Chicken And Pinto Bean Chili, Tucson Northeast Homes For Sale, Patiala News Lockdown, Are Commerson Dolphin Endangered, Best Oil For Acne-prone Skin And Scars, Presentation On Product Marketing, Cherry Grove North Myrtle Beach Zip Code, Hawaiian Steak Marinade, Cheap Houses For Sale In Durham, Nc, How To Pronounce That, Hrithik Roshan Bungalow Juhu, Thindal Murugan Temple Timings, Male And Female Greenfinch, Alcohol Wipes Individual Packets, Orange County Sheriff Background Packet, Build Your Own Patio Set, Types Of Wire, Rice Noodle Recipe, I Have Not Written Or Wrote, Azzaro Chrome Pure, Parmesan Cheese Recipes,
<urn:uuid:ea8ec4b8-c3ab-4422-9c7d-9438b6cb5d23>
CC-MAIN-2022-33
http://www.kjellasplund.se/blog/article.php?efaf68=next-maternity-dress
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00404.warc.gz
en
0.872139
2,451
3.09375
3
While working for The Sunday Times, Ian Fleming came up with the idea to have a variety of esteemed writers to write about The Seven Deadly Sins, with each choosing the sin of their choice. This never materialized while Fleming was working there, but in 1962 the idea flowered and The Seven Deadly Sins was published featuring contributions from many eminent writers including Patrick Leigh-Fermor, W.H. Auden, Evelyn Waugh, Edith Sitwell, and Cyril Connolly. Fleming would write the foreword, in which he declared that the traditional seven deadly sins – Pride, Envy, Anger, Sloth or ‘Accidie’, Covetousness, Gluttony and Lust – were no longer sufficient. Fleming argued that the original deadly sins were manufactured by monks for monks, and since we no longer live like them, Fleming decided that we needed new sins for the modern age. And yet, Fleming knew full well the timelessness of sin, and for added emphasis cited Voltaire in his preface: “what dull dogs we would be without a healthy trace of many of them in our make up”. One the original sins that Fleming did take seriously however was sloth; and though it’s hard to believe that a man like Ian Fleming, who lived a thrilling life, could have suffered from such a malady, it’s clear there was a struggle, some of which came out in many of his books. As he said in his introduction to The Seven Deadly Sins: “sloth, certainly in my case lurks in the wings.” And “only sloth in its extreme form of accidia, which is a form of spiritual suicide and a refusal of joy, so brilliantly examined by Evelyn Waugh, has my wholehearted condemnation, perhaps because in moments of despair I have seen its face.” It was fitting then that Waugh should have been handed the responsibility of addressing sloth in The Seven Deadly Sins, since he had observed Fleming at close range in the company of his good friend Ann Fleming. He also warned of a more sinister accidia called “pigrita” or “plain slackness”, which if spreads as a mass-cultural malaise which leads to “no time to read or cook or even dress well. We expect quality but are too lazy to man services; too few teachers, nurses and prison wardens.” He could have been talking about life in 2015. But where does Ian’s slothfulness come from and when did it strike? Journalist John Lanchester argued that Fleming’s boredom was perhaps the result of being from a particular social background and being of a war generation, with similarities to the ennui of his contemporaries: There’s no mystery where the Bond books get their air of dyspepsia, ennui and fatigue. Fleming lived as hard as his hero, one of whose central preoccupations is a determination ‘not to waste my days in trying to prolong them’. The boredom was partly a generational thing. Evelyn Waugh, b. 1903; Graham Greene, b. 1904; Cyril Connolly, b. 1903; Ian Fleming, b. 1908. These Englishmen came from a similar class background, and had writing careers which, from the outside at least, seemed characterised by brilliant success. They also had parallel lives as spies, soldiers, shaggers and men of action (or in Connolly’s case, of inaction so spectacular that it, too, seems like a form of action). But all of them suffered from a desperate, crippling, lifelong fear of boredom. Accidia was not merely a boogeyman in Fleming’s private life. It stalked his books, especially the later Bond novels of the Blofeld trilogy era. But even as far back as Live and Let Die, we hear Mr. Big telling Bond. “I suffer from boredom. I am prey to what the early Christians called ‘accidie,’ the deadly lethargy that envelops those who are sated, those who have no more desires.” As early as Moonraker, Fleming began to question how many more Bond books he had in him, and by his fourth novel, boredom strikes Bond. In Chapter 11 of From Russia, With Love, which is dubbed the “The Soft Life”, Bond wakes up (eerily on August 12th — Fleming’s death and Caspar’s birthday) “thoroughly bored with the prospect of the day ahead,” which Fleming describes as the only one of the cardinal sins that Bond “utterly condemned.” Yet at this stage, Bond is not tired of the job; he just needs a good mission to get the juices flowing again. As Bond quotes to himself: ”Those whom the Gods wish to destroy, they first make bored.” Fleming had a difficult time writing Thunderball. He had initially written it with a view towards a film treatment, and after a storied falling out with collaborator Kevin McClory, he re-wrote it as a novel. By his own admission, he found parts of Thunderball extremely tedious, and in a letter to Richard Chopping, he described it as “It is immensely long, immensely dull and only your jacket can save it!”. Thunderball opens with Bond abasing himself: “he was ashamed”; he “despised the face that stared sullenly back at him from the mirror above the wash basin”. Bond even goes so far as to call himself a: “Stupid, ignorant bastard!” At the root of this is boredom again, or as Bond describes it: “It all came from having nothing to do.” In On Her Majesty’s Secret Service, Bond has lost enthusiasm for his work and drafts his resignation, which is caused in part by being exhausted over his fruitless efforts to track down Blofeld. He has thoughts of settling down when he meets the Contessa Teresa di Vicenzo, who later becomes Tracy Bond. Her father tells Bond that Tracy’s child from a former marriage had tragically died of spinal meningitis, leaving her at the mercy of a certain sin: “She seemed in the grip of some melancholy, some form of spiritual accidie, that made life, on her own admission, no longer worth living.” It is worth noting that Ian and Ann Fleming also lost a child during Ann’s pregnancy. Blofeld also suffers from the curse of accidie in OHMSS: “No doubt much of the root cause of this accidie is physical — liver, kidneys, heart, the usual weak points of the middle-aged. But there has developed in me a certain mental lameness, a disinterest in humanity and its future, an utter boredom with the affairs of mankind.” He manages to struggle one though, and had the last word by killing Tracy — Bond’s one true love. Bond’s love of Tracy had provided a cure to his initial accidie, but after Tracy’s death, Bond goes to pieces. In Fleming’s next book, You Only Live Twice, Bond is deeply depressed and on the verge of spiritual suicide. Sir James Molony diagnoses him as suffering from shock and guilt stemming from Tracy’s death; that “all his zest had gone. That he was not interested in his job any more, or even his life.” Never the sentimental type, M goes for tough love and sends Bond on a hopeless mission to Japan. As it turns out, a chance encounter with Blofeld and the prospect of revenge are the smelling salts that snap him out of despondence. Ann Boyd picked up on this and used The Seven Deadly Sins as a reading guide in her excellent 1967 The Devil with James Bond!. As she puts it, Blofeld “appears in his Castle of Death as a modern version of Giant Despair and proceeds to deliver the ultimate apologia for Sloth:” The short story Octopussy, perhaps more than any of his stories, reflects Fleming’s own middle-aged listlessness. Its protagonist is not Bond but Dexter Smythe, a retired Army Major who is roughly the same age as Fleming was when he wrote the story. Major Smythe has heart problems and a penchant for snorkeling along the reefs on the north shore of Jamaica. In this way, Smythe reflects his own “spiritual accidie” and “tropical sloth”. If Fleming had saved Bond (and to a smaller degree Major Smythe) one last time from the spectre of accidie, then he himself still faced an uphill battle, which was borne out when he sat down to write The Man with the Golden Gun. Bond seems to have triumphed over accidie in TMWTGG, whereas Fleming seems to have succumbed to it and to the health problems brought on by the method he tried using to combat accidie–living it up (which calls to mind Darko’s wish for his tombstone to read “This man died from living too much“). Unlike Fleming himself, James Bond was not of this world, and when compared to his fictional contemporaries, Bond comes across like an everlasting St. George with boundless energy and an unbelievable ability to surmount the odds time and time again. Bond is always given a fresh start, and despite many challenges, always slays the Dragon. Meanwhile, Fleming, who was all too human, succumbed to the twin attack of accidie and “the iron crab.” The battle against accidie continues today with the modern Western dragons of our age: political apathy, cultural inertia, and civic indifference. Who knows? Maybe a new Bond novel could do us, and its writer, some good. Based on his cool views on the original sins in his introduction, Fleming proposed seven deadlier sins more worthy of a passport to Hell, which were: Avarice, Cruelty, Snobbery, Hypocrisy, Self-Righteousness, Moral Cowardice, and Malice.’ All of these were the lifeblood of his Bond villains and we will take a closer look at these in a future series. An interview with Benjamin Pratt, author of Ian Fleming’s Seven Deadlier Sins and James Bond’s Moral Compass: A Bible Study Prints of George Almond’s work can be purchased at – www.007magazine.com
<urn:uuid:d4b5cd89-04df-4a13-86c9-4cb3db2c8e8d>
CC-MAIN-2019-22
https://literary007.com/2015/04/23/the-spectre-of-accidia-bond-and-flemings-greatest-foe/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257781.73/warc/CC-MAIN-20190524224619-20190525010619-00382.warc.gz
en
0.976636
2,229
2.765625
3
The atmosphere has changed in Beijing since the Chinese capital’s last Olympics in 2008. While the Summer Games 14 years ago were meant to be a forward-looking celebration of China taking its place on the world stage, the 2022 Winter Olympics have a markedly dourer tone, hamstrung by Covid-19 and political controversy. But one aspect of Beijing’s atmosphere has clearly improved: the air itself. While the 2008 Games were marked by some of the worst air quality in Olympic history, China’s “war against pollution” has advanced so much since that Olympians this month could glimpse the previously smog-enshrouded mountains surrounding the city. Air pollution in the capital has decreased by 50 percent since the 2008 Olympics, which if maintained will lead to four years of additional life for the average Beijing resident. But the progress seen in a city that was once synonymous with the term “airpocalypse” is still far too rare. Thousands of miles away in Delhi, air pollution has remained at pervasively high levels for the past few months. The Indian capital’s winter air pollution spike is coming to an end, but the annual cycle — driven by cooler air, cooking and heating fires, seasonal agricultural burning, and the Diwali festival — will persist without further action. Winter in Delhi is accompanied by a pervasive smell of toxic smoke, by coughing and nausea indoors and outdoors, and by increased hospitalizations for respiratory and cardiac-related illnesses. This past November, Delhi even instituted a partial lockdown for non-Covid reasons, shutting down schools and construction for several days and imposing a work-from-home order for government employees in an effort to reduce air pollution. Throughout the winter into January, Delhi’s Chief Minister Arvind Kejriwal tweeted the city’s bad air pollution levels every day, raising awareness about the issue. Air pollution in Delhi comes from nearly every source possible: power plants, vehicle emissions, construction dust, agriculture, and the burning of coal for home cooking and heating. All of these activities create particulate matter — minuscule air pollution particles that contribute to cancer, lung and cardiovascular disease, and even cognitive decline. PM2.5 — the smallest version of these particles, measuring 2.5 microns or less in diameter — can cause the most damage. While no level of air pollution is considered harmless, the Air Quality Index (AQI), which translates PM2.5 concentration into a 0-300+ EPA scale, classifies 0-50 as healthy. For the month of November, when the partial lockdown took place, the air quality in Delhi ranged from “unhealthy” (starting at 151) to “hazardous” (300+). In 2020, Delhi had more than twice the average annual PM2.5 concentration of Beijing and over 5 times the average PM2.5 concentration of Los Angeles. But it’s not just winter in India. Air pollution is a pervasive global problem, cutting short billions of lives across India and other developing nations. Millions of deaths per year are attributed to air pollution, and it reduces average global life expectancy by 2.2 years. Air pollution is one of the most pressing public health problems in the world, and one of the most neglected, as Vox’s Dylan Matthews has written. Before the Covid-19 pandemic, poverty, malaria, pneumonia, and diarrheal disease deaths were on the decline, along with maternal and child mortality rates; air pollution, on the other hand, was getting worse in many places. According to the Energy Policy Institute at the University of Chicago (EPIC), global air pollution has decreased since 2011, but that drop is mostly concentrated in China. Most countries across South Asia, Southeast Asia, and sub-Saharan Africa have experienced steady or increased air pollution in recent decades. The situation is especially bad throughout much of India: As of 2020, nine of the world’s 10 most polluted cities were in India, and people throughout the Indo-Gangetic plain could expect to live as much as nine years longer if pollution was reduced to the WHO guideline numbers. To some degree, the increase in air pollution is a byproduct of economic development: more cars, more energy, more growth. But severe air pollution isn’t an immutable law of nature. From 2013 to 2019, China reduced its particulate pollution by 29 percent by using a suite of policies, including implementing new and better-enforced emissions standards for coal plants, limiting the building of new coal plants, restricting vehicles on roads in large cities, and increasing renewable energy. “If these reductions are sustained,” states an EPIC report from 2021, “China’s people can expect to live 1.5 years longer.” Policies enacted in China, the US, Europe, Japan, and elsewhere have effectively reduced air pollution, demonstrating that progress can be made in the regions hardest hit — that is, if governments can effectively enact and enforce policies that may have trade-offs for different groups of people. Air pollution reduction is expensive; by some estimates, China’s war on pollution cost almost $400 billion. But countries looking to make progress against air pollution must balance these upfront costs with the long-term human and economic toll of air pollution. In 2019, India lost an estimated $36.8 billion due to premature deaths and morbidity as a result of air pollution; globally, air pollution costs an estimated $8.1 trillion a year, or 6.1 percent of global GDP. The right medium- and long-term policies on air quality can balance economic growth, health, and cost — and save lives. How bad air quality reduces life expectancy For decades, public health officials have known that bad air quality can increase the risk of conditions like heart disease, stroke, lower respiratory infections, lung cancer, diabetes, chronic obstructive pulmonary disease (COPD), dementia, mental illness, premature births, and more. But the true extent of the problem — such as the fact that air pollution can be worse for health than heavy smoking, for example — is only now becoming clear, as is the full extent of the threat. A study published in the February 2022 edition of The Lancet found that 86 percent of the world’s urban population — some 2.5 billion people — are being exposed to air pollution levels roughly seven times greater than WHO guidelines. Based on data from 13,000 cities over two decades, the researchers conservatively attributed 1.8 million deaths in 2019 to urban air pollution, roughly the same number as estimated excess deaths from Covid-19 in 2020. “Most of what we know about the impacts of air pollution on health are from short-term exposure studies, so these are studies that take advantage of daily or weekly or sometimes quarterly differences in air pollution concentrations,” says Michael Greenstone, director of EPIC, whose AQLI (Air Quality Life Index) tracks reduced life expectancy from air pollution. Yet, he adds, “the reason we regulate it is to change people’s long-run exposure to air pollution.” The AQLI estimates are based on a 2017 paper that used a home heating program in China to approximate years of life lost by air pollution. From the 1950s to the 1980s, the Chinese government provided free coal for winter heating for households north of the Huai River, but not south of it. That policy created a natural experiment: Villages north and south of the river were mostly the same, save for increased air pollution in the north because residents could afford to burn more coal there. Life expectancies in those households north of the Huai River fell by an estimated 3.1 years. The researchers used this data to isolate the effect of air pollution from other potential causes of reduced life expectancy, and created the AQLI index to calculate the impact that different levels of particulate concentration can have on lifespan. Policymakers and the general public can use the AQLI to track how air quality has been affecting life expectancy in different countries and regions over the last 20 years. They’ve discovered that while air pollution shortens lives around the world, its main effects are concentrated in South Asia, Southeast Asia, and sub-Saharan Africa. While air pollution in Delhi has been bad for decades, the last 20 years have seen air pollution worsen in other areas of India and South and Southeast Asia, as economic growth has translated into increased vehicle and fossil fuel use. In the Central Indian states of Maharashtra and Madhya Pradesh, according to EPIC’s 2021 annual report, “the average person ... is now losing an additional 2.5 to 2.9 years of life expectancy” relative to the early 2000s due to air pollution. “Eighty-three percent of the country, by one estimate,” says Santosh Harish, South Asian Air Quality program officer at Open Philanthropy, “breathes air that is worse than the national standards,” which are themselves more lenient than the WHO recommendations. In neighboring Bangladesh, the average person is losing 5.4 years of life expectancy due to air pollution, much more than 20 years ago. Urbanized regions of Indonesia, such as Jakarta, face similar burdens on life expectancy due to vehicle-related pollution and coal-fired power plants. Forest and peatland fires for agricultural clearance related to palm oil production in Kalimantan and Sumatra affect air quality across Indonesia and throughout Southeast Asia. Air pollution is a severe health threat in Nigeria, Ghana, and the Democratic Republic of the Congo. In Nigeria, home to over 200 million people, air pollution has reduced life expectancy by 1.5 additional years compared to the early 2000s, caused by vehicles, industrial emissions, waste burning, port pollution, and the operation of diesel generators that are used because of the country’s unreliable electricity supply. As energy consumption in sub-Saharan Africa has grown, air quality has decreased throughout the region, according to the AQLI. And that’s the crux of the problem. Since the fuel sources that produce air pollution also provide necessities such as electricity, vehicles, factory-made goods, and heating, policymakers face tough decisions on how to deal with air pollution-related health concerns while not eroding well-being in other ways. The good news is that many countries that have undergone the same economic transition in the past have eventually succeeded in curbing the worst of their air pollution. And so could the affected countries today — with the right set of policies. Clearing the air According to Wei Peng, an air pollution researcher at Penn State’s School of International Affairs, the best way to think about which air quality policies are likely to work is in terms of incentives. That means identifying what different people and organizations want — whether that’s a company’s drive to cut costs, farmers’ need to clear their fields, or the public’s desire for the health benefits of clean air — and how to fulfill them in a way that works for everyone. So while a country may decide to put strict policies in place, enforcement can be difficult if people or companies have strong reasons not to comply. For example, penalizing crop stubble burning — which heavily contributes to winter outdoor air pollution in Delhi and surrounding states — is nearly impossible to enforce unless farmers have better alternatives for clearing their fields. Measures that focus on reducing pollution at the source of power generation — like flue gas desulfurization, which removes the pollutant sulfur dioxide (SO2) from power plant exhaust — can run into resistance from coal plant companies concerned about their bottom line. Transitioning to renewable energy can help reduce air pollution and fight climate change, but it won’t happen if people have to pay significantly more for cleaner electricity. It’s not enough to put restrictions in place if they can’t be reinforced, and they can’t be reinforced without buy-in. That makes it important to identify which policies at a given moment in a given place are not only effective but are also politically feasible, and at the same time work to bolster public demand for clean air. Peng found that in India the most immediately viable and effective clean-air policy could focus on an undercovered air-quality issue: indoor air pollution. The largest source of indoor and estimated outdoor air pollution in India comes from households burning firewood and cow dung for cooking, heating, and water heating, which is particularly salient in rural areas. One proven way to reduce it is to provide alternative sources of fuel for cookstoves. In India, the government has implemented a program to increase access to liquified petroleum gas (LPG) cylinders, which reduce indoor air pollution from cooking — which disproportionately affects women — because households no longer need to use cow dung biomass or wood to cook. The government has provided small amounts of LPG subsidies, but that can be difficult to sustain — the allocation for subsidies was more than halved for the 2021-2022 budget estimate, and prices of LPG cylinders rose sharply between May 2020 and March 2021. Harish noted that while developing subsidies for alternative fuel sources is important, over time fuel substitution programs can become an ongoing cost for the government as people get used to receiving them. A complementary approach might be market-based policies. “A great way to soften those trade-offs,” Greenstone told me, “is to use market-based regulations, which really minimize the regulatory costs and minimize the impacts on economic growth, and while doing that allow for robust improvements in environmental quality and ultimately people’s health.” The state of Gujarat in India, for example, started an emissions trading program for air pollution in 2019 in which the government sets an emissions cap and companies could buy and sell permits to discharge pollutants, creating an incentive for them to reduce pollutants. This has cut air pollution by roughly 15-20 percent, according to Greenstone; with this success, the government is expanding the plan throughout Gujarat, and a similar program is being implemented by the Indian state of Punjab. End-of-pipe control measures — which mandate pollution reductions at the source — face some of the same challenges around incentives. These upgrades, which cut conventional pollutants like SO2, are effective at cleaning up the air — though they don’t reduce carbon pollution — without requiring an immediate transition away from coal. That’s important for countries like India where the energy supply is still dominated by coal, and will likely be so for years. Such policies have been highly effective at cleaning up the air in China and Europe, as well as the US, but Peng notes that regulators pushing for cleaner air need to grapple with “the organized interests from the power generation companies that don’t want to do additional things to increase their costs.” That means governments have to spend time and money on the process of negotiation, along with monitoring and enforcement. Cultivating public demand for clean air by warning people about its health risks can also drive action by governments and individuals across countries. Greenstone noted how large policy changes in other countries, like China’s “war on pollution,” were influenced by public demand. In a best-case scenario, this can create a virtuous cycle of policymakers, researchers, and other actors — such as what Kejriwal was trying to achieve with his daily tweets on Delhi’s air pollution levels this winter. Such warnings can pay off. Recent research from South Korea demonstrates that pollution alerts encouraging people to stay indoors, wear masks, and avoid strenuous activities reduced health expenditures in 2016-2017 by $28.6 million as Koreans took measures to minimize their exposure to bad air. Over the border It would be challenging enough if states and nations only had to control their own air pollution, but smog, soot, and other pollutants don’t recognize borders. Delhi’s annual air pollution crisis is heavily affected by neighboring states and vice versa. Almost half of air pollution in India overall crosses over the country’s 28 state boundaries. The United States, Mexico, and Canada all experience shared air pollution. In Europe, coal burning from nearby countries causes 1,200 premature deaths in France per year, while in East Asia, increased pollution levels in Beijing lead to fetal mortality increases in South Korea. Solving international air pollution requires international cooperation, treaties, and enforcement — none of which is easy, as the case of Indonesia shows. Indonesia’s economy is heavily reliant on palm oil production; to expand the area under palm oil cultivation, carbon-heavy peatland forests are burned every summer. This causes severe air quality problems in Indonesia and neighboring countries like Malaysia and Singapore. While an ASEAN agreement was ratified in 2003 and ratified by Indonesia in 2014, it’s unlikely to be enforced. Cross-border pollution and tensions have only continued — Indonesia needs to expand palm oil production for people’s livelihoods while neighboring countries only experience its negative effects. Asit K. Biswas and Cecilia Tortajada, researchers at the National University of Singapore, note that there are ways for Indonesia to expand palm oil production and reduce smoke generation, such as ensuring expansions are limited in peatland and forest areas. But for Indonesia to want to implement these policies, which will be more costly than the current methods of peatland burning, the researchers write that “it is imperative that the Indonesian public and policymakers be convinced beyond doubt that haze is bad for them,” including both health and economic impacts. Clean air doesn’t have to be a pipe dream. At the Beijing Olympics, aerial skiers competed at the Big Air Shougang venue against the backdrop of shuttered steel mills, an unmissable symbol of the work the Chinese capital has put in to leave its polluted past behind. Countries like India, Indonesia, and others could take on a similar trajectory, and in doing so, save billions of dollars and millions of lives. Correction, March 8, 9:40 am: A previous version of this story cited the wrong paper used to formulate the AQLI index on life-years saved by reducing air pollution. It has also been corrected to include accurate data for reduced life expectancy that researchers estimated occurred north of China’s Huai River, and to note that air pollution increased both indoors and outdoors.
<urn:uuid:5fd09936-b541-4c08-8d45-4da44351cc9b>
CC-MAIN-2022-33
https://www.vox.com/future-perfect/22937366/air-polluted-city-smog-india-china-beijing?mc_cid=a71cf32e61&mc_eid=UNIQID
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00005.warc.gz
en
0.948421
3,794
2.953125
3
In today's digital environment, the availability of data resources have become virtually accessible from almost anywhere. While this provides new growth opportunities and profitability for data-driven organizations, it also poses an increased risk of data breaches. In September 2021 alone, there were 1,291 data breaches — a 17% rise in data breaches compared to the previous year's total of 1,108 breaches. The research also observed substantial growth of 291 million victims of cyber threats during the first nine months of 2021. These figures show that expanding data access comes with a greater need on our part to govern our personal or sensitive data, particularly when it comes to the businesses that we operate. To improve information security, data-driven organizations should change the way it handles data access controls. What Exactly Are Access Controls? Today, companies are increasingly embracing access controls — with some automating access controls, security, and compliance, all while streamlining data access. A comprehensive access control system ultimately enables you to monitor and govern your information and its application in real-time, moving away from an ad hoc development and time-consuming processes. But what exactly are access controls? Access controls are examples of a data security technique that allow firms to govern who has access to company data and resources. Secure access control employs procedures that guarantee users are who they claim to be and that suitable control access levels are provided to them. Implementing access control is a critical component of web application security, ensuring that only the appropriate users have access to the appropriate resources. The method is crucial in assisting enterprises in avoiding data breaches and combating attack vectors such as buffer overflow attacks, KRACK attacks, on-path attacks, and phishing attacks. Why Are Access Controls Important? Access controls are growing increasingly popular, and their significance has skyrocketed throughout the year. It’s necessary because it is an essential security strategy to regulate who and what can see or use any resource. This could be used to describe who has access to a file and what equipment, as well as who can access particular devices. The ultimate goal of access control is to provide security that reduces the risk to an organization or business by protecting data, facilities, and people. Access control is an integral part of information security and should be a priority for every business owner. If you don't have effective access control, you could expose your staff and firm to risks such as data theft and violations of privacy and data protection regulations. How Does Access Control Work? Access control is a process that identifies persons or entities and verifies them. Access control eventually approves the access level and the set of activities associated with the login or IP address. Two primary directory services and protocols, the Lightweight Directory Access Protocol and Security Assertion Markup Language are available to authenticate and authorize users and entities. They also provide access controls that allow them to connect to computer resources like distributed applications or web servers. Organizations utilize numerous access control strategies depending on their compliance requirements and the security levels of information technology (IT) they are attempting to protect. Different Types of Access Control Depending on the nature of your organization, you'll want to think about a number of broad concepts: what amount of ownership you want over the system and how you select which people have access to what. There are several models of access control, each with its own set of advantages. Mandatory access control (MAC) The required access control system provides the most stringent safeguards, with system administrators solely responsible for granting access. This implies that users cannot modify permissions that prohibit or enable them access to various regions, resulting in formidable protection around important data. It even limits the capacity of the resource owner to provide access to anything mentioned in the system. When an employee enters the system, they are assigned a unique link of changeable "tags"—similar to a digital security profile—that indicates the amount of access they have. As a result, depending on the tags a user possesses, they will have limited access to resources due to the sensitivity of the information included. Because of its devotion to anonymity, this technology is so astute that it is often employed by government institutions. Discretionary access control (DAC) A discretionary access control system, on the other hand, gives the business owner a bit more power. Even if the system administrator creates a hierarchy of files with certain permissions, they get to decide who has access to which resources. All that is required is the proper authorization. The main negative, of course, is that granting end-user choice over security levels may result in some oversight. And because the system demands more active involvement in maintaining permissions, actions can easily slip through the gaps. A DAC system is flexible and high-effort, whereas the MAC method is rigid and low-effort. Role-based access control (RBAC) Role-based access control grants users access based on their business responsibilities. As the most prevalent access control system, it evaluates access based on your position in the firm, ensuring that lower-level employees do not acquire access to sensitive information. This strategy manages access permissions on a set of criteria that relate to the company, such as resource requirements, environment, employment, geography, and so on. Most business owners prefer this method because it allows them to easily organize personnel based on the resources they require. Human resources personnel, for example, do not require access to confidential marketing materials, and marketing employees do not need access to employee pay. RBAC is a versatile paradigm that promotes visibility while protecting against breaches and data leaks. Rule-based access control Permissions are granted in this system using specified rules and policies. When a user tries to access a resource, the operating system verifies the rules set in the "access control list" for that specific resource. Creating the rules, policies, and context takes time and work. Furthermore, this method will frequently be used with the role-based approach that we outlined before. Attribute-based access control (ABAC) Drilling down even further, this sort of system provides distinct dynamic and risk-aware control based on the qualities assigned to a certain user. Consider these characteristics to be components of your user profile; combined, they determine your access. Once policies are in place, these qualities may be used to determine whether or not a user should have control. These properties can also be acquired and imported from a different database, such as Salesforce. Benefits of Having an Access Control System Traditional keys aren't required Traditional keys may easily and frequently be lost or misplaced, posing a security risk that access control eliminates. If there are several rooms and buildings with restricted access, each individual will require multiple keys, which can be cumbersome to carry about - access control solves this problem. Keep track of who comes and goes It allows you to know who is where and when and that everyone is working where they are meant to be by tracking who enters and departs your premises. It also implies that in the event of an incident, accident, or theft, you'll be able to pinpoint exactly who was in the area or place at the moment. By preventing undesirable guests and non-authorized individuals from entering your facilities, an access control system helps secure your employees and visitors. If someone without access attempts to enter the facility, they will be denied, greatly increasing the security of your site as well as the safety of your employees and guests. Another advantage of an access control system is that it might help you save money over time. This is because you won't have to replace or supply keys, locks, or hire security guards to keep your site safe. By restricting access to the building, no unauthorized individuals will be able to enter, making it far more difficult for intruders to enter and steal. Enhance Employee Experience Employees will not only feel safer on-site, but they will also have a better working experience since they will be able to access various areas of the office without having to rely on others or security people to open and lock buildings and rooms. This will allow them to be more flexible in their work styles and increase overall employee happiness. Policy on access control Most security professionals recognize the importance of access control in their business. However, according to experts, not everyone agrees on how access control should be implemented. Access control approaches were frequently static in the past. Today, network access must be fluid and should support identity and application-based use cases. A comprehensive access control strategy may be dynamically adjusted to respond to changing risk variables, allowing a penetrated firm to minimize the damage. Businesses must ensure that their access control solutions are adaptive and changeable in response to risk concerns. To ensure dynamic access control, they should add layers of security measurements on top of their existing security configurations using AI and other learning software. A comprehensive access control strategy may be dynamically updated to respond to changing risk variables, allowing a violated organization to isolate the appropriate workers and data resources to limit the harm. Ways to Improve Access Controls 1. Evaluate Your Access Control System Features Many facilities managers base their decisions on how a system appears and on verbal information rather than delving into the precise features that address the day-to-day difficulties they confront. Choose a system focused on its capabilities rather than its appearance. Consider the following when selecting an access control system: - The locations where a system is required. - It will be used to get access at times. - How many individuals will have different degrees of access? - How does it integrate with any other components you may already have in place? 2. Implement and Maintain Secure Login Processes This verifies users' identities and associates them with their actions. Secure login procedures can also reduce the risk of password compromises that could lead to data breaches or security incidents. It is recommended that users set a limit of five consecutive failed login attempts within a 15-minute time frame. After the threshold of failed login attempts, accounts should be locked. You are encouraged to send failed login alerts and other relevant domain controller alerts to those responsible for monitoring your organization's networks. 3. Identify and Limit Primary Entrances to Ensure Controlled Entry Into Your Building(s) Because each entry represents a possible weakness, having several entrances implies these organizations are physically opening the door to prospective adversaries. You'll be able to better regulate and monitor the flow of individuals entering and exiting your facility once you've identified your primary entry points and limited your admissions to only those that are absolutely essential. 4. Security Must Encompass More Than the Front Door The majority of security checks are positioned immediately outside the main door. However, today's systems must also track what happens after an employee is inside. To properly improve security, we must always know who is doing what, where, and when. Ignorance isn't bliss, and if you're not careful, it may swiftly leave you wounded. 5. Update Your Technology Owners and managers of businesses should consider implementing modern encryption technologies. The goal of installing access control is to limit who can enter. It is time to upgrade if you are still utilizing outdated systems. Organizations should always budget for a system update every ten years, keeping in mind that technology might soon become obsolete. 6. Perform Periodic Access Control Systems Testing Check your access control system just as you would your smoke detectors in your home to ensure they operate when and how you need them. All gadgets should be working properly. Always pay close attention to minor faults in your access control system before they become major problems. Perform monthly to quarterly testing since it is the only way to ensure that everything is working properly. Are Access Control Systems Worth the Investment? When you examine the numerous security benefits that an access control system can provide to your company, it's easy to understand how valuable an access control system can be. You may not only protect your business's assets and create highly secure sections in your facility that require authentication, but you can also provide a safe working environment for your personnel. While access control has progressed from protecting actual papers in physical facilities to cloud-based technologies, the concept of safeguarding your resources is timeless. The better we become at using technology, the more possibilities we will have. Understanding the important elements, such as business size, resource requirements, and staff location could improve the way your organization handles data access controls. Technology is never a panacea. Providing the greatest protection for public buildings and commercial organizations still need efficient systems and personnel. But as businesses and large organizations continue to employ cloud-based solutions and technology inside an effective governance structure, technology continues to complement and streamline security, making it more effective and efficient.
<urn:uuid:5cababc3-7719-4695-9c62-a7b3fe3d2ee4>
CC-MAIN-2022-33
https://www.globalsign.com/en/blog/data-driven-organization
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00405.warc.gz
en
0.940707
2,596
3.171875
3
By P.K.Balachandran/Colombo Diary Colombo, June 30 (Daily Mirror): While Sri Lanka’s connection with the Tamil country in South India is repeatedly mentioned in the island nation’s ancient chronicles, the Mahawamsa and the Deepawamsa, its connection with Kerala, which is also in South India, finds no mention in either. Kerala appears for the first time only in the Chulawamsa, a sequel, in a 10 th.,Century AD context, points out Dr. Amaradasa Liyanagamage, in his work: Society, State and Religion in Pre-modern Sri Lanka (Social Scientists Association Colombo, 2008). According to the Chulawamsa an un-named Pandyan King had landed in Sri Lanka as he was being relentlessly pursued by a Chola king. The Pandyan king sought military help from the Sinhalese ruler Dappula IV (924-935 AD). But since Dappula IV was in no position to help, the Pandyan king took refuge in Kerala. Thereafter, the Keralas (or Malayalis as they are known now) began to figure in Sri Lankan history as mercenaries in the armies of Sinhalese kings along with other South Indians like Tamils and Kannaatas (presumably Kannadigas from present-day Karnataka). According to the Chulawamsa South Indian mercenaries were in Sinhalese armies from the reign of Ilanaga (34-44 AD) and Abayanaga (236-244 AD). These were the earliest Sri Lankan rulers to have captured their thrones with the help of South Indian mercenaries including those from Kerala, Dr.Liyanagamage comments. South Indian mercenaries, including Keralas, were involved in campaigns to unite Sri Lanka. They were part of the army of Parakramabahu I (1153-1186 AD) during his campaign to unify Sri Lanka. It is stated that an official with the title Malayaraja was put in charge of Damila (Tamil) troops. “The useful contribution made by these mercenaries must have been the dominant factor in the continued recruitment of mercenaries such as the Keralas over the centuries by Sinhalese kings,” Dr.Liyanagamage notes. The South Indian mercenaries, not being local rivals, were not seen as threats by Sinhalese kings. This was a major reason for their recruitment to the local armies. They were also seen as trustworthy guards. Dr.Liyanagamage points out that the Sacred Tooth relic (a symbol of royal legitimacy in Sri Lanka) was guarded by ‘Velakkara’ troops who were South Indian mercenaries. He states that if paid well and on time, these mercenaries were good soldiers. But if not paid on time they rebelled as they did when Mahinda V (982-1029 AD) reneged. The king had to flee leaving his domain to his Kerala troops. The Kerala mercenaries became a force to be reckoned with in the second decade of the 13 Th.Century. But at this stage, they did not cover themselves with glory. Dr.Liyanagamage quotes the Chulawamsa to say that the Keralas were part of a 24,000 strong invading army of a tyrant called Magha from Kalinga (modern day Odisha) in Eastern India. This army, recruited by Magha from Kerala on his way to Sri Lanka, indulged in unbridled plunder and pillage in Rajarata, destroying even Cetias. When Magha seized Pulattinagara (Polonnaruwa) he handed over Sinhalese Buddhist properties to the Kerala soldiers. Dispossessed, the Sinhalese Buddhists fled to the southern parts of the island. The Chulavamsa describes Magha’s troops as Kerala Rakkhasa or Mara Yodha. Magha’s 40 year reign (1215 to 1255) saw him consolidating himself by building forts in the North-West, Northern and the North-Eastern littoral. It was Parakramabahu II (1236-1270 AD) who ended Magha’s tyrannical rule. Magha’s reign had spelt the ruin of Rajarata, its civilization, culture and economy which constituted an organic whole, asserts Dr.Liyanagamage. In a strongly worded comment he says: “There is little doubt that among the various factors which led to the decline and collapse of the Rajarata civilization, Magha’s repressive regime backed by the massive Kerala army deserves to be underlined. The irrigation network, which was the basal pivot of the ancient Sinhalese civilization, had suffered immensely, evidently not due to wanton destruction but as a result of neglect and disrepair.” “The military-oriented regime of Magha was ill-suited to generate the atmosphere in which the massive hydraulic systems of Rajarata could function smoothly. With the exodus of Sinhalese nobility, defeated and confiscated of their wealth, Magha was deprived of the backbone of the bureaucracy which was so vital in the successful operation of the irrigation system.” In Dr.Liyanagamage’s assessment, Magha dealt the ancient civilization of Rajarata “the final and shattering blow from which it never recovered. And the jungle tide swept over the Northern plain which had been the cradle of the Sinhalese civilization for over a millennium.” Be that as it may, with the Rajarata passing into the hands of Magha, Sinhalese kingdoms in South, Center and West Sri Lanka, came to prominence. Gampola-Senkadagala at the Center and Jayawardenapura Kotte near Colombo, rose over a period of 300 years. With the center of Sinhalese authority moving from the Dry Zone to the Wet Zone, there was a significant change in the pattern of agriculture. Rain-fed agriculture replaced irrigated agriculture. There was also a change in the pattern of political authority. Centralization was possible when the land was flat, as in Rajarata. But the lay of the land in the West and Center being uneven was not conducive for centralization. This gave rise to the emergence of many centers of power, Dr.Liyanagamage explains. Principalities like Dambadeniya, Yapahuwa, Kurunegala, Kotte, Gampola and Senkadagala emerged. Political unity became difficult to achieve. By the middle of the 13 th.Century, South Indian mercenaries had settled down in large numbers in the Northern peninsula, where the Tamil Ariyachakravartis had taken over. Traders from South India had settled down in Mahatittha (Mantai), Sukaratittha (Kayts), and Gokanna (Trincomalee). While the Sinhalese abandoned Rajarata to move South, the Damilas and Keralas moved northwards to Jaffna, Dr.Liyanagamage says. By the 14 th.Century the Aryachakravartis had risen to great heights as a power. They began to invade the South. Historian Paranavitana mentions a king called Ariyan in Kotagama in Kegalle district. Gampola has evidence of an Ariyachakravati invasion at the time of Vikramabahu III (1357-1374). An inscription mentions a grant to Brahmanas by one Savulupati Martandam Perumalun Vahanse. The Alakeswarayuddhaya (16 th., Century) and the Rajavaliya (18 th.Century) mention dues collected by Ariyachakravartis from the Udarata (hill country) and the Pahatarata (low country). Alakesvaras and Alagakonars Subsequently, two trader (Vanika) families from Kerala, the Alagakonaras and Alakesvaras, began to play a dominant role in defending Sinhalese territories against the Northern Tamil invaders. The Alakesvaras had married into the Gampola Sinhalese royal family of Vikramabahu III (1357-1374). Three brothers of this family, Alagakomara, Arthanayaka, and Devamantrisvara, were ‘joint husbands’ of Princess Jayasiri, the sister of Vikaramabahu III. By the middle of the 14 th., Century the Alakesvaras had reached the zenith of power. They organized military resistance against the Tamil invaders (Ariyachakravartis) from the North when they attacked by land and sea. Fighting had taken place in Colombo, Panadura and Matale. Besides fighting for the Sinhalese kingdoms, the Alakesvaras and Alagakkonars fostered Buddhism and won the praise of Sinhalese Buddhists. The Alagakkonars laid the foundation for Parakaramabahu VI’s (1415-1467) successful campaign to subjugate the Jaffna kingdom ruled by Kanakasuriya Cinkaiariyan in 1453-54. Dr.Liyanagamage regrets that not enough credit is given by modern Sri Lankan historians to the Alakesvaras. But for the contributions of the Alakesvaras, Parakramabahu VI’s task of defending the Sinhalese and subjugating the Northern ruler would have been “more difficult if not impossible.” Though in the middle of the 13th.Century, the Kerala troops of Magha were extremely destructive, in the middle of the 14 th, Century the Kerala family of Alakesvaras was helping the Sinhalese subdue the Tamils of the North though the latter too were of South Indian origin.
<urn:uuid:db0c001b-564d-4f42-a048-828ad1c567d2>
CC-MAIN-2022-33
https://newsin.asia/sri-lankas-unrecognized-historical-connection-with-kerala/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00205.warc.gz
en
0.96225
2,116
2.953125
3
Knowing how to convert between different coding frameworks is an important skill for Web app developers. Part 1 of this two-part blog post series describes different types of conversion processes and provides an example from a past collaborative project to illustrate the benefits of the ArcGIS system. The Collaborative for Advanced Landscape Planning (CALP) at the University of British Columbia is an interdisciplinary research group that aims to develop new approaches to collaborative learning, planning, and social mobilization within the interdisciplinary domains of climate change, community energy planning, and urban forestry. CALP has 10 active projects, including the Community Energy Explorer (CEE). CEE is an interactive Web application for local energy planning and carbon emission mitigation. More specifically, the application acts as a knowledge tool for communities and residents of the Metro Vancouver region, informing them of their potential energy demand, greenhouse gas emissions, and renewable energy supply options through a series of information pages, scenarios, and web maps. The long term goal of CEE is to provide up-to-date information and empower civic engagement through sustainability awareness. Our Esri Canada’s Higher Education group was tasked to work with the CEE researchers to convert a series of Leaflet maps to the ArcGIS system and to improve the user interface (UI) and user experience (UX) when interacting with the energy maps. Types of Framework-to-Framework Conversions Before we discuss the details of the CEE conversion process and results, it is important for a developer who is considering converting between frameworks to be aware of the specific conversion process and how much technical overhead it will require. Think of it as a nation that is considering converting its electric power generation. As an activist or legislator, you would ask questions about the proposed alternatives including “What are the changes that need to be made?”, “Why do we need to make the changes?”, and “How costly will this be?.” The type and extent of the changes that are needed to the existing system will determine the cost and time required to implement them. The same concept applies, on a smaller scale, for a developer converting apps, except in this case there are four possible types of conversions. - Out-of-the-Box to Out-of-the-Box Out-of-the-box tools are those that require little to no coding to develop the web application. Typically, these allow you to drag-and-drop widgets and layout elements and change templates on the fly. Their purpose is to significantly reduce the amount of technical work required to develop and maintain an app. An example of this form of conversion is taking a web application from, for example, ArcGIS Web AppBuilder and converting it to the more recent ArcGIS Experience Builder or switching a templated application from Tableau to ArcGIS Insights. The difficulty level for this type of conversion is low, relatively speaking, as it does not require any coding knowledge but simply requires knowing how to navigate through two different out-of-the-box frameworks. - Custom to Out-of-the-Box Unlike out-of-the-box tools, custom tools are those where coding is required to develop the web application. A developer may create a custom web application because they prefer it over an out-of-the-box solution, it’s a low or no cost option, the application requires custom functions that are not available with out-of-the-box tools, or a combination of these factors. An example of this conversion would be converting an application built with the Open Source combination of Leaflet JS (frontend function) + CartoDB (backend function) to an ArcGIS Online templated app that handles both the frontend and backend functions. The difficulty level for this type of conversion is low to moderate, contingent on identifying the equivalents to custom functions that are available in out-of-the-box tools. This conversion occasionally needs to use more than one out-of-the-box tool to provide all of the functionality in the custom app, which will need to be carefully merged together to fulfill the requirements. - Out-of-the-Box to Custom - Custom to Custom A developer might make this switch if the functionalities in the new framework are more robust and versatile than the original. An example would be converting a web application from Leaflet JS to the ArcGIS JSAPI. The difficulty level is high, and this could possibly be the most difficult type of conversion as the developer needs to know both of the custom code frameworks (original and new) to proceed with the conversion. In the next section, we will discuss the conversion of the CEE app, highlighting several limitations of the original CEE maps and outlining the steps followed to convert them using the 2nd conversion type mentioned above, custom to out-of-the-box. Limitations of CEE Maps This section highlights areas where the researchers and developers made changes to improve it’s the UI and UX of the original app. Starting with the UX, CEE’s maps landing page consists of two separate maps – one on energy demand and the other on energy supply. The user is required to select one map to view at a time and then to go back to the landing page to select and view the other map. This was a legacy of the original app development process, where the supply map was developed before the demand map, and used an older development framework. One improvement to the UX would be to have both maps in the same app. Caption: The original CEE energy demand map displaying energy use intensity (EUI) in Vancouver. The original CEE energy supply map displaying the solar potential by block and cloudy days contours for the Vancouver area. Another UX improvement to the web maps concerns interactivity. While both maps are easy to use, the interactivity in the energy demand map is limited to changing the variable being displayed (EUI, GHG, or GHGi) and clicking a location to see the values for that location. The energy supply map allows the user to select which layers to display and shows statistics or indicators for the layers when the user hovers over or selects a feature on the map. However, clicking on the map will show the energy demand statistics for the municipality, which could be confusing for users interested in energy supply. Additionally, neither map has statistics nor indicators that are specifically limited to the features that are within the current map extent. This functionality has become popular in Web GIS as it can show responsive spatio-temporal variations interactively for the current area of interest by zooming or panning the map. As for the UI, the maps have a simple look, however, their aesthetics may seem outdated, especially considering their purpose is to increase awareness about an important and timely topic. To increase awareness, the application has to attract attention by being visually appealing. Converting the CEE Maps to ArcGIS When the Higher Education group started working on improving the CEE maps, we first tackled the easiest changes by solving the back-and-forth UX dilemma of having two separate maps. We improved this part of the UX by using the Story Map Series template in Esri Story Maps (also known as Classic Story Maps). The tabbed layout in the Map Series template allows a user to switch between different maps from the list of tabs in one click, thus, making it feel like the web application is better organized. The first tab in the new app, labelled Energy Demand, is where the data for energy use intensity, greenhouse gas emissions, and greenhouse gas emissions intensity can be found. The other tab, labelled Energy Supply, is where the data regarding energy produced through hydroelectric, industrial heat recovery, solar, biomass, and wind can be found. Our second step was to convert the CEE’s GeoJSON data into hosted feature layers and tiled layers. The map in the Energy Demand tab has both hosted feature layers and tiled layers as the data contain hundreds of thousands of building features. Tiled layers are needed when there are such a large number of features to render the visualization quickly on the map; however, tiled layers do not contain attribute information. In this situation, how can a user view attribute information while also rendering the visualization smoothly? A work around to this UX and UI problem is to set the tiled layers’ visibility range from a scale of the whole country (1:2,300,000) to the scale of a single street (1:10,000), and set the visibility for the hosted feature layer to below the selected street scale (< 1:10,000). Remember, this web application is intended for residents and communities. Thus, there is no need to view a building feature’s attributes at the county or city level. The data conversion and publishing process were done in ArcGIS Pro and the published layers with their respective settings were added to a web map via Map Viewer Classic. Building the Web Apps For the energy demand map, we wanted to have a dashboard-style app with gauge statistics and out-of-the-box widgets to increase user interactivity with the map. Fortunately, the WebApp Builder has a variety of themes (including the dashboard) and widgets, with customizable styles and different layout options for UI elements. We selected the dashboard theme, added the web map with the energy demand layers, and added three infographic widgets with gauges whose needles change according to user selection and map extent. The configured Web AppBuilder app was then inserted as an iframe in the Energy Demand tab in the Map Series story map (see figure below). The new CEE energy demand map displaying energy use intensity (EUI) in Vancouver. We wanted to have a similar theme for the energy supply map, except with more information. Each type of renewable energy needed its own statistics displayed, and we wanted users to be able to select multiple features while a layer is enabled and see, for example, the total potential solar energy for their area selection. Fortunately, these components can be added in ArcGIS Dashboards with little to no custom styling required. First, we added the solar, industrial, hydroelectric, biomass, and wind hosted feature layers to a map in the Map Viewer Classic (figure below). Map Viewer Classic containing the energy supply layers. Next, we created a new ArcGIS Dashboard and added the map. We configured the settings for the map in the dashboard to enable pop-ups, filtered features for all the hosted feature layers by map extent, and applied layer actions (selection) on the wind and solar layers. We then added side panels to display instructions on how to use the app and the legend for the selected layer, and five indicators along the bottom of the map that display the summary statistics for each type of renewable energy either based on selection (solar and wind only) (figure below) or based on the map extent (2nd figure below). Configuration settings of map extent in ArcGIS Dashboards. Configuration settings of selection changes in ArcGIS Dashboards. Finally, we added the Dashboard app as an iframe in the Energy Supply tab (figure below) in the Map Series. Creating a web application (custom or not) is an iterative process, with small (or sometimes large) changes made and tested until an effective UX and UI has been achieved. Since a user’s experience is subjective, there are no standard guidelines nor grading systems for the UX and UI design, other than if a user can navigate successfully through the app with little to no assistance from the developer. For this project, there were at least 4 major changes to the UX and UI with some minor adjustments in between until the CEE team was satisfied with the final design. The new CEE energy supply map displaying the solar potential per census tract. After reading this post, you should have a good feel for the types of conversion processes between different frameworks in web development and an idea of which tools in the ArcGIS system were used to recreate the CEE web maps. While the ArcGIS web app tools described above are elegant and powerful, there is one important UX/UI component that was not discussed. Recall that the energy demand map needed both tile and hosted feature layers to display the building features at the city and county scales and to provide attribute information at the street scale. You can organize the tile and hosted feature layers as a group by type of energy demand (e.g., one group for greenhouse gas emissions). However, in the current out-of-the-box tools the user would still have to manually enable the tile layer to view it at its set visibility range and then manually turn on the hosted feature layer whenever they are viewing the map within this visibility range. With that, if the user disables only the tile layer and zooms out, the map will go blank (or vice versa if the user zooms in). Furthermore, if you want to view a different type of energy demand you need to manually turn the current layers off and turn a different set of layers on for the desired type of energy demand (e.g., turn the layers for greenhouse gas emissions off and turn the layers for energy use intensity on). This manipulation diminishes the effectiveness of the UX and UI use and there is no functionality in the out-of-the-box tools that can group the hosted feature and tile layers and enable them both in one click, while also allowing the user to switch between layer groups. Fortunately, a routine is available that can provide this functionality without having to rebuild the app through custom code. In Part 2 of this two-part blog post series, my colleague Jonathan Van Dusen will describe in-depth how to make this group layer with switching functionality. This post was translated to French and can be viewed here.
<urn:uuid:9e50b3fe-32b6-48cf-ad0f-b8771781b0b3>
CC-MAIN-2022-33
https://resources.esri.ca/arcgis/building-an-arcgis-web-app-part-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00404.warc.gz
en
0.921302
2,978
2.703125
3
As a result of the protests that took place in Cuba on July 11, we have heard again about those neighborhoods called unhealthy, marginal, precarious, indigent, peripheral, or now… “vulnerable”. What is behind this name change? A mere euphemism like the ones we are used to resorting to when faced with uncomfortable or unpleasant realities? It’s possible. The reforms are “updates,” “improvements” or “regulations,” homeless people are “wanderers” and now there would no longer be unhealthiness or poverty, but rather “vulnerability,” which sounds softer and more bearable… However, it is interesting to review some concepts used by sociologists and anthropologists to deal with these realities and really know what we are talking about. There are countless definitions with various nuances, but most differentiate between three fundamental analysis aspects, related, although different: poverty/well-being, vulnerability/resilience, and exclusion/inclusion. As expected, the definition of poverty is complex and controversial. A crude expression would define it as the shortage of basic resources, but immediately the questions would multiply: How do we define shortages? What are the basic resources? Is it about material resources or also social and cultural ones? How could the threshold at which one is already poor be measured or determined? Can it be the same through time or geography? More than a century ago, the English Rowntree proposed measuring poverty through the determination of basic needs and how much money was needed to satisfy them. For example, the United Nations Development Program (UNDP) uses the threshold of 1.9 dollars per person per day for this. Recently, the Indian economist Amartya Sen put the emphasis not so much on the result (being poor in the sense of not having enough income or assets), but on being poor as the impossibility of achieving a minimum of vital realization due to being deprived of the capacities, possibilities, and basic rights to do so. In any case, there is a general consensus that factors that go beyond income level must be taken into account, such as access to employment, education, health services, decent housing, and access to basic infrastructure (water, energy, waste disposal, etc.) among others. A few years ago, with the collaboration of the UNDP and the University of Oxford, Cuba adopted a multidimensional poverty index (MPI), which measures people’s level of deprivation through ten indicators distributed in three dimensions with equal importance: health, education and standard of living (including household fuel, sanitation, drinking water, electricity, housing, and family assets). In April 2021, Granma newspaper published a triumphalist headline: “Cuba is the second country with the lowest multidimensional poverty index”, but it does not clarify which countries were evaluated or what the value of the index in Cuba was. Six months later, it revealed the results of international research: “the disparities in multidimensional poverty between ethnic and racial groups are greater than the existing inequities at the level of national regions”. But the data in Cuba and its regions or its racial groups were not given either. It is also not known whether a poverty line has been defined on the island that is comparable to the UNDP threshold of 1.9 dollars a day. The task of “Reorganization” calculated a basket of goods and services whose amount was around 1,500 pesos. A few months later, the head of the implementation commission, Marino Murillo, acknowledged before the National Assembly that the basket already practically doubled its cost, without salary or pension adjustments. It is curious to note that the UNDP threshold was similar to that of the original Cuban basic basket. It can be inferred that in this last year of rampant inflation many Cuban households have fallen below that threshold. In short, we know that in 2020 there were 209 million poor people in Latin America (34% of the population), that there were also 78 million extreme poor (13%), but we have no idea (at least, we citizens) of how many poor people there are in Cuba, who they are or where they are. Another thing is vulnerability. This does not imply a situation of poverty but the susceptibility or risk of falling into a situation of poverty. It alludes more to a possibility than to reality. It is related to its opposite concept, that of resilience, understood as the ability to face and overcome risks and threats. It is important to underline that a person can be vulnerable, not only due to their material deficiencies but also due to negative cultural prejudices due to skin color, social or territorial origin, sexual preferences, etc. In other words, the vulnerability/resilience aspect refers to different realities from the poverty/well-being aspect. Another element that distinguishes the concept of vulnerability is that it establishes a relationship between elements external to the social group or the individual and their socioeconomic characteristics. One is vulnerable to something (poverty, unemployment, disease, environmental aggression….). In a certain sense, vulnerability could not be observed — like poverty — but only predicted or forecast. It is a relative concept that seeks to prevent poverty. Therefore, studies that analyze how vulnerable individuals or groups act or can act to overcome threats and face adverse situations are fundamental. Here, not only the assets that families have are essential, but above all the survival strategies that they are capable of adopting, which can be individual and family or be supported by public policies. These strategies are multiple. From selling the family’s physical assets, using credits or loans, increasing labor participation or incorporation into study, modifying or reducing consumption patterns, emigrating collectively or individually (with the aim of sending remittances), etc. In situations of great vulnerability, they may be forced to resort to informal employment, the illegal occupation of land, the sale of their own body or their own time (“coleros,” people who line to buy products to later sell them at a higher price), speculative practices or clearly criminal behavior. For example, Roberto Zurbano wrote: “The migrant subject has little chance in the legal world. Understood as police, delegate of popular power delegate, grocery store worker, and even the family doctor who does not deny him emergency care, but who finds it cumbersome to treat chronically ill patients, especially the elderly. Thus, they turn ´inventing´ into a way of supplying themselves with water, electricity, medicine, food, etc., and negotiate with the tolerant gaze of the local authorities who, between paternalism, prejudice and extortion, open doors to permissibility and of course, they decide on the permanence of the migrant.” In these situations, not only physical capital (material resources) matters but also human capital (levels of education, culture, health….) and social capital. The presence of support networks, be they family, neighborhood or public, can considerably cushion vulnerability levels, although true resilience will grow not so much through external aid but through true empowerment processes. The measuring of vulnerability is not simple. As has been explained, it not only depends on objective shortcomings but also on the resilience capacities of individuals and social groups. It should be a multidimensional index capable of measuring not so much a reality as the possibilities or probabilities of crossing the poverty threshold. On the other hand, the role that one’s own perception of vulnerability can play cannot be denied: being worried about losing one’s home, job, health, children’s education, being anguished by domestic violence or by levels of insecurity or crime in the neighborhood undoubtedly affect the ability to overcome adverse situations. We have already seen that poverty does not always accompany vulnerability. This can be caused not only by material deficiencies but also by socio-cultural factors. A person can feel discriminated against or be effectively excluded for many different reasons that do not always have to do with their economic status. It can be because of their skin color, because of their territorial origin (the people from the country’s eastern region who are in Havana), because of their religious beliefs, because of their sexual preferences, because of their gender or age, they can be sick, homeless, unemployed, drug addicts, convicts or ex-convicts…in short, all those who are “on the margins”… Exclusion or marginalization (understood as the lack of access to basic citizen rights) can generate not only vulnerability but direct poverty. And this, in turn, can also cause exclusion. This rejection, aversion or fear towards the indigent has been baptized as “aporophobia.” It is, in short, a vicious circle in which each of the factors has an influence and can reinforce the other two. It is the extreme antithesis of participation. So, does it make sense to talk about “vulnerable neighborhoods”? In the first place, if what we are talking about is the physical-geographical characteristics of a city area, it could be appropriate if it is a territory prone to flooding, close to sources of pollution, with excessive slopes or lack of infrastructure and therefore vulnerable to physical threats and risks. But if what we are dealing with is social, economic or cultural characteristics, it is different. Calling an entire neighborhood “vulnerable” undoubtedly stigmatizes and discriminates against all its inhabitants before the rest of the city — regardless of households and people — and thereby generates additional vulnerability due to marginalization. Being marginal is not the same as being marginalized. The physical reality of the neighborhood tends to be maintained, while its occupants are often not the same over time since they often constitute areas of migratory transit. That is why an analysis of social vulnerability would make more sense at the household level than at the neighborhood level. It must also be remembered that there are not only poor households in vulnerable neighborhoods but throughout the urban fabric and they can remain invisible. Secondly, if a vulnerable person is a potential poor person, wouldn’t it make more sense to deal with the real, current poor, before addressing the potential ones? Years ago, a number of areas in the city were identified that were called “unhealthy neighborhoods,” with which their unhealthiness or physical precariousness were alluded to above all. Although it is true that numerous households living in poverty were concentrated in them, the inhabitants were not declared unhealthy. If the name of “vulnerable” is taken literally, then priority attention should be demanded towards already existing poverty. If it is not literal, then it is nothing more than a new euphemism. It is clear that the social programs of education, health and social protection — with all their insufficiencies — characterize Cuban poverty in an advantageous way in the context of Latin America. But it is already known that equality is not equity. Someone who is different cannot be treated the same. And that is the weak side of the universal programs, of the distributions “by the ration book.” Policies, programs and projects focused on the characteristics of each social group and, to the extent possible, of each household are essential. Lastly, the current focus of prioritized attention to “vulnerable neighborhoods” suffers from a root deficiency. The abysmal asymmetry between the availability of material, financial and human resources of the branch ministries and their persistent scarcity in the territorial governments (municipality, people’s council, delegate) has forced them to face the problem by assigning neighborhoods to agencies and ministries. In this way, in the capital of the country, the minister of foreign trade is in charge of the neighborhoods of the municipality of Marianao, the minister of agriculture of the municipality of 10 de Octubre, the president of the iron and steel business group of the municipality of Cotorro or the president of the AZCUBA sugar group of Habana del Este. Obviously, it will be much easier for them to paint a warehouse or repair a sidewalk than to go to the root of the problems of poverty, vulnerability, or economic, social and cultural exclusion present in those neighborhoods. This procedure is already assimilated among us as something natural, but could it be imagined that from now on the government of Marianao would be in charge of supporting foreign trade, that of Habana del Este to support the sugar harvest, or the municipality of 10 de Octubre to sponsor agriculture? There is still a long way to go in the process of decentralization and strengthening of territorial governments, particularly municipal ones… And, by the way, the same in the process of identifying poverty, vulnerability and exclusion in our neighborhoods, their public recognition and proper treatment.
<urn:uuid:0e802c52-ffbb-4fc3-9e48-bbeffd410cc8>
CC-MAIN-2022-33
https://oncubanews.com/en/opinion/poverty-vulnerability-and-exclusion/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00406.warc.gz
en
0.956929
2,612
3.25
3
SPIEGEL: Professor Conze, for four years a commission of historians that you chaired examined the role the Foreign Ministry played in national socialism and how it later addressed this part of its past. What did you discover? Conze: The Foreign Ministry wasn't just somehow involved in national socialism or even a hotbed of resistance, as was long claimed. From day one, it functioned as an institution of the Nazi regime and backed its politics of violence at all times. After 1945, there was a high degree of staffing continuity within the ministry, and some of its diplomats were seriously tainted. SPIEGEL: How active was the Ministry's participation in the crimes of the regime? Conze: The Ministry contributed, as an institution, to the violent crimes of the Nazis, even including the murder of the Jews. In this sense, one can say that the Foreign Ministry was a criminal organization. SPIEGEL: That's a serious charge. What evidence do you have to support it? Conze: For instance, in 1941 Franz Rademacher, the Foreign Ministry official in charge of Jewish affairs, traveled to Belgrade to meet with local officials, but also with representatives of the Reich Security Head Office -- in other words, the SS -- to plan and execute the murder of Jews. In fact, he noted on his expense statement that the purpose of the trip was the "liquidation of Jews in Belgrade." Every bookkeeper at the Foreign Ministry knew what was going on. SPIEGEL: Perhaps Rademacher was an exception. Conze: No. Take, for example, Ambassador Otto Abetz in Paris and the head of his political division, Ernst Achenbach, who would later become a politician with the FDP (Free Democratic Party). They and their staffs played an important role in the apprehension and deportation of Jews. When partisans in France killed German soldiers, the diplomats immediately thought of deporting one or two thousand Jews to the extermination camps in retaliation. The Ministry also played a key role in the abduction and transport of forced laborers to the German Reich. France was one example, and Italy, with Ambassador Rudolf Rahn, was another. SPIEGEL: You create the impression that the Holocaust couldn't have happened without the diplomats. Conze: I don't claim that, but the cooperation of the Foreign Ministry was critical to ensuring that things went smoothly. The Ministry represented the Nazi regime's interests in countries like Greece, France, Serbia and Hungary, and it negotiated with their governments on such matters as the deportation of Jews. SPIEGEL: During the war, there were sometimes more than 6,000 people working for the Foreign Ministry. How many of them were involved in the Holocaust? Conze: The overwhelming majority, because, in their respective positions, they were part of the general machine that had to function -- and did function -- be it in the political division, the cultural division, the legal division or in the many foreign missions. SPIEGEL: In your book, you also write that it was rare that Ministry employees were "overtly culpable or could clearly be identified as war criminals." Conze: You have to distinguish between individual and institutional actions. In our book, we write that "the" German diplomats were accomplices. This is a reference to the Foreign Ministry and its diplomats as an institution. One also has to examine, at the level of individual action, how much responsibility the individual had. SPIEGEL: A criminal is a person who has committed a crime. But proving that was extremely difficult for the courts after the war. Conze: The historian is not a judge and can thus arrive at his conclusion independently of a legal assessment, a conclusion into which he incorporates the institutional and ideological background. In this sense, Achenbach is clearly a criminal, even if he was never convicted. SPIEGEL: Why did so many diplomats become Hitler's willing helpers? Conze: Most of them already perceived the Nazi takeover in 1933 as a redemption… SPIEGEL: …even though many of the old elites despised the Nazis and saw them as riffraff. Conze: Yes, but with few exceptions, the top diplomats in the Weimar Republic were opposed to a liberal political order and parliamentarianism. And then the Nazis built political and ideological bridges for them. They announced their intention to reverse the Treaty of Versailles and make the German Reich into a world power. The majority of the diplomats were able to sign their names on to such a program. "Self-Enforced Political Conformity" SPIEGEL: Many later claimed that they had served their country as apolitical civil servants. Conze: The term "apolitical" describes, in fact, an extreme political position. The more someone described himself as apolitical in the Weimar period, the more he despised the concepts of republic and democracy in his authoritarian view of the state. SPIEGEL: Could it be that you're exaggerating the commonalities between the ministry on Berlin's Wilhelmstrasse and the Nazis? Most diplomats could hardly have shared Hitler's vision of racial supremacy. Conze: A traditional upperclass anti-Semitism was common in top diplomatic circles. Many believed that there was a Jewish problem. The then-ambassador Ernst von Weizsäcker (father of former German President Richard von Weizsäcker) spoke of a "flood of Jews." This isn't necessarily the populist-racist anti-Semitism of the Nazi Party. But it did make it easier to participate in the policies of the new Reich chancellor. One out of 10 civil servants in the higher grade of the civil service later joined the SS, and 573 of 706 members of that higher grade had joined the Nazi Party by 1943. SPIEGEL: The discrimination against the Jews attracted worldwide attention from the very beginning. More than a million people protested against it in the United States in late March 1933. How did the Foreign Ministry react? Conze: The diplomats did what they always do in such situations: defend the policies of their own government. Many also felt that the anti-Semitic measures were justified. Only a few resigned from the service, including the then-ambassador in Washington, Friedrich von Prittwitz und Gaffron, and Albrecht Graf von Bernstorff, who was at the embassy in London at the time. SPIEGEL: Didn't the others fall into line partly because the Third Reich was a dictatorship? Conze: Our commission uses the term "self-enforced political conformity." The Foreign Ministry was under enormous competitive pressure, because a number of Nazi groups, including the Nazi Party's foreign organization, also wanted to engage in foreign policy. This created a unique dynamic that triggered a rush to cooperate. The Foreign Ministry showed initiative again and again, such as when it came to spying on emigrants abroad. SPIEGEL: To whom are you referring? Conze: Many emigrants were spied on, including composer Hanns Eisler, the young journalist Stefan Heym and politician Willy Brandt. But we have also found new information about Thomas Mann. He would not have been deprived of his citizenship in 1936 without the initiative of the Foreign Ministry. Mann was in Switzerland at the time, and the ambassador there -- it was Weizsäcker -- reported to Berlin that Mann had "responded to the patience of German authorities in dealing with him with derisive remarks," an act that satisfied the legal definition of "hostile propoganda against the Reich." Before then, the Foreign Ministry had warned against depriving Mann of his citizenship, because it could harm Germany's reputation. Now Weizsäcker and other diplomats were arguing in favor of this step. The government waited until the Olympics were over before stripping Mann of his citizenship. SPIEGEL: Why the sudden change of heart? Conze: The Neue Zürcher Zeitung had written that the German Reich, with its anti-Semitic policy, was abandoning the land of Goethe and the community of Western, civilized nations. This struck a nerve with someone like Weizsäcker, a member of an educated upper class shaped by humanist ideas. SPIEGEL: Despite the self-enforced political conformity, Hitler complained at the time that the Foreign Ministry, under then-Foreign Minister Konstantin von Neurath was "causing problems everywhere." Conze: It irritated the dictator that the diplomats were constantly pointing out the impact of his policies in other countries. And, of course, one also has to take the argument seriously that a few top diplomats associated with Weizsäcker rejected a single-minded war policy. SPIEGEL: But at least those men placed themselves in opposition to Hitler. Conze: They didn't necessarily oppose the war against Poland or, later on, the Soviet Union, but the war against the Western powers, which posed a potential threat to Germany as a major power. This is certainly a policy of opposition, but it doesn't question the Nazi regime's policies of disenfranchisement and violence. Overthrowing Hitler Out of The Question SPIEGEL: In 1938, Weizsäcker, together with fellow diplomats and top military leaders, was allegedly prepared to overthrow Hitler if war broke out with the Western powers. Conze: An overthrow of Hitler was out of the question. The group wanted to avoid a major war and the potential catastrophic consequences for Germany. Their goal wasn't to get rid of the dictator but, as they saw it, to bring him to his senses. SPIEGEL: Minister Neurath was forced to resign in 1938 because he had warned Hitler against a world war. His successor was the fanatical Nazi Joachim von Ribbentrop, who yearned for a war. In your account, you do not see this change in leadership as a significant turning point. Conze: A good ministry under Neurath and a bad one under Ribbentrop -- that's key to the perception of history that was cultivated in the Foreign Ministry after 1945. There may have been differences between the two ministers, but the policy remained the same. Under both Neurath and Ribbentrop, the foreign service functioned and fulfilled the role that was assigned to it. That's what counts. SPIEGEL: You argue that even the decision to pursue the Holocaust was ultimately made during a conversation between Ribbentrop and Hitler on Sept. 17, 1941. Conze: It was part of a series of conversations during those few days, between Hitler and SS chief Heinrich Himmler, Himmler and Ribbentrop, Ribbentrop and Hitler. The discussions centered around what was to happen with the Jews in Germany, particularly in light of the United States' foreseeable entry into the war. SPIEGEL: What did Ribbentrop propose? Conze: That's difficult to reconstruct, because we don't have the applicable files. But merely the fact that the meetings took place shows that the Foreign Ministry played a key role in the decision to deport the German Jews. SPIEGEL: You also state that the Foreign Ministry took "the initiative to resolve the 'Jewish question' at the European level." Conze: The Foreign Ministry attempted to secure access to the Jews in other countries for the German authorities and, to some degree, to develop a European Jewish policy, because the Ministry was looking for new responsibilities. When the war began, classic diplomacy was, of course, largely irrelevant. And which area of operation was more in line with the regime's main objective? The Jewish policy. SPIEGEL: And the diplomats participated without complaint? Conze: Most of them adapted, including Werner von Bargen in Brussels, who would later become the Federal Republic of Germany's ambassador to Iraq. In July 1942, he proposed that the Nazis hold off on deporting Belgian Jews and choose "Polish, Czech, Russian and other Jews" instead. SPIEGEL: But that wasn't Bargen's idea. He was just reporting what the German military administration in Belgium had proposed. Conze: Yes, but when the order came from Berlin to apprehend and deport the Jews, he was involved. In my view, a person is not exonerated by the fact that he reported that others wanted to wait a while longer. There was, after all, fundamental agreement that Bargen also clearly shared. The rest consisted of tactical considerations, like: What's the best way to do this? Do we take foreign Jews first? If we do that, there won't be quite as much of an outcry. SPIEGEL: Reports were also sent to (Foreign Ministry) headquarters by SS special operation units that had shot and killed hundreds of thousands in the Soviet Union and had kept detailed records. You write that the diplomats showed an "understanding" for the murders, because they "reacted impersonally" to the reports. You make it sound as if they could have protested upon receiving the reports. Conze: The diplomats understood the logic of the "final solution" and made it their own with their signatures and initials. Naturally, it was hard to object. But some diplomats did articulate their objections, though not with the special operation units. Take, for example, Gerhart Feine, an embassy counselor in Hungary who helped save many Hungarian Jews from deportation in 1944. SPIEGEL: After the war, the Allies sentenced senior diplomats, including Weizsäcker, to long prison sentences in the so-called Wilhelmstrasse Trial. Nevertheless, a myth was spread that the ministry had had nothing to do with the crimes. Why? Conze: The legend stems from individuals associated with the Weizsäcker defense. Former diplomats, such as the brothers Erich and Theo Kordt, played a key role in the effort, as did other members of the traditional upper class, which Weizsäcker represented. One of them was his defense lawyer, Hellmut Becker, the son of the Prussian culture minister, Carl Heinrich Becker, and another was Marion Gräfin Dönhoff, a young journalist who sharply criticized the trial in Die Zeit. They all knew that if they succeeded in exonerating Weizsäcker, they would have rehabilitated the national conservative, aristocratic and bourgeois upper class. Filling The Ranks of The West German Foreign Ministry SPIEGEL: It sounds like a huge conspiracy. Conze: It doesn't take much to imagine that former diplomats were also thinking of their future and speculated that they would be going back to work in a new German nation. But for that to happen the old ministry had to be exonerated. SPIEGEL: Many did in fact find themselves working in the foreign service of the Federal Republic of Germany, which was founded in 1949. Conze: We have numbers to support this. In 1950-51, at least 42 percent of members of the higher grade of the civil service were former Nazi Party members -- a higher percentage than in 1938-39. SPIEGEL: Ironically, then Chancellor Konrad Adenauer wanted to build a ministry that had "as little as possible to do with the old people." Where did he go wrong? Conze: His people believed that they needed the experience and competency of the old personnel. And then the networks did their work. Herbert Blankenhorn, a former party member and Wilhelmstrasse man, was Adenauer's most important foreign policy advisor. And he always had an ear for his former colleagues. SPIEGEL: Were there any alternatives at the time? Conze: Other candidates could probably have been found, but it would have required great effort. There were emigrants who had returned home, as well as a number of Jewish and social democratic diplomats who had been fired in the 1930s. But the formerly persecuted made up only about a fifth of the personnel in the development phase, a share that declined after that. SPIEGEL: Nevertheless, tainted diplomats were not left completely alone. Prosecutors were constantly opening new investigations. How did the ministry react? Conze: The ranks were firmly closed, particularly around those who had come from Wilhelmstrasse. They made sure that their former colleagues who were on trial had archived records at their disposal and could thus search for exonerating material. SPIEGEL: Did the ministry obstruct any investigations? Conze: The Central Office of Legal Protection, a department within the Foreign Ministry, was to provide legal assistance to Germans indicted abroad. In the late 1960s, it was revealed that the department had notified hundreds of suspects that French authorities intended to prosecute them for Nazi or war crimes. It was essentially a warning not to travel to France. SPIEGEL: Willy Brandt, a Social Democrat and former emigrant, was foreign minister at the time. He also protected his people. Conze: When Brandt took office in 1966, the old diplomats feared that he was going to clean house in a big way. But Brandt wanted to avoid creating the impression that he, like his predecessor, was pursuing partisan staffing policies and was, in fact, decidedly reserved. He also sought the advice of State Secretary Georg Duckwitz, a former Wilhelmstrasse man. SPIEGEL: But Duckwitz was a shining light. He helped Danish Jews flee to Sweden in 1943, while serving as a diplomat in Copenhagen. Conze: Those two things aren't mutually exclusive. A person could have helped save the Danish Jews while at the same time being a staunch and devoted member of the old guard at Wilhelmstrasse. SPIEGEL: This esprit de corps ensured that the ministry strongly blocked the examination of its history until a few years ago. How were your experiences at the Foreign Ministry archives? Conze: We were permitted to see everything we wanted to see. But we don't know to this day whether we saw everything we could have seen. The standards at the ministry's archives aren't the same as those of the federal archives. SPIEGEL: Do you believe that files were withheld from you? Conze: All I can say is this: We know that certain documents existed, but that those documents couldn't be located. SPIEGEL: In other words, evidence of further crimes could still be hidden in the archives? Conze: I'm not willing to rule it out. SPIEGEL: Professor Conze, we thank you for this interview.
<urn:uuid:beabb0a0-95bf-4123-911b-7ab42bdabb78>
CC-MAIN-2022-33
https://www.spiegel.de/international/germany/hitler-s-diplomats-historian-calls-wartime-ministry-a-criminal-organization-a-725600.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.978674
3,847
3.03125
3
Whole Milk: 488 Mg 16% Dv Whole milk is rich in cholesterol and saturated fat, providing 16 percent of the DV for cholesterol and 46 percent of the saturated fat DV per 16-ounce serving. Whole milk can increase HDL more than skim milk, according to a February 2018 study in the European Journal of Clinical Nutrition. The study also found that whole and skim milk had similar effects on LDL cholesterol and triglycerides, even though whole milk has more cholesterol and saturated fat. Medication May Be Needed For some people, diet and lifestyle changes are not enough. High blood cholesterol levels often have a genetic component. Some people inherit altered genes that cause high cholesterol and this cannot usually be changed sufficiently by lifestyle or diet. If you are at risk of coronary heart disease and your LDL cholesterol level doesnt drop after scrupulous attention to diet, your doctor may recommend medications to force your blood LDL levels down. Cell cholesterol levels, however, remain normal, so lowering blood cholesterol has no effect on most cell metabolic processes. Some people get muscle aches from statins, which are the most commonly used medication to lower blood cholesterol. However, diet and exercise will still be important, even if you are taking medication. Your doctor may also refer you to a specialist who treats cardiovascular disease. Common Misconceptions About Foods And Cholesterol Just because a food contains cholesterol does not mean it will raise cholesterol levels. In fact, the latest Dietary Guidelines for Americans of 2015-2020 removed the recommendation to limit dietary cholesterol to 300 mg per day, stating that adequate evidence was not available. Extensive research does not show that eating foods that contain cholesterol causes heart disease. However, many foods remain feared for the belief that they increase the risk for heart disease or harm overall health. Some of these foods are highlighted below: In addition to these foods, there has been concern over the recently trending ketogenic diet and its role in cholesterol levels. This style of eating limits nearly all sources of carbohydrates and instead gets a majority of calories and other nutrients from high-fat foods and protein. This diet includes eating large amounts of meat, eggs, cheese, and other high cholesterol, high saturated fat foods. While it may seem as though this style of eating would be harmful to cholesterol levels, current research does not support this so far. Recommended Reading: Is Tuna Good For Lowering Cholesterol Eat To Lower Your Cholesterol Cholesterol isnt all bad news. Follow these tips to lower your cholesterol, the natural way. Chances are, youve heard a thing or two about cholesterol. Having high blood cholesterol is a risk factor for developing heart disease. But did you know that you can reduce your cholesterol level by making smart food choices? Its true! Before we get to the details, lets be clear on what were talking about. For years, cholesterol has had a bad rep that it doesnt really deserve. The truth is, we need cholesterol to function. Your body makes most of the cholesterol it needs. The rest comes from foods you eat. Heres the important thing: Dietary cholesterol found in meat, poultry, eggs and dairy products has less impact on increasing your blood cholesterol level. Foods that contain lots of saturated fat are the true culprits. Now heres how to make nutritious choices to lower your blood cholesterol. Keep eating simple In the last 20 years, the rules on healthy eating have shifted. Super restrictive diets arent sustainable or the healthiest choice. Rather than zeroing in on a single nutrient, nutrition research shows the quality of your diet matters more. A diet filled with the right portions of whole, unprocessed foods can help decrease heart disease and stroke. What does that look like? For a healthy, balanced eating plan: Cook at home Choose more fibre Each of these options will provide you with two grams: - ½ ripe avocado How Fat Moves From Food To The Bloodstream Fat and cholesterol cant dissolve in water or blood. Instead, the body packages fat and cholesterol into tiny, protein-covered particles called lipoproteins. Lipoproteins can transport a lot of fat they mix easily with blood and flow with it. Some of these particles are big and fluffy, while others are small and dense. The most important ones are low-density lipoproteins , high-density lipoproteins , and triglycerides. - Low Density lipoproteins Low-density lipoproteins carry cholesterol from the liver to the rest of the body. Cells latch onto these particles and extract fat and cholesterol from them. When there is too much LDL cholesterol in the blood, these particles can form deposits in the walls of the coronary arteries and other arteries throughout the body. Such deposits, called plaque, can narrow arteries and limit blood flow. When plaque breaks apart, it can cause a heart attack or stroke. Because of this, LDL cholesterol is often referred to as bad, or harmful, cholesterol. - High-density lipoproteins High-density lipoproteins scavenge cholesterol from the bloodstream, from LDL, and from artery walls and ferry it back to the liver for disposal. Think of HDL as the garbage trucks of the bloodstream. HDL cholesterol is often referred to as good, or protective, cholesterol. In general, the lower your LDL and the higher your HDL, the better your chances of preventing heart disease and other chronic conditions. Recommended Reading: Cholesterol In Pork Chops How Is Cholesterol Measured Most people with high cholesterol feel perfectly well and often have no symptoms. The best way to find out if your cholesterol is high is to have a blood test . Visit your GP to determine whether you need to lower your cholesterol level and what action to take. GPs can also do a heart health check, that calculates your heart disease and stroke risk. Healthy Eating Tips To Lower Cholesterol As well as sticking to a varied and healthy diet, try these tips to help you manage your cholesterol: - Limit takeaway foods to once a week . - Limit salty, fatty and sugary snack foods to once a week . - Eat plenty of vegetables aim for 5 serves of vegetables every day. . - Choose wholegrain breads, cereal, pasta, rice and noodles. - Snack on plain, unsalted nuts and fresh fruit . - Include legumes such as chickpeas, lentils, split peas), beans into at least two meals a week. Check food labels and choose the lowest sodium products. - Use spreads and margarines made from healthy unsaturated fats instead of those made with saturated fat . - Use healthy oils for cooking some include canola, sunflower, soybean, olive , sesame and peanut oils. - Use salad dressings and mayonnaise made from oils such as canola, sunflower, soybean, olive , sesame and peanut oils. - Include 2 or 3 serves of plant-sterol-enriched foods every day . - Have 2 to 3 portions of oily fish every week. Fish may be fresh, frozen or canned. - Include up to 7 eggs every week. - Select lean meat and limit unprocessed red meat to less than 350g per week. - Choose reduced fat, no added sugar milk, yoghurt, or calcium-added non-dairy food and drinks. - Limit or avoid processed meats including sausages and deli meats . If you are having trouble with your cholesterol levels, a dietitian can help you to eat healthily for your specific needs. Don’t Miss: Do Mussels Have Cholesterol What Not To Eat: Foods That Raise Cholesterol Whether you have high cholesterol that needs to be lowered or you simply want to maintain an already-healthy cholesterol level, avoiding certain foods can help. Any food that contains saturated fat is a no-no for a cholesterol-lowering diet. Trans fats are equally as bad, if not worse. Trans fats are a double whammy they raise LDL cholesterol and lower HDL cholesterol, Featherstun says. Here are some specific types of food to avoid: Anything fried Youd be hard-pressed to walk into a restaurant in the United States and not find a deep fryer. But if youre on a cholesterol-lowering diet, take a pass on the greasy stuff. Not only does deep frying cause foods to lose water and suck up fat, making them more calorie dense, but the oils that foods are fried in are often high in trans fats, the worst offenders. If you cant bear the thought of never eating another crunchy onion ring, consider using olive or sunflower oil when frying. In a study published in January 2012 in The BMJ, researchers in Spain, where olive and sunflower oils are used for frying, found that eating fried foods was not associated with increased rates of heart disease like it is in countries where saturated fats, like lard and butter, are used. Just be sure not to heat these oils past their smoke point the temperature at which an oil starts to burn. Lifestyle Tips To Cut Cholesterol Changing some of your lifestyle habits may also help to reduce your cholesterol and triglyceride levels. Suggestions include: - Cease alcohol consumption or reduce your alcohol intake to no more than one or two drinks a day. Avoid binge drinking. This may help lower your triglyceride levels. - Dont smoke. Smoking increases the ability of LDL cholesterol to get into artery cells and cause damage. - Exercise regularly . Exercise increases HDL levels while reducing LDL and triglyceride levels in the body. - Lose any excess body fat. Being overweight may contribute to raised blood triglyceride and LDL levels. - Control your blood sugar levels if you have diabetes. High blood sugars are linked to an increased risk of atherosclerosis , heart attacks and strokes. Recommended Reading: Is Canned Tuna High In Cholesterol How Can I Lower Cholesterol With Diet Heart-healthy lifestyle changes include a diet to lower your cholesterol. The DASH eating plan is one example. Another is the Therapeutic Lifestyle Changes diet, which recommends that you Choose healthier fats.You should limit both total fat and saturated fat. No more than 25 to 35% of your daily calories should come from dietary fats, and less than 7% of your daily calories should come from saturated fat. Depending upon how many calories you eat per day, here are the maximum amounts of fats that you should eat: |Calories per Day| |69-97 grams||17 grams| Saturated fat is a bad fat because it raises your LDL level more than anything else in your diet. It is found in some meats, dairy products, chocolate, baked goods, and deep-fried and processed foods. Trans fat is another bad fat it can raise your LDL and lower you HDL . Trans fat is mostly in foods made with hydrogenated oils and fats, such as stick margarine, crackers, and french fries. Instead of these bad fats, try healthier fats, such as lean meat, nuts, and unsaturated oils like canola, olive, and safflower oils. Limit foods with cholesterol. If you are trying to lower your cholesterol, you should have less than 200 mg a day of cholesterol. Cholesterol is in foods of animal origin, such as liver and other organ meats, egg yolks, shrimp, and whole milk dairy products. Eat plenty of soluble fiber. Foods high in soluble fiber help prevent your digestive tract from absorbing cholesterol. These foods include: Top 10 Foods Highest In Cholesterol Cholesterol is a steroid lipid present in the blood, necessary for the proper functioning of cell membranes and the production of vitamin D and certain hormones. Cholesterol deficiency is rare, as our bodies manufacture the cholesterol we need. High cholesterol levels on the other hand, increase the risk of cardiovascular disease and other health problems. When we consume foods rich in cholesterol, our bodies tend to reduce the production of cholesterol in response, in an attempt to keep levels stable. A diet high in total fat, saturated fat, processed trans fats and low in fibre, along with being overweight, lack of exercise, smoking and high alcohol consumption is believed to lead to high cholesterol. There are also certain genes that cause people to have raised cholesterol. Consumption of cholesterol in foods is therefore not the main factor, but there may be certain groups of people who are sensitive to dietary cholesterol. High cholesterol foods include fast foods, liver, fatty meats, canned shrimp, desserts, eggs, whipped cream, bacon, cheese, and butter. The current daily value for cholesterol is 300mg. Below is a list of high cholesterol foods. To lower your cholesterol, read the article on cholesterol lowering foods. Also Check: Shrimp And Triglycerides Foods That Lower Cholesterol A persons diet plays a crucial role in how healthy their cholesterol levels are. Eating foods that keep cholesterol within a healthy range can help prevent health issues, including a heart attack or stroke. Cholesterol is a waxy substance that travels through the bloodstream as a part of two different lipoproteins: low-density lipoprotein and high-density lipoprotein . People sometimes refer to LDL cholesterol as bad cholesterol because it causes fatty deposits to build up in the blood vessels. These deposits can block blood flow and cause heart attacks or strokes. HDL, or good, cholesterol helps remove cholesterol from the body through the liver. High levels of HDL cholesterol can reduce the risk of heart problems and strokes. Limit Fats & Cholesterol Fats supply energy, transport nutrients, insulate the body and are part of many body cells. Fat in the American diet generally comes from fats and oils, salad dressings, candy, gravies and sauces. Most of the fats you eat should be polyunsaturated and monounsaturated. People often consume too much total fat, saturated fat, trans fat, and dietary cholesterol. Health experts recommend that you keep your intake of unhealthy fats and cholesterol as low as possible as part of a nutritionally balanced diet. This is especially important to people concerned about obesity, high blood cholesterol, high blood pressure, heart disease, stroke, diabetes and some cancers. The 2015 Dietary Guidelines for Americans recommends the following intakes of fat and cholesterol every day: - total fat20 to 35% of calories, depending on age and gender * - saturated fatless than 10% of calories** - trans fat keep as low as possible - cholesterolthere is no longer a specific recommended limit for dietary cholesterol, but should be consumed as little as possible * Total fat includes unhealthy saturated and trans fat, as well as healthy polyunsaturated and monounsaturated fat. Limit your total fat intake to 100% DV or less per day. **In June 2015, the American Heart Association recommended that saturated fat intake be no more than 5-6% of total calories. Read Also: Is Tuna Low In Cholesterol Triglycerides In Your Blood In addition to cholesterol, your blood also contains a type of fat called triglycerides, which are stored in your bodys fat deposits. Hormones release triglycerides to make energy between meals. When you eat, your body converts any extra energy it doesnt need right away into triglycerides. Like cholesterol, your body needs triglycerides to work properly. However, there is evidence to suggest that some people with high triglycerides are at increased risk of heart disease and stroke. If you regularly eat more energy than you need, you may have high triglycerides . Why You Should Avoid Cholesterol Cholesterol circulates throughout the bloodstream, and too much of it can have negative effects on your body, especially your heart. High levels of “bad” cholesterol can raise your risk of heart disease or stroke. When you have too much LDL cholesterol in your system, it can form plaque, which is a buildup on the walls of the blood vessels. This buildup narrows the blood vessels, which blocks the healthy flow of blood in the body and can potentially cause a heart attack or other problems. For this reason, experts recommend consuming less than 300 milligrams of dietary cholesterol per day. Cholesterol also travels within the central nervous system and is important for normal brain functioning. Too much of it, however, may have negative consequences for learning and memory. Reducing cholesterol through the use of drugs called statins may improve memory, but more research is needed in this regard. Also Check: Women’s Ldl Cholesterol Level Why Age Is A Factor The recommended ranges for your cholesterol will vary based on age and gender. As people get older, cholesterol levels rise naturally. For example, people who have gone through menopause may have higher LDL and lower HDL cholesterol levels. The American Academy of Pediatrics recommends that children’s cholesterol levels be checked between ages 9 and 11. However, children with certain risk factors, such as those whose parents or grandparents have had heart attacks or been diagnosed with blocked arteries at age 55 or earlier in males or 65 or earlier in females, should be tested for cholesterol between ages 2 and 10. How Much Cholesterol You Need Daily In the 20202025 Dietary Guidelines for Americans, the National Academies recommends dietary cholesterol consumption to be as low as possible without compromising the nutritional adequacy of the diet. This is because you dont need any dietary cholesterolyour liver makes all it could ever need on its own. If you are healthy and do not have/are not predisposed to high cholesterol, the FDA recommends keeping your daily dietary cholesterol intake below 300mg per day. Also Check: How Much Cholesterol In Crab Dark Chocolate And Cocoa Cocoa is the main ingredient in dark chocolate. It may seem too good to be true, but research verifies the claims that dark chocolate and cocoa can lower bad LDL cholesterol . In one study, healthy adults drank a cocoa beverage twice a day for a month. They experienced a reduction in bad LDL cholesterol of 0.17 mmol/l . Their blood pressure also decreased and their good HDL cholesterol increased . Cocoa and dark chocolate also seem to protect the bad LDL cholesterol in your blood from oxidation, which is a key cause of heart disease . However, chocolate is often high in added sugar which negatively affects heart health. Therefore, you should use cocoa alone or choose dark chocolate with a cocoa content of 7585% or higher. The effect seems strongest in people with high cholesterol. SummaryThere is some evidence that soy foods can reduce heart disease risk factors, especially in people with high cholesterol.
<urn:uuid:e746c1b5-a164-4eb3-a909-129302a53253>
CC-MAIN-2022-33
https://www.healthycholesterolclub.com/what-is-a-good-amount-of-cholesterol-in-food/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00005.warc.gz
en
0.930723
3,857
2.890625
3
Use mouse to play this game. Dinosaurs are a special theme that appeals to most children across the planet. There is something about these extinct creatures that attracts and holds the attention of kids. You will surprise to see that they can recite all Dinosaur Names and facts about each one through Dinosaur Pictures. And they always learn and finding everything about These prehistoric creatures. So what are dinosaurs? "And why are they so much concerned? What are the precise definitions of dinosaurs that make dinosaur lovers always want to learn about them? Dinosaurs are living creatures on our planet more than 150 million years ago. The name Dinosaurs means "terrible lizard" and has many meanings because they were big creature and scariest. They have a variety different of sizes from a chicken to others over weighing nearly 100 tons. Their diets are also very different, one of them being herbivores while others carnivorous and others an omnivore eats both plants and meat. Scientists have not yet discovered how dinosaurs are extinct. Their fossils were first discovered in 1800. By studying these fossils, researchers know that dinosaurs are ancient cousins of some species like crocodiles, snakes, bird, and lizards today. Scientists have studied that dinosaurs lived from about 245 to 65.5 million years ago during the Mesozoic Era. And they divide the Mesozoic into three periods: the Triassic, Jurassic, and Cretaceous. This is a time when the climate is relatively dry and hot and especially without polar ice as it is today. This is also the environment where dinosaurs first evolved. With this dry climate, some reptiles have heat-resistant skin, such as the skin of some mammals "Therapsids", some flying lizards like Pterodactyl, Pteranodon...others Coelophysis that have "hollow form", Plateosaurus. The Triassic period is a mass extinction of terrestrial animals. However, some dinosaurs still survive. The more they grow and increase in quantity. During this period, the temperature was cooler due to more rainfall. These changes lead to a number of large grow plant species such as ferns, and ponytail. This vegetation is the main food for some herbivorous dinosaurs such as Apatosaurus, Diplodocus, and Brachiosaurus. The dinosaurs at this stage grow very diverse and are present almost everywhere in the world. Besides, a number of other groups of organisms also develop diverse. However all dinosaurs do not have to live at the same time, they can live together and not extinct together. They live in all different environments, from tropical forests to arid deserts. In this period dinosaur development was very diverse. For examples some dinosaurs that live during this period include Velociraptor (aka Raptor): This dinosaur is about 3.3 meters tall, weighs 60kg and it has a smart brain to plan and attack prey. Its bite force reaches 8000 newtons equivalent to today's spotted hyenas. It is a formidable predator in the wild world. Velociraptor is not only the obsession of small dinosaurs like Zephyrosaurus but also brings fear to even larger dinosaurs like Tenontosaurus. Therefore, the Raptor is also known by the scientific world as speed bird of prey, to describe their ability to destroy prey quickly. And it is considered one of the key factors contributing to the brand's success of Jurassic Dinosaur Games. Especially is the Jurassic Park Games game. Triceratops is a herbivorous dinosaur. It is 3 meters tall, 9 meters long and weighs about 10 tons. Triceratops is one of the familiar dinosaurs in a series of Dinosaur Coloring Games. Despite its scary shape, it's a dinosaur gentle and herbivorous species. It only uses horns to fight predators like T-Rex. And it's also one of the most commonly found fossils. Stegosaurus belongs to the family of dinosaurs eating benign plants. Like the bison, it prefers to be fed with ferns or sesame trees rather than fighting. Stegosaurus's name means a roof lizard. Stegosaurus children who love dinosaurs can easily recognize Stegosaurus thanks to the thorny horns growing on its back in Dinosaur Coloring Pages. Besides, It appeared in some famous games like Dino Run 2, Dino Run 3 ... This herbivorous dinosaur possesses a height of up to 10.1m and weighs 3,500kg, equivalent to the size of a large bus. They appeared at the end of the Jurassic period, about 150 - 148 million years ago. Despite its size, Stegosaurus is the lowest IQ dinosaur. According to scientists' research, the Stegosaurus dinosaur's brain is very small, just as big as a walnut, equivalent to a dog's brain. So Stegosaurus dinosaurs are classified as the species with the proportion of brain correlated with the lowest body rate. Tyrannosaurus rex appeared from about 68 to 66 million years ago. It weighs 7 tons, has small characteristic hands and is a violent predator and predator with their powerful bite. T.Rex's biting force is equivalent to a pressure of 8,000 pounds, 10 times the bite of an adult crocodile. Based on the bone structure, scientists estimate they can run at 25 miles per hour, but some other scientists think this number is up to 32 miles per hour. Fossil samples show that the average life expectancy of Rex is 30 years Tyrannosaurus rex is probably the most popular dinosaur in all species. It appears in most dinosaur-related games, including "Jurassic Park Games", "Dinosaur Robots Games", iconic games that cause destruction and death like "Miami Rex", "NY Rex" ... Scientists have classified dinosaurs based on many different factors, but mostly their fossils. Everything involves dinosaurs like fossil dinosaur bones, dinosaur eggs, and other trace fossils like footprints and muzzle rocks. Dinosaurs come in many different sizes and body shapes. Some are giant creatures, weighing more than 100 tons. Others are as small as the bird. Most skin of dinosaurs has scales. We still don't know what color the skin of dinosaurs is. However, some scientists believe that dinosaurs are usually gray and green. Others think dinosaurs have vivid colors. With these colors, they can hide predators, and maybe males want to catch the attention of females. Some large dinosaurs, they move slowly on four legs to support their huge weight. Others can move with their hind legs and stand upright. Because they have lightweight, hollow skeletons and allow them to move quickly. Some types of carnivorous dinosaurs have sharp teeth. They use this set of teeth to tear flesh and prey. Others have long necks and eat vegetation and leaves. You may know that dinosaurs are egg-laying creatures. Currently, scientists have not yet studied how long dinosaurs live, but based on their fossils, scientists show that some may have survived for a hundred years. And they can live in herds. They were able to protect themselves in many ways such as using their horns to protect them, others using their sharp teeth. Scientists have classified dinosaurs into two groups. A group is based on the structure of the hip bones of the dinosaurs - Ornithischia dinosaurs. The other group is lizard - Saurischia dinosaur. This is a dinosaur that looks like the birds today. Ornithischians are people who eat plants. They can move on their two or four feet. They have flat teeth to crush hard vegetation. Stegosaurus is an example. It's a plant-eating dinosaur with a small head's. It has large, triangular bones protruding from its back. Or another dinosaur is Triceratops, with horns like a modern rhino. This species of dinosaur is very similar to that of reptiles today. They are one of the largest creatures that have existed on our earth. Some species have some common characteristics with today's birds. The first bird discovered by scientists is Archaeopteryx - a Saurischian species. And then they divided them into two species: the carnivorous theropod and the plant-eating sauropods. These species of Theropods are comprised of all carnivorous dinosaurs. Theropods go on their hind legs and they use sharp claws and teeth to catch and tear prey flesh. They can hunt alone to catch and eat smaller plant-eating dinosaurs. Occasionally, they hunt in groups and attack larger dinosaurs. Theropods include some species such as Giganotosaurus, Spinosaurus, and especially Tyrannosaurus Rex dinosaur. Sauropods are the largest terrestrial herbivores ever living. They move on their four legs and are considered the largest of all species. An interesting thing about this dinosaur is that they have very small heads and brains compared to their giant bodies. Sauropods all have long necks, which allows them to take food on the tallest plants. Some species can also stand up with their hind legs to rise higher into the tree. In addition, they use long and muscular tails to hold equal when standing. Examples for some Sauropods are Brachiosaurus, Wikimedia Focus, and Apatosaurus. There are many reasons to think that dinosaurs are extinct. Extinction dinosaur is still a mystery and controversial for many scientists. They came up with different theories. Some scientists believe that dinosaurs died because temperatures on Earth were too hot or too cold for them. Others believe that an asteroid has fallen to earth. The falling meteorites can create dust and block sunlight. Plants will stop growing and lead to food-eating dinosaurs that will die from lack of food. And they become prey to other dinosaur meat eaters. Other scientists maintain that dinosaurs can turn into modern birds like ostriches today. We know you always love dinosaurs and you are looking for everything related to dinosaurs such as Dinosaur Games online, dinosaur coloring games, dinosaur pictures, etc? So why not go to our Dinosaursgames.net to start learning and playing with these wonderful creatures? Our Dinosaursgames.net is proud to be the only place that is full of free online dinosaur games to satisfy your dinosaur love! Surely we will not miss any dinosaur game, because new games are added every day! Dinosaur games on our website are diverse and free. With a full range of genres from dinosaur fighting games to dinosaur coloring games. You will always find the best games to play alone or with your friends. You can control terrifying dinosaurs and fight other species in the "Dinosaur War" game. There are also games where you need to use the best modern breasts to hunt them in "Dino Island Rampage". You can also keep it cute in "Sweet Tooth Rush". And there are also interesting dinosaur platform games like "Dinosaur Meat Hunt Dry Land" or "Dinosaur Runner", where you have to solve interesting puzzles to overcome fun platforms. Some boys will love creative games like robot dinosaur assembly games while the girls love coloring dinosaur games. And there are many and many other games waiting for you to discover. Even if you play any kind of dinosaur game, there are many interesting benefits, skills, and experiences. You will practice patience through coloring games. Some science games like "Dino Digger" or "Jurassic Dino Bone Digging" will show you that dinosaur games are not boring! And these games will benefit you with the skill to identify an image. How to match the correct dinosaur shapes. In particular, you will have the opportunity to learn and discuss more the dinosaurs. So get ready to take part in an exciting prehistoric adventure with scary dinosaurs. Playing games allows you to explore a whole new world. Games on our website include browser games for both your computer and your mobile device. Games cannot be downloaded, so you do not need to worry about the risk of infection with malicious viruses. Information and instructions of the games are provided fully based on the experience of members of Dinosaursgames.net. We are always interested in your feedback. Follow us on Facebook, Twitter or Youtuber to up to date with the latest information and games. Now let's come and have fun!
<urn:uuid:4332ca20-ef8f-45c4-b7e2-b3025c943da5>
CC-MAIN-2022-33
https://dinosaursgames.net/play/sant-jordi
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00003.warc.gz
en
0.951456
2,472
3.203125
3
What is Aplastic Anemia? Aplastic Anemia is a very rare life-threatening disease in which the bone marrow ceases to produce a sufficient quantity of blood cells (red blood cells, white blood cells and platelets). About 900 new cases of Aplastic Anemia are diagnosed in the United States each year. Aplastic Anemia is not cancer. The annual incidence of Aplastic Anemia is about 2 cases per million population. [Aplastic Anemia at Marrow.org] Comparatively, an estimated 245,225 people are diagnosed with Leukemia each year in the United States. Bone Marrow Failure Disease Aplastic Anemia is a disease in which the bone marrow fails. It is believed to be an autoimmune disease, because the autoimmune system (or more specifically, a particular type of white blood cell) attacks the bone marrow killing blood stem cells. ORDER YOUR MEMORY CLINGS HERBAL WARNING! DO NOT TAKE ANY FORM OF HERBAL MEDICATION IF YOU SUSPECT THAT YOU HAVE ANY FORM OF BONE MARROW FAILURE DISEASE. SEE MORE AT: DO-NOT-TAKE-HERBAL-MEDS.HTML HERBAL DRUGS ARE A KNOWN CAUSE OF APLASTIC ANEMIA. THEY MAY CAUSE OTHER DISEASES. Blood stem cells are seated in the marrow inside of our bones. Blood stem cells produce all of the body's blood cells. As the blood stem cells are killed off, less and less blood cells are produced and the person's blood counts drop. If a person's blood counts fall too low, transfusions may be required. Low blood cell counts can cause infection, organ failure and death. Aplastic Anemia isn't Cancer While Aplastic Anemia is not a cancer, it is often confused with cancer because of its symptoms,Panerai Replica treatment or the fact that Aplastic Anemia patients are hospitalized and attend clinic at the same places as cancer patients. But it isn't cancer. Aplastic Anemia & Leukemia Similarities Aplastic Anemia & Leukemia (the disease with which Aplastic Anemia is most often confused) have some similarities beyond those mentioned above. - Both Aplastic Anemia and Leukemia are life-threatening diseases. - Both Aplastic Anemia and Leukemia will result in death if left untreated. - Both Aplastic Anemia and Leukemia are treated with chemotherapy. - Both Aplastic Anemia and Leukemia can go into remission and relapse. - Both Aplastic Anemia and Leukemia can present with like symptoms: fatigue, excessive bruising, weakness, reduced exercise tolerance, weight loss, bone or joint pain, infection, fever, abnormal bleeding, and malaise, but both can also exist undetected. - Both Aplastic Anemia and Leukemia can look alike in blood morphology and staining tests - a common issue exists with cell shape, such as anisocytosis (excess variations in sizes of red blood cells). - Both Aplastic Anemia and Leukemia tend to produce blast cells - the body is a miraculous machine that is able to detect when an insufficient supply of blood cells exists, so it produces more; generally speaking, blast cells are immature cells that are released into the blood stream to answer the call for more cells. Aplastic Anemia & Leukemia Differences - Aplastic Anemia is not a cancer; Leukemia is a cancer. - Aplastic Anemia has three types: acquired (due to an environmental factor), inherited (from family), and undetermined origin (the most common); Leukemia is usually not acquired (although some studies indicate that fetuses can acquire the disease, but it also is not inherited). - Aplastic Anemia will fail to produce leukemia cells; leukemia produces leukemia cells. Because of all of the similarities between the various cancers and Aplastic Anemia, AA is difficult to diagnose. It isn't until the blood can be analyzed for various factors that leukemia can be identified, as well as the type of leukemia. Cytogenics is the most common way by which leukemia is excluded from the diagnostic process. Classification of Aplastic Anemia The severity of Aplastic Anemia is categorized as: mild, severe or very severe, depending upon the downward trajectory of the patient's blood count levels. The downward trajectory is caused by the failure of the bone marrow to produce cells as quickly as the cells die off in the body due to many factors, such as normal rates of cell death, exercise that results in faster cellular death, and bruising and bumps that kill off cells that are not replaced. Mild Aplastic Anemia Mild Aplastic Anemia has been known to correct itself. There exists some debate in the medical community over whether cases that appear to be Mild Aplastic Anemia are in fact HELLP syndrome, a condition that arises in pregnant women resulting in decreased blood counts during pregnancy, but correcting itself after pregnancy. Severe Aplastic Anemia Severe Aplastic Anemia usually does not correct itself. It may be treated by Immunosuppression Therapy, which suppresses the T- cells that cause Aplastic Anemia. In most cases, repeated treatments or ongoing treatments are necessary, as are transfusions. The ongoing treatments cause several issues such as copies of many antibodies being introduced into the person that subsequently cause issues and may cause bone marrow transplant failure if that route is opted for in the future. Bone marrow transplants are considered to be the only cure for Aplastic Anemia. Sometimes, people opt not to receive a bone marrow transplant for various reasons, but most people treated with transfusions and immunosuppressant drugs do not have donor matches. You can be the match! Register at Marrow.org. Very Severe Aplastic Anemia Very Severe Aplastic Anemia is so severe a case of this rare disease that a bone marrow transplant is usually the only option. Bone marrow transplants are also considered to be the only 'cure' for VSAA. Bone Marrow Transplant Many medical factors must be considered to develop the proper treatment plan. In cases in which the patient is young and otherwise healthy, bone marrow transplants are often highly recommended. Bone contains marrow. Marrow is comprised of blood stem cells in a sponge-like material, as well as blood cells (neophytes, leukocytes, etc.). Although the terminology used refers to the process as a bone marrow transplant, not all such transplants contain all of the marrow; in fact, most do not. Bone marrow transplants (BMT's) for Aplastic Anemia patients usually only include the blood stem cells. Once marrow is harvested from the donor, the blood stem cells that are removed from the marrow are used for the transplant. Bone Marrow Transplants at Marrow.org. Bone Marrow Donor Finding a suitable donor is often difficult. Siblings have a 25% chance of matching. A male sibling is the ideal donor because a male's marrow is less likely to result in the recipient rejecting the donated marrow or developing "graph-versus-host" disease. Graph-versus-host disease can range from mild GVHD to very severe GVHD resulting in debilitation, and in some fewer cases can be fatal. BE THE MATCH is a campaign being run by the National Marrow Donor Program. That program maintains a worldwide registry of potential donors for people who need a bone marrow transplant. The organization also handles donated cord blood. Symptoms of Aplastic Anemia & Diagnosis Aplastic Anemia could be called a silent killer, because it can realistically exist without presenting obvious external symptoms until the disease has progressed to Very Severe Aplastic Anemia. The most common symptom of Aplastic Anemia might be the tremendous overwhelming exhaustion felt by the inflicted person; a tiredness beyond all fatigue. In the very late stages of the disease, purple dots form on the skin; those are blood vessels breaking beneath the skin surface due to a very low platelet count. There are other symptoms, too, but they can often be misdiagnosed. Those might include repeated miscarriages, constant headaches, changes in vision and repeated infections. It is because of the other symptoms that Aplastic Anemia is usually detected initially, because the patient goes to the doctor, and a complete blood panel is run evidencing low blood count levels. Diagnosis can only begin with a complete blood panel work up, which shows low blood count levels. But there is no test for Aplastic Anemia; diagnosis is a process of elimination of other possible diseases. Causes of Aplastic Anemia The majority of the medical community agree that the actual cause of Aplastic Anemia is unknown. Inherited Aplastic Anemia is usually determinable quite quickly, Acquired Aplastic Anemia however can sometimes be traced due to the chemical change caused by the catalyst, but the majority of Aplastic Anemia cases are determined to have been acquired from an undetermined source. Once the transplant has occurred, the post-transplant processes of managing the complications of a transplant begin. After the blood stem cells from a donor have been transplanted into a recipient, the waiting game begins for engraftment. Hospital stay and release post-transplant Most patients remain in the hospital for about 30-45 days after their transplant, depending upon many factors including engraftment and blood count levels. If the patient's home is a distance away from the Bone Marrow Transplant Unit, the patient will likely be asked to remain in the local area (within 5 miles) of the hospital so that any life-threatening conditions can be immediately treated, and to attend clinic (2-5 times per week). Going home will be different! Regardless of how clean you kept your home before the transplant, your new immune system is more fragile than that of a newborn baby. Newborns have their mother's antibodies to protect them until they are immunized; a BMT patient doesn't have those antibodies, and cannot be immunized for at least one year post transplant. Consequently, special considerations must be taken for household care after the transplant of an Aplastic Anemia patient including sterilizing surfaces and discarding food that is 48 hours old, or drinks that have been open for more than an hour. Food care will be critical. A bone marrow transplant patient cannot peel a banana initially, and while he or she can eat a banana, lettuce is out of the question. Food high in Vitamin K, which is a natural blood thinner, might be forbidden in the early months, and fast food will be forbidden for the first few years at minimum. Your new immune system is fragile and new; it cannot fight off the viruses, bacteria and fungus found on fresh vegetables or fast food. Many life changes will need to be made to normal routines. But these changes are small in comparison to the change that has taken place within a bone marrow transplant patient's body. Life changes can be overwhelming. Be sure to take care of mind, body and soul during this time. It is critically important for all BMT patients to attend their scheduled clinics. There may be times when you just want to postpone it for a week, but it may just that appointment that would uncover an active CMV virus, or a newly contract RSV virus; the difference of a week can be life-threatening. By following the ways to Avoid & Prevent Infections, you will well on your way to doing all you can to protect yourself. One of the most frequent complications after a transplant is the development of Acute Graft-versus-Host Disease, and/or Chronic Graft-versus-Host Disease. An estimated 30-50% of all BMT patients develop GVHD, according to the Blood Journal; other researchers report higher numbers, estimating that 90% of all BMT patients develop some form of GVHD post transplant. One of the common mild (Level 1) forms of GVHD involve the derma (skin). GVHD of the skin is considered to be a very common form of GVHD. The various BMT treatment centers prescribed alternative medical treatment for GVHD. Froedtert Hospital in Milwaukee ascribes to the methodologies of the Seattle Cancer Center, a leader in treating GVHD. Those treatment regimes include Photopheresis. An ounce of prevention is worth a pound of cure That saying couldn't apply more than it does to Aplastic Anemia BMT patients. Avoidance and Prevention to Exposure is key to long term success. Flu & Cold Seasons Means More RSV RSV affects nearly all school-aged children. For those with healthy immune systems, it just another cold, albeit a very bad one. But those with compromised immune systems, it can be life-threatening. Hospital is required for treatment of RSV. If you get a cold, call your doctor immediately. Books & Interesting Info The Body Builders: Inside the Science of the Engineered Human Veterans' Day Specials
<urn:uuid:9daaec92-e955-4df5-9b73-5e422fdfaee9>
CC-MAIN-2022-33
https://www.marrowmatters.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00205.warc.gz
en
0.926085
2,791
3.203125
3
Study found that mild stress can be as damaging as severe ones. Learn to nip stress in the bud before it leaves lasting harm. Feeling stressed? Don’t brush it aside even though it may feel like a mild one. A study published in the Journal of Epidemiology and Community Health revealed that even mild stress can have potentially long term negative health impacts. After tracking some 17,000 working adults in Sweden for about six years, researchers found that participants who reported higher levels of stress at the beginning of the study were linked to an increased chances of obtaining disability benefits later in life. However, what is more surprising is that even those with mild stress were up to seventy percent more likely to receive long term disability benefits, after discounting other factors that could influence the results, such as lifestyle and alcohol intake. While this does not mean you should pop psychotic drugs at the onset of the slightest psychological distress, the study does highlight the need to take those episodes of mild stress more seriously. So the next time you feel one coming when you are at home or in the office, try one of the quick relaxation techniques below to tame your tension. - Dance to shake off stress. Love to dance but no time to hit the clubs? Let your “happy feet” out and dance there and then to your favorite music. - Hold the hands of a loved one. In one study, healthy married couples that regularly held hands, massaged each other, and cuddled for 30 minutes, at least four times a week, had lower levels of stress enzymes and increased production of feel-good hormones. - Get pet therapy. If you do not have a partner, you can also get similar ‘warm touch’ effect by giving your pet gentle long strokes. Not only will this help to reduce your stress level, your pet will also enjoy the affectionate attention it is getting. - Ring up a buddy. Social media may be all the rage now, but calling a buddy to talk over your problems is still a great way to blow off some steam. But refrain from dumping your emotional wastes on your friend unless you want to be labeled as a toxic friend. - Smell your way to blissfulness. Put a few drops of lavender or lemon essential oil on a hanky or tissue paper, hold it close to (but not touch) your nose and breathe in deeply for a couple of minutes. The scents have been found to make one feels calmer and cut stress. - Use heat treatment. Stress can not only make one mentally tense, but also physically. Use one of these anti-stress neck pillows which you can heat up in a microwave oven to relax your neck and shoulders. Some also contain dried herbs or flowers that release their stress-lowering scent upon heating. - Sing your feelings. If you are home alone, crank up your favorite music and sing at the top of your lungs. Don’t worry if you cannot really hit the right notes, the key is to loosen those highly-strung nerves. - Turn into a corpse. Corpse pose, also known as savasana, is a yoga pose often used to begin and conclude a yoga session. To start, lie on your back and spread your legs at about 45-degree angle. Rest your hands naturally by your sides with palms facing up. Breathe naturally and deeply as you relax your whole body part-by-part from head to toe. Stay in this posture for a few minutes. - Meditate on your breaths. Meditation is not a privilege reserved only for the spiritually-inclined. Anyone can learn to meditate and use this ancient practice to relax and increase their focus power. If you like to get started, here are some simple instructions on how to mediate. - Get herbal support. Some herbs such as ginseng and ashwagandha contain anti-stress compounds that can help to increase your resistance to stress and relieve physical and mental fatigue. - Call Mum. A study published in Proceedings of the Royal Society B suggests that hearing mom’s voice can calm frayed nerves by triggering the release of oxytocin, a powerful stress-quelling hormone. And of course, the big assumption is you have a healthy relationship with your mother. - Connect with the divine. Leave your worldly worries behind by forming a gyan mudra with your hands. Practitioners believe that this sign helps to clear the mind and connect one with the cosmos. To use this mudra, simply touch the tips of the thumb and the index finger together and leave the rest relaxed. - Nip worries in the bud. Don’t give worries any chance to fester and grow into something larger than what they really are. Pin them down in writing whenever one comes to mind. By putting them in writing also allows you to decide whether you should act on your worries, or throw them out of your mind altogether. - Counter stress with gratitude. Stress is so capable of narrowing our perspectives that it is easy to lose touch with our blessings and the things we have accomplished. Give yourself a gratitude check each morning by writing the things that you are grateful for, even for things as mundane as a cloudless blue sky. - Take a cold and hot shower. Cold water will give you a rude jolt out of your comatose state, while the hot water that follows will help you to relax and unwind. - Tap for better brain. When under stress, our blood tends to thicken and flow slower. Not a good thing especially when you have a project to rush. To promote blood circulation to the brain, use the tips of your fingers to tap on your scalp for two minutes. - Be early. Pre-empt last minute mad rush and dreadful Murphy’s law manifestations by arriving fifteen minutes early for business appointments and meetings, especially if you are going to be the one giving the presentation. - Surround yourself with nature. No time for nature? Then, bring nature to your office. Put some low-maintenance indoor plants, like lucky bamboo and ferns, and place an attractive indoor water fountain on your desk. The lush green will brighten up an otherwise lifeless office space, while the sight and sound of flowing water provides a relaxing distraction from the computer. - Treat your eyes to a mini spa. Soothe your tired computer eyes by rubbing your palms together for 30 seconds and cup them over your closed eyes for a full minute. If your eyes need extra tender loving care, here are more eye care tips. - Implement an office stretching routine. Prolonged sitting is bad for your heart according to some studies, and regular stretching can help to get you out of a fixed position and get those blood flowing. Need some ideas? Use this Youtube video as a template to design your own stretching moves. - Take forty winks. A fifteen-minute nap during permitted breaks can boost alertness and refresh your mind. If you find slumping over the desk uncomfortable, you can either take a nap in your car (with the engine off, of course), or rest in a remote corner of your office building. Just be sure to set an alarm with your mobile to wake yourself up in time! - Get a discreet leg massage as you work. Kick off your shoes and rest your soles over a foot roller which comes with cylinders covered by rubber studs. Those little fingers will give your legs a stress-relieving massage as you work furiously on yesterday’s project. - Boost your energies with affirmation cards. When you are mentally exhausted, ‘borrowing’ energies from archetypical object or motivational words can replenish the mind with fresh fuels. Affirmation card decks come with beautiful images, often of popular archetypes, and matching words that you can meditate on. Choose a card from your favorite deck and focus on the image for three minutes. Imagine drawing the qualities you desire from the card. Tap on this imagery at work whenever you need that extra mental boost. - Melt stress with relaxing music. Music can help to stimulate as well as relax the mind. Listen to fast-paced music used in thriller movies and your pulse will match it in no time. Likewise, play some relaxing music in the background and feel your heart beat and breathing sync to the nonchalant pace automatically. Don’t know what to play? Here are some relaxation music to add to your playlist. - Clear that desktop clutter. Nothing drains energies like mountains of unfinished paperwork. And clearing piles of papers that have long exceeded their usefulness can actually make you less anxious and give you a sense of accomplishment. Note: If your office clutter needs mammoth efforts to keep in control, start by clearing one pile one at a time. - Empty your inbox. Having 120 unread emails in the inbox can be stress inducing. David Allen, author of Getting Things Done, proposes that for every email that comes in, ask whether it is something you can act on in two minutes or less (like replying with a “Noted. Thanks!”), delegate (hit forward!), or defer (file under mail folders like @CallsToMake, @Boss and @ProjectX for later actions). If you have not read this book yet, put it in your wishlist right away. You will learn a slew of useful office productivity tricks to help keep information overload at bay. - Have a roaring good laugh. Visit Peanuts, Sherman’s Lagoon, Dilbert, or your favorite comic websites to tickle your funny bones and of course, relax! - Contemplate on photos of your family, partner or a favorite trip. Reminding yourself why you are doing all these work can renew your motivation and mental strength. It also gives you a temporary reprieve from the problems you may be facing. - Honor break times. You know your company have permitted breaks, but how often do you actually use them besides the one-hour lunch break? Taking a break is not skiving, it is to rest the body and mind so that you can work better and smarter. - Swap out fluorescent and white LED lights. If this study is anything to go by, it may be a good idea to avoid fluorescent-based and white LED lights which the study author suggests long exposure to such lighting may cause hormonal stress response and lead to cardiovascular diseases and hormone-dependent cancers.
<urn:uuid:21cf57f3-dc4b-4208-a8d9-10cbe3e9c3c5>
CC-MAIN-2019-22
https://thewaterwhispers.com/blog/30-quick-relaxation-techniques-kill-stress/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256724.28/warc/CC-MAIN-20190522022933-20190522044933-00422.warc.gz
en
0.939849
2,136
2.65625
3
The course is part of this learning path An overview of Ansible Tower and Ansible Galaxy Welcome back to Introduction to Managing Ansible Infrastructure. Now that I have Ansible Tower running my playbooks successfully, we need to discuss security. Ansible Tower's main goal is a true orchestration tool with Ansible Playbooks at its heart. Once fully integrated into an environment, Tower may have control over a great many resources. Access control to these resources is absolutely critical and Tower offers the ability to control this in the form of users, organizations and teams. I've brought these terms up a handful of times in this course, but have yet to go into any detail. The simplest form of access control is that of a user. Users are the individual users of the system that will have associated permissions and credentials. To ease the management of groups of users, the concepts of organizations has been introduced. An organization is a collection of users, teams, projects and inventories. Lastly, Tower has the concept of teams. Teams are a subset of an organization that provide a method to delegate responsibilities across organizations in a role-based like access control method. I know these definitions may seem a little vague, so I will go over each in more detail. As I mentioned earlier, users are the simplest form of access control in Tower. Tower breaks down its users in three classes. A normal user who has limited read and write access to inventories and projects. A system auditor which is a normal user with read only access to all resources, and a system administrator which is a user with unlimited administrative access to Tower. Don't confuse these user types with the underlying Linux system users. Creating a user is very straight forward. Select the system configuration icon, the gear at the top of the screen and choose users. Clicking the green add button will bring up the new user dialogue. Complete the form and click save. You have now created a new Tower user. Organizations are a collection of users, teams, projects and inventories. The purpose of an organization is to bind resources, projects and inventories to users, users and teams. Allowing a logical unit to which to assign access control. Organizations are managed from the settings menu. To add a new organization, click the green add button, fill out the name and description and click save. Users and teams can now be added via the permissions tab. Organizations also support the ability to notify members of events within the organization. The notifications tab allows notifications to be configured. Notifications can be delivered by a number of methods including email, Slack, PagerDuty and IRC. On a trial Self-Support licence only the existing default organization can exist and be used. Teams can be a subdivision of organizations and provide a role based access control scheme across organizations. Teams are made up of users and thus permissions can be granted to a whole team rather than each individual user on the team. When a user is added to a team, that user can be assigned as an admin with escalated privileges for managing the team including viewing the activity stream of a team, adding and removing members and managing permissions. If a user isn't an admin, they are simply a team member. A team can be created or managed from the settings page under Teams. Create a new team by clicking the add button and note that a name and organization are required. Once created users can be added and permissions can be granted by editing the team. I have spoken at length about permissions and access control, but only touched on the topic of credentials. Tower manages credentials for many systems that we'll need to interact with. These include individual machine, cloud, network and SCM credentials. Machine credentials are those which Ansible will need to run on a machine. These are typical credentials involving system user names, not Ansible user names, SSH private keys, passwords and methods with privilege escalation. Cloud credentials consist of the different supported clouds and their associated credential requirements for accessing that cloud. Currently, the following cloud infrastructures are supported by Tower: Amazon Web Services, Rackspace, VMware vCenter, Red Hat Satellite 6, Red Hat CloudForms, Google Compute Engine, Microsoft Azure and OpenStack. The network credentials allow Ansible to connect to networking modules for managed network devices. Ansible supports a vast array of network modules, such as modules for JUNOS, Nexus, F5, EOS, and many others. The last type of credentials I mentioned are SCM, Source Control Management modules. Used for retrieving playbooks, these are remote code repositories and require credentials. Added credentials are stored encrypted in Tower. They cannot be retrieved in plain text by any user from any interface. Storing them in Tower prevents the need to manage credentials when a user joins or leaves an organization, a team or Tower itself. Management of credentials in Tower are accessible from the settings button. Credentials can be added to Tower from the credentials page by clicking the green add button. A name is required and based on the credentials I mentioned earlier, choose the appropriate credential and fill out the required credential data. Once the credential is saved, it can be used a user, team, an organization. The last Ansible Tower topic I would like to touch on is the availability of both a command line interface and an application programming interface. The Ansible Tower CLI is written in Python and can be installed with pip. It utilizes the Tower API and is capable of creating, deleting, modifying and reading most objects in Tower. It also supports authentication against Tower's API and will run against a remote Tower host. Credentials and configurations are stored in the config files, but can also be passed at run time. General usage is to pass the Tower's CLI, a resource and an action to use on that resource. I have provided a handful of example uses for the command line interface: listing users, launching a job, disabling SSL warning which is necessary when using a self-signed SSL certificate, launching a job including extra vars, updating a user and accessing the included help system. Ansible Tower offers an easy way to use representational state transfer, API or REST via HTTPS protocol. The API is browseable by pointing a web browser to Tower's server's address and appending /api/ to the URL. From there, the various resources can be browsed and put in post methods using JSON formatted strings for variables can be passed for manipulating the API. Tower also supports multiple versions of the API which can be specified by appending the version number to the end of the URL. For example, /api/v1/. When querying the API, returned data can be sorted by adding question mark, order, underscore, by, equals, open curly bracket, open curly bracket, field, closed curly bracket, closed curly bracket to the end of the URL requested. In a similar fashion, searching can be done as well with question mark search equals value. While the API is fairly straight forward, it's not extremely useful from the web based interface. Let's look at a demonstration using the API from a Python script to view all the users currently in Tower. I'll start by creating view users.py and add the basic Python shebang. As I mentioned earlier, values past two and received from the API will be in JSON format. So, I'll include the JSON library. Additionally, I'll use the urllib2 to talk to the API, and I'm gonna do this for security over https, so I want my SSL library. I'll then add the basic Python starting point. Now, before we can do anything, I need to authenticate myself against the Tower API. For this example, we'll stick with using localhost for Tower host and admin Tower for the username and password. If you recall in the command line section above, I mentioned disabling SSL certificate verification for self-signed certificates. I'll be doing the same thing here by using the SSL create unverified context syntax. Now, to authenticate myself, we're gonna receive a token back so that we can have continued communications with Tower without having to re-authenticate ourselves for each call we make. So, we'll call that our session token. Now in the same way I disabled the SSL cert verification, we're gonna set the URL to point to API version one and the auth token interface we're gonna pack, pass it local host. We then need to pass parameters. So what we're doing here is we're passing the username which is admin and the password which is Tower. As a dictionary, remember using json dumps to convert that to a string. The last bit of information we need is the content type, and that's gonna be application json and now we can make our https request. Pass it the URL, the parameters and content type. Now, we're gonna open the URL and store the results. So, we send our request. We pass it the context which is our username and password and then we read in the results. Now, the results are going to come back to us as a string and it's going to be a JSON string. As I said earlier, everything that we send and receive is JSON. So, we're gonna take the JSON called json loads which will convert this into a dictionary. Now, we need the session token. The session token will be returned in that dictionary. So, we'll fetch it from there and return it back so that our session has a valid token. Now, that we've spoken to the API and gotten our token, we can make the request to take a look at the user. So, we'll fetch our users using the function fetch users we'll pass the session token to it, but before we do that, let's stop for a moment and print out the session token, just so we can see that it's working properly. Please note that this should be urllib2 and we'll test to see if it prints out the token, and there it goes. So, that's is the token string we'll be passing each time we make a call to the API from this time forward. So now we'll create the function that will query the user endpoint of the API. The target URL is now going to point to the API versions one like before, but to the user's endpoint, and again, we must set the context to prevent it from checking for a valid certificate and this time we're adding a token header. This is where we pass in our session token. It gets formatted as a string. It's gonna be token followed up by a space and the actual session token, and this gets passed in as a Python dictionary. So, like with the authentication we make our request, pass it the target, pass it an empty dictionary, since we have no parameters to go in there and then finally, pass it our token header, and that will open up our URL with our request, and again, pass it the context to avoid checking, and we're gonna return. Again, convert the string to JSON first. We will return exactly what was sent to us. So, now we can take a quick look, we can print our users and we can run this again. So, as you can see here, the list of our users was returned. We get a lot of detailed information including teams, roles, projects, et cetera. There is currently only one user, our default user admin. If there were more it would list each one as part of the results list. This is a very basic example and much more can be done to automate much of Ansible Tower through its API. Hopefully, this short example and course was helpful in seeing the potential Ansible Tower has to manage an environment and fit into a CICD Pipeline. About the Author Stelligent's entire focus is DevOps automation and Continuous Delivery in the AWS cloud. Founded in 2007, Stelligent is an AWS Advanced Consulting Partner with the DevOps Competency. For more information please visit https://stelligent.com/
<urn:uuid:95f43ba0-27c0-4bcb-b421-f7831e455e98>
CC-MAIN-2019-22
https://cloudacademy.com/course/introduction-to-managing-ansible-infrastructure/ansible-tower-cli-1/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256314.25/warc/CC-MAIN-20190521082340-20190521104340-00462.warc.gz
en
0.931119
2,483
2.59375
3
How Does the Child Welfare System Work? The child welfare system is a group of services designed to promote the well-being of children by ensuring safety, achieving permanency, and strengthening families to successfully care for their children. Most families first become involved with the child welfare system due to a report of suspected child abuse or neglect (sometimes called "child maltreatment"). Child maltreatment is defined by Federal law1 as serious harm (neglect, physical abuse, sexual abuse, and emotional abuse or neglect) caused to children by parents or primary caregivers, such as extended family members or babysitters. Child maltreatment can also include harm that a caregiver allows to happen (or does not prevent from happening) to a child. In general, child welfare agencies do not intervene in cases of harm to children caused by acquaintances or strangers. These cases are the responsibility of law enforcement.2 The child welfare system is not a single entity. Many organizations in each community work together to strengthen families and keep children safe. Public agencies (departments of social services, child and family services, etc.) often contract and collaborate with private child welfare agencies and community-based organizations to provide services to families, such as in-home ("family preservation") services, foster care, residential treatment, mental health care, substance abuse treatment, parenting skills classes, employment assistance, and financial or housing assistance. Child welfare systems are complex, and their specific procedures vary widely by State. The purpose of this fact sheet is to give a brief overview of the purposes and functions of child welfare from a national perspective. Child welfare systems typically: - Receive and investigate reports of possible child abuse and neglect. - Provide services to families who need assistance in the protection and care of their children. - Arrange for children to live with foster families when they are not safe at home. - Arrange permanent adoptive homes or independent living services for children leaving foster care. What happens when a report of possible abuse or neglect is made? Any concerned person can report suspicions of child abuse or neglect. Most reports are made by "mandatory" reporters (persons who are required by State law to report suspicions of child abuse and neglect). In approximately 18 States, any person who suspects child abuse or neglect is required to report. Reports of possible child abuse and neglect are generally received by child protective services (CPS) workers and either "screened in" or "screened out."3 A report is screened in if there is sufficient information to suggest an investigation is warranted. A report may be screened out if there is not enough information on which to follow up or if the situation reported does not meet the State's legal definition of abuse or neglect.4 In these instances, the worker may refer the person reporting the incident to other community services or law enforcement for additional help. In the year 2002, an estimated total of 2.6 million referrals involving 4.5 million children were made to CPS agencies. Approximately 67 percent (1.8 million referrals) were screened in, and 33 percent (861,000 referrals) were screened out.5 When a report is "screened in," what happens next? CPS workers (often called "investigators") respond within a particular time period (anywhere from a few hours to a few days) depending on the type of maltreatment alleged, the potential severity of the situation, and requirements under State law. They may speak with the parents and other people in contact with the child (such as doctors, teachers, or childcare providers). They also may speak with the child, alone or in the presence of caregivers, depending on the child's age and level of risk. Children who are believed to be in immediate danger may be moved to a shelter, foster care placement, or a relative's home during the investigation and while court proceedings are pending. An investigator's primary purpose is to determine if abuse or neglect has occurred and if there is a risk of it occurring again. Some jurisdictions now employ an "alternative response" system. In these jurisdictions, when risk to the children involved is considered to be low, the CPS caseworker may focus on assessing family difficulties and offering needed services, rather than gathering evidence to confirm the occurrence of abuse or neglect. At the end of an investigation, CPS workers typically make one of two findings— "unsubstantiated" ("unfounded") or "substantiated" ("founded"). (These terms vary from State to State.) Typically, a finding of "unsubstantiated" means there is insufficient evidence for the worker to conclude that a child was abused or neglected, or what happened does not meet the legal definition of child abuse or neglect. A finding of "substantiated" typically means an incident of child abuse or neglect (as defined by State law) is believed to have occurred. Some States have additional categories, such as "unable to determine," that suggest there was not enough evidence to either confirm or refute that abuse or neglect occurred. The agency will initiate a court action if it determines that the authority of the juvenile court (through a child protection or "dependency" proceeding) is necessary to keep the child safe. To protect the child, the court can issue temporary orders placing the child in shelter care during investigation, ordering services, or ordering certain individuals to have no contact with the child. At an adjudicatory hearing, the court hears evidence and decides whether maltreatment occurred and whether the child should be under the continuing jurisdiction of the court. The court then enters a disposition, either at that hearing or a separate hearing, which may result in the court ordering a parent to comply with services necessary to ameliorate the abuse or neglect. Orders can also contain provisions regarding visitation between the parent and child, agency obligations to provide the parent with services, and services needed by the child. In 2002, approximately 896,000 children were found to be victims of child abuse or neglect.6 What happens in substantiated cases? If a child has been abused or neglected, the course of action depends on State policy, the severity of the maltreatment, the risk of continued or future maltreatment, the services available to address the family's needs, and whether the child was removed from the home and a court action to protect the child was initiated. The following general options are available: - No or low riskThe family's case may be closed with no services if the maltreatment was a one-time incident, there is no or low risk of future incidents, or the services the family needs will not be provided through the child welfare agency, but through other systems. - Low to moderate riskReferrals may be made to community-based or voluntary in-home CPS services if the CPS worker believes the family would benefit from these services and the risk to the child would be lessened. This may happen even when no abuse or neglect is found, if the family needs and is willing to participate in services. - Moderate to high riskThe family may again be offered voluntary in-home CPS services to help ameliorate the risks. If these are refused, the agency may seek intervention by the juvenile dependency court. Once there is a judicial determination that abuse or neglect occurred, juvenile dependency court may require the family to cooperate with in-home CPS services if it is believed that the child can remain safely at home while the family addresses the issues contributing to the risk of future maltreatment. If the child has been seriously harmed or is considered to be at high risk of serious harm, the court may order the child's removal from the home or affirm the agency's prior removal of the child. The child may be placed with a relative or in foster care. In 2002, an estimated 265,000 children were removed from their homes as a result of a child abuse investigation or assessment.7 What happens to people who abuse children? People who are found to have abused or neglected a child are generally offered voluntary help or required by a juvenile dependency court to participate in services that will help keep their children safe. In more severe cases or fatalities, police are called upon to investigate and may file charges in criminal court against the perpetrators of child maltreatment. (In many States certain types of abuse, such as sexual abuse and serious physical abuse, are routinely referred to law enforcement.) Whether or not criminal charges are filed, the perpetrator's name may be placed on a State child maltreatment registry if abuse or neglect is confirmed. A registry is a central database that collects information about maltreated children and individuals who were found to have abused or neglected those children. These registries are usually confidential, and used for internal child protective purposes only. However, they may be used in background checks for certain professions, such as those working with children, so children will be protected from contact with individuals who may mistreat them. What happens to children who enter foster care? Most children in foster care are placed with relatives or foster families, but some may be placed in group homes. While a child is in foster care, he or she attends school and should receive medical care and other services as needed. The child's family also receives services to support their efforts to reduce the risk of future maltreatment and to help them, in most cases, be reunified with their child. Parents may visit their children on a predetermined basis. Visits also are arranged between siblings, if they cannot be placed together. Every child in foster care should have a permanency plan that describes where the child will live after he or she leaves foster care. Families typically participate in developing a permanency plan for the child and a service plan for the family. These plans guide the agency's work. Except in unusual and extreme circumstances, every child's plan is first focused on reunification with parents. If the efforts toward reunification are not successful, the plan may be changed to another permanent arrangement, such as adoption or transfer of custody to a relative.8 Occasionally the plan involves a permanent placement with a foster family, usually for older children who have become strongly attached to the family or for whom a suitable adoptive home cannot be found. In addition to a permanency plan, older children should receive transitional or independent living services to assist them in being self-sufficient when they leave foster care between the ages of 18 and 21. Federal law requires the court to hold a permanency hearing, which determines the permanent plan for the child, within 12 months after the child enters foster care and every 12 months thereafter. Many courts review each case more frequently to ensure that the agency is actively engaged in permanency planning for the child. In fiscal year 2001, 57 percent of children leaving foster care were returned to their parents. The median length of stay in foster care was 12 months.9 The goal of child welfare is to promote the safety, permanency, and well-being of children and families. Even among children who enter foster care, most children will leave the child welfare system safely in the care of their birth family, a relative, or an adoptive home. For more detailed information about child welfare, please refer to the resources listed below. For more information about the child welfare system in your State or local jurisdiction, contact your local public child welfare agency. Badeau, S. & Gesiriech, S. (2003). A child's journey through the child welfare system. Washington, DC: The Pew Commission on Children in Foster Care. (http://pewfostercare.org/docs/index.php?DocID=24) Goldman, J. & Salus, M. (2003). A coordinated response to child abuse and neglect: The foundation for practice (The User Manual Series). Washington, DC: U.S. Department of Health and Human Services. McCarthy, J., Marshall, A., Collins, J., Milon, J., Arganza, G., Deserly, K. (2003). Family guide to the child welfare system. Washington, DC: National Technical Assistance Center for Children's Mental Health at Georgetown University Center for Child and Human Development. (http://gucchd.georgetown.edu/products/AFamilysGuide_English.pdf) Rycus, J. & Hughes, R. (1998). Field guides to child welfare (Vol. I - IV). Washington, DC: CWLA Press. U.S. Department of Health and Human Services. U.S. Department of Health and Human Services. (2004). Child maltreatment 2002. Washington, DC: U.S. Government Printing Office. (http://www.acf.hhs.gov/programs/cb/resource/child-maltreatment-2002) U.S. Department of Health and Human Services. (2003). Child welfare outcomes 2000: Annual report. Washington, DC: U.S. Government Printing Office. (http://www.acf.hhs.gov/programs/cb/resource/cwo-2000) U.S. Department of Health and Human Services (2011). Definitions of child abuse and neglect. 2011 Child Abuse and Neglect State Statute Series: Statutes-at-a-Glance. National Clearinghouse on Child Abuse and Neglect Information. (http://www.childwelfare.gov/systemwide/laws_policies/statutes/define.cfm) U.S. Department of Health and Human Services (2010). Mandatory reporters of child abuse and neglect. 2010 Child Abuse and Neglect State Statute Series: Statutes-at-a-Glance. National Clearinghouse on Child Abuse and Neglect Information (http://www.childwelfare.gov/systemwide/laws_policies/statutes/manda.cfm). U.S. Department of Health and Human Services (2009). Reporting procedures. 2009 Child Abuse and Neglect State Statute Series: Statutes-at-a-Glance. National Clearinghouse on Child Abuse and Neglect Information (http://www.childwelfare.gov/systemwide/laws_policies/statutes/manda.cfm). 1 Keeping Children and Families Safe Act of 2003, Title I Child Abuse Prevention and Treatment Act (P.L. 108-36). Each State has its own laws that define abuse and neglect for purposes of stating the reporting obligations of individuals and describing required State/local child protective services agency interventions. For State-by-State information about civil laws related to child abuse and neglect, visit the National Clearinghouse on Child Abuse and Neglect Information website at http://www.childwelfare.gov/systemwide/laws_policies/state/. 2 While some States authorize child protective services agencies to respond to all reports of alleged child maltreatment, other States authorize law enforcement to respond to certain types of maltreatment, such as sexual or physical abuse. 3 See Mandatory Reporters of Child Abuse and Neglect and Reporting Procedures, available from the National Clearinghouse on Child Abuse and Neglect Information Statutes-at-a-Glance Series (http://www.childwelfare.gov/systemwide/laws_policies/state/). 4 See Definitions of Child Abuse and Neglect, available from the National Clearinghouse on Child Abuse and Neglect Information Statutes-at-a-Glance Series (http://www.childwelfare.gov/systemwide/laws_policies/state/). 5 U.S. Department of Health and Human Services. (2004). Child maltreatment 2002. Washington, DC: U.S. Government Printing Office. 8 Under the Adoption and Safe Families Act (ASFA), while reasonable efforts to preserve and reunify families are still required, State agencies are required to seek termination of the parent-child relationship when a child has been in foster care for 15 of the most recent 22 months. This requirement does not apply (at the State's option) if a child is cared for by a relative, if the termination is not in the best interest of the child, or if the State has not provided adequate services for the family. 9 U.S. Department of Health and Human Services. (2012). The AFCARS Report (Preliminary FY 2001 estimates as of March 2003).
<urn:uuid:14ef2391-0807-4079-af7a-bb15c19df892>
CC-MAIN-2022-33
https://www.mentalhelp.net/abuse/how-does-the-child-welfare-system-work/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00205.warc.gz
en
0.940445
3,392
3.734375
4
Every religion has their idea of salvation. This word usually refers to some altered or improved state of being in this life, or a new existence of some kind after death. Every religion, we have learned, has a different name for "salvation": - The Taoists call it balance (ying/yang) - Buddhists refer to it as nirvana - Hindus call it Moksha - Islam speaks of paradise No matter what other religions call it or how they describe its experience, they all share a similar pathway to their own concepts of salvation. In all religions, except Christianity, salvation is achieved by some kind of human effort. For example, Buddhism requires meditation, knowledge and self-denial to reach its salvation goal. Islam demands that its adherents practice and maintain the five spiritual exercises if they wish to arrive at paradise. These are only two examples but all other religions (aside from Christianity) demand some form of moral or religious law keeping in order to become worthy and acceptable to a higher power and thus saved. The basic premise is always the same: - Mankind is flawed and subject to death. - God or a higher power/force provides the knowledge and method to improve this flawed condition and ultimately escape death in some way. - That knowledge and method is mediated by religious leaders who teach and maintain the spiritual discipline to eventually be "saved." - If the individual works hard enough, trains well enough, is zealous enough in his practice of religious customs and rules, he will win the prize: salvation. Except for customs and names, this has been the pattern for obtaining salvation outlined by most of the major religions in the world throughout the history of mankind. Christianity's idea and approach to salvation is completely different. Christianity and Salvation Christianity begins with the same premise concerning mankind's general condition. Humans are flawed, subject to moral failure and physical suffering and death. The Bible, which reveals Christianity's view on human salvation, teaches that the source of this condition is mankind's sinfulness. Paul, the Apostle, summarizes this idea in his epistle to the Romans when he says: for all have sinned and fall short of the glory of God, - Romans 3:23 And then he declares what the consequence of this sinfulness is: For the wages of sin is death, - Romans 6:23a In another epistle, John the Apostle, describes what sin is: Everyone who practices sin also practices lawlessness; and sin is lawlessness. - I John 3:4 In the book of Isaiah, the Old Testament prophet explains in more detail the effect that sin has on us and why it leads to death: But your iniquities have made a separation between you and your God, - Isaiah 59:2a So if we were to summarize these few verses about sin and its effect we could say that: - Sin is disobedience to God's will. - Everyone at one time or another sins. - This disobedience separates us from God. - This separation ultimately leads to our physical death as well as our spiritual suffering because our spirit cannot be at peace or experience joy if it is separated from the Spirit of God in whose image it was originally created (Genesis 1:26). Let me give you a visual example of this phenomenon: Let us say you have a plant. The main stem is God and the leaves are people. So long as the leaves are connected to the plant they are alive and produce more leaves and blossoms, etc. But if I were to separate a leaf from the main plant by cutting it off, what would happen? It would look the same, have the same color, even keep its freshness for a while. However, after a time it would dry up and die. That leaf would turn brown and eventually become dust, not capable of renewal. The main plant, however, and its leaves would continue to live and bloom. This is not a perfect example but it does demonstrate the process that takes place through human sinfulness and the need for salvation (which is another word for "rescue"). We are born sinless and joined to God who brings us into being and sustains our physical and spiritual lives. Eventually we sin. We disobey His commands and laws concerning moral and spiritual behavior. In doing so we separate ourselves from Him and become subject to further moral decay, physical death, and a spiritual separation from God after death. The problem here is that once we are cut off from God, we do not have the ability to reattach ourselves to Him, and thus are doomed just like the dead leaf cannot reattach itself to the plant. This is the essential difference between Christianity and all other religions. Other religions believe and teach that human beings are able to reattach themselves to God through human effort of some kind: - Gaining religious knowledge and insight. - Practicing religious disciplines such as worship, meditation, secret rituals, pilgrimages, etc. - Some try to achieve it through extreme denial of human appetites, or food restrictions, etc. Whatever the culture, tradition, or religion, the method is the same, an attempt to be reunited with God by human effort in order to avoid suffering, death, and the separation of the soul from its natural place with God. Christianity is unique in that it reveals a method for rescuing man based on God's actions and not human effort. The Bible teaches how God "rescues" or saves us from the death caused by our separation from Him due to our sins. Here is how it works: 1. God pays the moral debt we owe Him. Each sin we make, each law we break creates a moral debt we owe to God. This moral debt is the cause of our guilt, shame, fear of death, and judgment because we know we are guilty. We cannot repay this moral debt because we are polluted by sin and cannot produce the sinless, perfect life required to remove a lifetime of imperfection and sin. God pays the moral debt through Jesus Christ, it is in this way that God "rescues" us. Paul, the Apostle, explains it this way: 6For while we were still helpless, at the right time Christ died for the ungodly. 7For one will hardly die for a righteous man; though perhaps for the good man someone would dare even to die. 8But God demonstrates His own love toward us, in that while we were yet sinners, Christ died for us. 9Much more then, having now been justified by His blood, we shall be saved from the wrath of God through Him. 10For if while we were enemies we were reconciled to God through the death of His Son, much more, having been reconciled, we shall be saved by His life. 11And not only this, but we also exult in God through our Lord Jesus Christ, through whom we have now received the reconciliation. - Romans 5:6-11 This passage explains and points out certain features of the Christian religion: 1. Why did God take on a human form in Jesus Christ? Only a perfect life could be offered for the moral indebtedness of man and only God in the form of man could accomplish this perfect life. 2. Why did Jesus have to die in order to obtain this forgiveness for man's moral debt? Death was required because according to God's spiritual laws, human sinfulness could only be atoned for through death.As the writer of the epistle to the Hebrews says, And according to the Law, one may almost say, all things are cleansed with blood, and without shedding of blood there is no forgiveness. - Hebrews 9:22 A perfect life was required to make up for the imperfect life of mankind destroyed by sin. God takes the form of a human being, Jesus Christ, and offers this innocent and perfect life as a sacrifice to pay the moral debt of sin for all of mankind. 3. How does the sacrifice of one pay for the sins of all? If Jesus were only a man, a good and holy man, his sacrifice could atone for himself or another. One man pays for one other person. But because Jesus is God, has a divine nature - the value of His life and thus sacrifice is different. As God, the sacrifice of His divine life is able to pay for the sins of all mankind. For Christ also died for sins once for all, the just for the unjust, so that He might bring us to God, having been put to death in the flesh, but made alive in the spirit; - I Peter 3:18 4. What was the role of the Jewish people? God chose one man, Abraham, and from him He created a special people. He gave them their religion, a country, laws, and formed their culture and history (read about this process in the Old Testament). The reason for this was to provide a religious, cultural, and historical stage on which He would appear as Jesus Christ. His purpose was to offer His life for the sins of mankind; the Jewish people were the vehicle used to make His human appearance and be the first to be offered salvation. 5. What is the role of the Bible? The Bible is the inspired account of God's plan to save humanity through Jesus Christ. It records the beginning of the world but then focuses in on the forming of the Jewish people and continues to tell their story until the appearance of Jesus and follows with the eyewitness accounts of His death, burial, and resurrection. It ends with the history of the forming of His church and the spread of Christianity in the 1st century. Its main theme, however, is the salvation of mankind through Jesus Christ. Paul the Apostle summarizes this idea in writing to a young minister when he says, and that from childhood you have known the sacred writings which are able to give you the wisdom that leads to salvation through faith which is in Christ Jesus. - II Timothy 3:15 And so, Christianity presents a unique way to deal with the consequences of human weakness and moral failure. Not by human effort and religious practice or attempts to achieve moral perfection, but God offers Himself through Jesus Christ as the payment for the debt of sins. In Christianity, God rescues us from death, from separation, from condemnation, because we do not have the power to do so. This is not to say that humans have no participation in the rescue. We do offer something to God, but it is the only thing we truly have to give to God and that is our faith. This brings us to the second important teaching in the Bible concerning this subject. Salvation is offered to man based on faith, not human effort. In Christianity God does what is impossible for man, pay the moral debt for sin, and man does what is humanly possible, he trusts God. This is the sum of salvation. God offers man rescue from death and separation caused by sin and man believes and trusts in God to accomplish this on his behalf. This beautiful reconciliation is described in various ways in the Bible. Therefore, having been justified by faith, we have peace with God through our Lord Jesus Christ, - Romans 5:1 For God so loved the world, that He gave His only begotten Son, that whoever believes in Him shall not perish, but have eternal life. - John 3:16 If I were to go back to my example of "separation" with the plant used earlier in the chapter; in Christianity it is as if God takes the cut-off branch and reattaches it back to Himself. People do this with plants and damaged trees all the time, it is called grafting. They cut a wedge and reattach the severed branch and hold it in place with some kind of wrapping. In the same way God grafts us back into Himself and the element that holds us into place, so to speak, is faith. This is the key doctrine of the Christian religion: salvation by faith through grace. In other words, because of God's kindness (grace) He offers us salvation (rescue) based on our faith in Jesus Christ and not based on personal goodness or human effort. Paul the Apostle says it this way: 21But now apart from the Law the righteousness of God has been manifested, being witnessed by the Law and the Prophets, 22even the righteousness of God through faith in Jesus Christ for all those who believe; for there is no distinction; - Romans 3:21-22 Of course there are many facets and details to the Christian religion I have not mentioned here and will discuss in our next two chapters, but the issue of salvation and how it is produced by God and received by man is the core teaching of the Bible and Christianity. Now there are some questions that naturally arise from this teaching and what most of us already know about Christianity. What is faith and what exactly are we to believe? Belief, by simple definition, is to accept something as true. In Christianity we accept as true that Jesus Christ is the son of God. When challenged to believe, Peter, one of the Apostles, demonstrated the essence of Christian belief when he said, "You are the Messiah, the son of the Living God." in Matthew 16:16. There are many other teachings and details of the Christian faith that one must know and understand and believe, however, for salvation's sake, the essential belief is what we believe about Jesus Christ. Of course this belief includes our trust that His death pays for our sins and our faith in Him makes us right before God. What about repentance and baptism? In the Bible, faith is almost always associated and accompanied by repentance and baptism. Repentance refers to a change of heart. A turning from disbelief and sin to belief and a desire to please and obey God. The English word, baptism, comes from a Greek word which means to plunge or immerse in water. In the Bible those who believed in Jesus expressed that faith through repentance and baptism. For example, When Peter the Apostle preached about Jesus' death and resurrection he encouraged people to believe and when they responded to him and asked how they were to do this, he said, Peter said to them, "Repent, and each of you be baptized in the name of Jesus Christ for the forgiveness of your sins; and you will receive the gift of the Holy Spirit. - Acts 2:38 In another passage Paul describes what was said to him before he was baptized by a man called Ananias, Now why do you delay? Get up and be baptized, and wash away your sins, calling on His name.' - Acts 22:16 To summarize, God offers salvation through the sacrifice of Jesus Christ. We accept that sacrifice for our sins by faith, that is, by believing that Jesus is the Son of God. And we express that faith, according to God's command, in repentance and baptism. Who can become a Christian and when can a person be baptized? Jesus answers this question when He spoke to His Apostles recorded in the gospel of Mark, 15And He said to them, "Go into all the world and preach the gospel to all creation. 16He who has believed and has been baptized shall be saved; but he who has disbelieved shall be condemned. - Mark 16:15-16 Jesus Himself says that the good news of salvation is for everyone. Anyone who believes and is baptized is saved, no exceptions based on color, race, education, gender, social position. However, He also makes clear that those who refuse to believe have no alternative way to be saved. This means that when we come to belief - then we should not hesitate to express that faith in the way God intended, through repentance and baptism. As we close this lesson on salvation, let me encourage anyone reading this message to believe in Jesus and trust in the way of salvation that only He offers. If you have not yet expressed your faith in repentance and baptism then please do so as soon as you can. - What is the most common view of salvation among the major religions and why have they come to this conclusion? - Why do you think many people have no "feeling" of lostness? What can be done to reveal this to them? - Why do you think some people abandon Christianity in order to become Muslims, Buddhists, or Hindus?
<urn:uuid:5b8cadec-3895-4c4a-a902-129027fca310>
CC-MAIN-2019-22
https://bibletalk.tv/salvation
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257361.12/warc/CC-MAIN-20190523184048-20190523210048-00222.warc.gz
en
0.965442
3,383
2.921875
3
20 Most Popular Japanese Castles According to Locals Japan’s castles are one of the most popular tourist attractions in the country. They’re grand, beautiful, and are essentially history given physical form. But considering that there are hundreds of them spread throughout the country, it might be difficult to decide which stronghold you should visit. Fortunately, in 2020, Tripadvisor compiled a list of 20 Japanese castles most popular with domestic tourists, which we’ll discuss in this article, together with everything you need to know about these fascinating fortifications. Nov 10 2021 (Aug 01 2022) The History of Japanese Castles By the 15th century, the Emperor and the shogun—the country’s military leader and, at times throughout history, Japan’s de-facto ruler—lost a lot of their authority, leading to a period of political instability when powerful warlords vied for control of Japan. This came to be known as the Sengoku (Warring States) period, which lasted from 1467 to 1615. It was during these turbulent times that the majority of Japan’s castles were constructed. A lot of these strongholds eventually developed castle towns around them, which over time became modern Japanese cities. The Layout of a Japanese Castle A typical Japanese castle was built on an elevation, which was reinforced by large stones built in a sloped shape to make it hard for attackers to approach the fortification, with moats providing additional security. However, unlike European castles, the foundation is where the Japanese castle’s stonework largely ended, as castle walls in Japan were normally made from wood, plaster, and tiles. The most strategically important (and often the most grandiose) part of Japanese castles was the tower keep (“tenshu”), though it is important to note that it didn’t include sleeping quarters. Those were located in a separate palace building, which was usually the most ornamented and opulent part of a Japanese castle. These structures could be found in the innermost part of the complex called the “honmaru”, meaning “main circle” since Japanese castles were arranged with multiple defense enclosures. The honmaru was its center and it was typically surrounded by a protective “ninomaru” second circle, though some Japanese castles could have three (sannomaru) or four (yonnomaru) enclosures in total. 20 Most Popular Japanese Castles Rated by Japanese Tourists 20. Maruoka Castle (Fukui Prefecture) Today, only the three-story keep of Maruoka Castle (Maruoka-jo) remains of the original structure, which was once nicknamed “The Mist Castle.” The name is based on a legend which says that whenever enemies would approach Maruoka Castle to attack, the entire area would suddenly become shrouded in a thick, mysterious mist. The castle grounds are today a public park and one of the most popular cherry blossom-viewing sites in Japan, where every year around mid-April, 400 cherry trees are decorated with 300 paper lanterns. 19. Osaka Castle (Osaka Prefecture) When completed in 1597, Osaka Castle (Osaka-jo), was the largest Japanese castle ever. Meant to serve as the seat of power for Toyotomi Hideyoshi, one of the great unifiers of Japan, the castle was destroyed by his opponents in 1615. It was later rebuilt but its keep burned to the ground following a lightning strike in 1665. The modern-day tower that stands on the grounds of Osaka Castle today is the result of reconstruction efforts carried out in the 1990s. Nowadays, it’s regarded more of a modern museum rather than a strictly historical Japanese castle. 18. Inuyama Castle (Aichi Prefecture) Dating back to 1537, Inuyama Castle (Inuyama-jo) is possibly the oldest Japanese castle ever, so it’s no surprise that its surviving keep has been designated a National Treasure. Special attention has been given to preserving the castle’s steep steps, which were once used to slow down enemy forces if they ever made it into the keep. Today, you can use them to get to an observation point, which gives you spectacular panoramic views of the surrounding area. 17. Iwakuni Castle (Yamaguchi Prefecture) Upon its completion in 1608, Iwakuni Castle (Iwakuni-jo) was one of the most unassailable fortifications in Japan due to its location atop Mount Shiroyama and being surrounded on two sides by the Nishiki River, which acted as a natural moat. Sadly, the castle was ultimately defeated by bureaucracy when the shogun decreed that there can only be one castle per province. Iwakuni didn’t make the cut and was dismantled. What stands in its place today is a reconstruction dating back to 1962, which nonetheless is considered one of the 100 Great Castles of Japan. 16. Kanazawa Castle (Ishikawa Prefecture) Kanazawa Castle (Kanazawa-jo) is a symbol of opulence and resilience. The Japanese castle was the headquarters of the Maeda clan, one of the most powerful families in Japanese history, for 14 generations. Originally dating back to the 1580s, the structure was heavily damaged by numerous fires but always managed to rise from the ashes thanks to reconstruction efforts. After WW2, Kanazawa Castle was the campus of Kanazawa University until the school’s headquarters moved to another location in 1994. The castle was designated a National Historic Site in 2008. 15. Iwamura Castle (Gifu Prefecture) Iwamura Castle (Iwamura-jo) is the highest fortification in Japan, being located atop a 717-meter-high peak. It’s also one of the country’s most historic strongholds, with the fort that would eventually become Iwamura Castle dating back to 1185. Today, though, only some sections of its wall and a turret remain. The ruins might not be as grand as the original castle, but the area is steeped in history connected to some of the famous samurai and Japanese warlords, including Takeda Shingen and Oda Nobunaga. 14. Uwajima Castle (Ehime Prefecture) A registered Important Cultural Property, Uwajima Castle (Uwajima-jo) originally dates back to 1596. Today, it boasts one of only 12 surviving castle keeps built during the Edo Period (1603 – 1868). It underwent massive renovations and expansion in the 17th, 19th, and 20th centuries, all of which thankfully retained its original charm, turning Uwajima Castle into a beautiful time capsule. The castle grounds are now a public park famous for its cherry trees. 13. Hikone Castle (Shiga Prefecture) Both a National Historic Site and a National Treasure, Hikone Castle (Hikone-jo) served as the seat of power for the Ii feudal lords from 1622 to 1868. One of the most remarkable things about this stronghold is just how much of the original complex survived to this day without having to be rebuilt from the ground up. This includes the keep, the inner moats, guardhouses, walls, and gates. Originally ordered to be decommissioned by Emperor Meiji, Hikone was spared after the monarch actually visited the Japanese castle and decided that it was too beautiful to be destroyed. 12. Zakimi Castle (Okinawa Prefecture) Dating back to the early 1400s, Zakimi Castle (Zakimi-jo) is an example of a gusuku, a style of Okinawan fortresses and strongholds known for their spectacular walls, which occasionally incorporated coral into their design. Today, Zakimi Castle lies in ruin, but its walls and foundations have been restored, and are now part of the UNESCO World Heritage Site of the Gusuku Sites and Related Properties of the Kingdom of Ryukyu. The adjacent Yuntanza Museum features exhibits on Okinawan art, culture, and history. 11. Imperial Palace East Gardens (Tokyo) The Imperial Palace East Gardens (Kokyo Higashi Gyoen) are the part of the official residence of the Emperor of Japan that’s opened to the public. Built on the former site of Edo Castle, the gardens contain many remnants of the former seat of power of the Tokugawa shogunate. None of the main buildings survived to the modern era, but the remaining gate entrances, walls, guardhouses, and moats are in amazing condition, giving you a glimpse into what once was the most important Japanese castle around. 10. Nakagusuku Castle (Okinawa Prefecture) A UNESCO World Heritage Site, Nakagusuku Castle (Nakagusuku-jo) is one of the few remaining remnants of gusuku castles built throughout Okinawa in the 15th century. Nowadays, only its walls are standing, but the complex is in such good condition that you can easily make out the castle’s layout like where its citadels used to be. The man-made stronghold blends harmoniously with the natural landscape, offering you a beautiful panoramic view of the surrounding area and the sea. 9. Kumamoto Castle (Kumamoto Prefecture) Considered one of the three greatest Japanese castles alongside Himeji Castle and Matsumoto Castle, Kumamoto Castle (Kumamoto-jo) is famous for its 800 cherry trees and many different buildings that make up the complex. A lot of them are reconstructions of the original 17th-century structures, but they are of unparalleled quality. Kumamoto Castle was heavily damaged by a 2016 earthquake, and its keep only became available to the public back in June 2021. Some estimates say that it will take another 15-20 years to complete all the necessary repairs. If you ever get the chance, check out the parts of Kumamoto Castle that have reopened. 8. Shuri Castle (Okinawa Prefecture) Appearing on everything from the UNESCO World Heritage Site list to postcards, guidebook covers, and even a Call of Duty game, Shuri Castle (Shuri-jo) is a global symbol of Okinawa and the Ryukyu culture. It was once the palace of the Ryukyu kings, but fell into decline after WW2 when it was almost destroyed. Tragically, the same thing happened again on October 31, 2019, when a fire burned most of the complex to the ground. Large sections of the castle complex were irreparably damaged but reconstruction work is currently underway to salvage as much of Shuri Castle as possible. In the meantime, parts of the castle grounds have reopened to the public. 7. Kochi Castle (Kochi Prefecture) As mentioned before, the castle keep of a typical Japanese castle was not where the lord of the castle and his family slept. Kochi Castle (Kochi-jo) is an exception to that rule. There, the tenshu was used for both military purposes and as a residence, which was one of the reasons why the stronghold was designated an important cultural property. Originally built in the early 17th century, the buildings you see today are actually reconstructions from around the mid-18th century after the original ones burned down. 6. Katsuren Castle (Okinawa Prefecture) As with so many other gusuku fortifications, Katsuren Castle (Katsuren-jo) lies in ruins today, but those ruins hide a fascinating and rich history. For example, Ancient Roman coins, which according to one theory might have reached Okinawa via the Silk Road, were unearthed at Katsuren in 2016. The Japanese castle also has a strong connection to the famous Lord Amawari. According to legend, Amawari was abandoned in the mountains as a child to die, but survived to become a powerful lord who later threatened to overthrow the Ryukyu king. Katsuren Castle was where he ruled from. 5. Nijo Castle (Kyoto Prefecture) One of the Historic Monuments of Ancient Kyoto (a UNESCO World Heritage Site), Nijo Castle (Nijo-jo) was constructed on the orders of Tokugawa Ieyasu, the founder of the Tokugawa shogunate that went on to rule Japan for over 250 years. After the shogunate fell, the last Tokugawa ruler returned power to the Japanese Emperor in this very castle, which later housed the Imperial Cabinet. Today, the stronghold boasts expansive gardens and one of the best-preserved Japanese castle palaces in all of Japan. A can’t-miss part of Nijo Castle is the Ninomaru-goten Palace. Consisting of six connected buildings, it’s the only surviving fortified palace complex in Japan and a designated National Treasure. 4. Matsue Castle (Shimane Prefecture) With its elevated position, mighty walls and moats, and the dark coloring that’s earned it the nickname of “The Black Castle,” Matsue Castle (Matsue-jo) is one impressive fortification. It never saw actual war so its keep and walls survive today in pristine condition. On the other hand, the Japanese castle has its beautiful side, as it offers visitors stunning views of Lake Shinji (a symbol of Matsue known for its spectacular sunset scenery) which is one of the reasons why it’s counted among Japan's Three Great Lake Castles. 3. Matsuyama Castle (Ehime Prefecture) Featuring three enclosures, a large garden, massive foundations, and hidden gates, Matsuyama Castle (Matsuyama-jo) is one of the most complex strongholds in Japan. It’s also a popular cherry blossom-viewing site since its grounds are home to 200 cherry trees. Being located atop Mount Katsuyama, the Japanese castle gives visitors spectacular panoramic views of the city of Matsue and the Seto Inland Sea, and can be reached easily via ropeway. 2. Matsumoto Castle (Nagano Prefecture) A designated National Treasure of Japan, Matsumoto Castle (Matsumoto-jo) contains many unique features, like being located on flat terrain instead of a hill, or having a secondary castle keep. Originally set for demolition during the 1800s, Matsumoto Castle was eventually saved thanks to campaigning by local residents. Thanks to continued restoration efforts, it’s now one of the top three Japanese castles, alongside Himeji Castle and Kumamoto Castle. It’s also a popular cherry blossom-viewing site. 1. Himeji Castle (Hyogo Prefecture) Frequently topping the lists of the most famous castles in Japan, Himeji Castle (Himeji-jo) is also known as the White Heron Castle because of how its dazzling white exterior brings to mind a bird mid-flight. In 1993, it was registered as one of the first UNESCO World Heritage Sites in Japan, with many of its sections being Special Historic Sites and National Treasures. The complex is composed of over 80 buildings, which together form one of the best-preserved Japanese castles around, attracting millions of visitors each year. History Captured in Wood and Stone If you want to get closer to Japanese history and stand where some of the country's greatest warriors and warlords once stood, your first stop should be one of Japan’s many majestic castles. We hope that this list of castles most popular with locals will help you decide which ones to visit first! If you want to give feedback on any of our articles, you have an idea that you'd really like to see come to life, or you just have a question on Japan, hit us up on our Facebook, Twitter, or Instagram! The information in this article is accurate at the time of publication.
<urn:uuid:a9707738-0e62-42aa-a7d7-559e0ebf0c1a>
CC-MAIN-2022-33
https://www.tsunagujapan.com/japanese-word-of-mouth-ranking-top-20-castles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00005.warc.gz
en
0.965824
3,340
2.890625
3
Barbados’s Long-drawn-out Promise of a Republic Barbados is expected to become a parliamentary republic in November 2021 and, immediately afterwards, embark on the process of drafting a new constitution. Despite the pitfalls of the government’s approach – especially its announcement of the transition and subsequent constitutional overhaul without public consultation – this process, if successful, may provide the impetus for renewed calls for the termination of the remaining constitutional monarchies in the English-Speaking Caribbean – writes Professor Cynthia Barrow-Giles. A Barbadian Head of State Barbados is expected to leave the British Monarchy and become a Republic in November 2021. Since Barbados’s independence, Barbados becoming a republic has taken centre stage in every major constitutional reform effort. While other issues, such as the nature of the electoral system, have been considered, a consistent thread throughout the three major constitutional reform exercises undertaken since 1966 is the appropriateness of the Queen as Head of State, represented by the Governor General of Barbados. In September 2020, the government of Barbados announced that by November 2021 (55 years after independence), the country would terminate its present constitutional status and become a republic. Barbados is not the first Commonwealth Caribbean country to consider this: the continued symbolic presence of the British crown in the constitutional makeup of Commonwealth Caribbean states has been repeatedly placed on reform agendas across the region. Though few states have actually made that change, various constitutional reform commissions – for example the St. Lucia Constitutional Reform Commission in 2011, and the St. Vincent and Grenadines Constitutional Review Commission in 2006 – have recommended the adoption of parliamentary republics. In the case of St. Vincent and the Grenadines, further developments were forestalled after the public rejected a proposed constitutional amendment. Barbadian Prime Minister Mia Mottley announced, in May 2021, the establishment of a Republican Status Transition Advisory Committee (RSTAC) with the mandate to plan and manage the transition of Barbados from a constitutional monarchy to a republic by 30 November 2021. In defending the government’s position on the development, the Prime Minister stated that, “The time has come to fully leave our colonial past behind. Barbadians want a Barbadian head of state” and that, “This is the ultimate statement of confidence in who we are and what we are capable of achieving. Hence, Barbados will take the next logical step toward full sovereignty and become a republic by the time we celebrate our 55th anniversary of independence.” Further, the Prime Minister announced that, immediately after the transition, Barbados would embark on the process of drafting a new constitution under the leadership of the Attorney General. While the Prime Minister’s party holds a sufficient legislative majority to approve a constitutional amendment, many had anticipated prior wide-spread public consultation. In her National Day of Significance (July 26) address, the Prime Minister explained that the government had accepted with minor changes the recommendations of the 1998 Constitutional Review Commission report that Barbados would become a parliamentary republic with a non-executive president elected by an electoral college and serving for a renewable four-year term of office. While the Prime Minister’s party, the Barbados Labour Party, holds a sufficient majority in both houses of the Barbadian parliament to approve a constitutional amendment, many had anticipated that the new parliamentary republic constitution would have followed wide-spread consultation with the public. There remains grave concerns that the declared process is untidy, as essentially two constitutions will be enacted in a relatively short period of time. There are important substantive and procedural issues to be resolved to ensure a smooth transition to a republic, but before turning to this issue and that of the envisaged constitutional reform, it is useful to briefly sketch the main contours of constitutional debate and developments in Barbados, especially on the termination of the constitutional monarchy. Earlier Post-Independence Efforts at Reform: A Failed Enterprise On 30 November 1966, Barbados achieved independence and adopted the Westminster parliamentary system of governance (along similar lines earlier adopted by both Jamaica and Trinidad and Tobago in 1962). In the post-independence period, the two dominant political parties – the Barbados Labour Party and the Democratic Labour Party – operated with the Governor General as the representative of the British monarch with prerogative powers. For half a century, the model endured with relative stability and few changes to the constitutional fabric of the state. Indeed, the most notable amendments were those of 1974, but these did not alter the existing parliamentary arrangements. Against the backdrop of increasing political and socio-economic radicalism, the black power movements in the English-Speaking Caribbean, and the transition of both Guyana and Trinidad and Tobago to republics, the Barbados Labour Party administration appointed in 1977 a Constitutional Review Commission (CRC) to consider changes to the Barbados Constitution. The Commission was specifically charged with recommending changes, if any, that would bolster the democratic character of the state by ensuring “multiparty parliamentary democracy is given such constitutional protection as can effectively prevent its destruction.” It was obvious then that the governing elite did not anticipate any deviation from the adopted Westminster model of government. In its 1979 report, the Constitutional Review Commission noted Barbadians’ opposition to “an increasingly remote, hereditary, non-Barbadian monarch”. In its 1979 report, the Commission noted that racism in the United Kingdom, the United Kingdom’s entry into the European Economic Community, Barbadians’ increasing affinity to Africa and their opposition to “an increasingly remote, hereditary, non-Barbadian monarch” informed the need to examine the appropriate constitutional form for the country. The report further weighed the overall support for the substitution of a national of high standing for the monarch with the perceived negative impact of removing a Head of State who stood “outside of and in fact beyond the reach of local political differences.” Equally important were regional considerations: the CRC noted that given the difficult times that some Caribbean countries were experiencing, there were legitimate concerns that to embark upon momentous constitutional change would invite potential instability in the body politic of the country. The Commission therefore concluded that the constitutional monarchy had worked well for Barbados and rejected the contention that the repatriation of the Barbados constitution, with a ceremonial president replacing the Governor General, would in fact fundamentally alter the existing political practices, in as much as “there is already our own man at the top”. The CRC further contended that, contrary to popular opinion, the political reality was that the Governor General operated under the instructions of the Prime Minister and the Cabinet of Ministers, rather than at the behest of the monarch. The 1998 CRC: A Call for a Parliamentary Republic It was not until 1996 that any further noteworthy effort was made to engage in constitutional restructuring, with the appointment of yet another Constitution Review Commission with an almost unaltered mandate to the previous Commission. Importantly, however, this CRC was required to address the question of the system of government and to make recommendations for a more “effective and efficient government” in order to position Barbados for the future. The 1998 CRC report diverged from the 1979 report: its flagship recommendation was that Barbados become a parliamentary republic with a non-executive president elected by an electoral college comprising the membership of the bicameral legislature. The Commission reasoned that Barbadians were not only confident that they could manage all aspects of their national affairs, but that the existing record of all native-born Governors General showed the kind of impartiality expected of the office. A Stalled Process: Waiting to Exhale Between 1998 and 2021, no further constitutional developments took place, although the Owen Arthur administration (1994-2008) drafted a – still not public – parliamentary republic constitution in 2004 (Republic of Barbados Constitution Act) to repeal and replace the 1966 constitution. At the time, the administration had promised a referendum on the issue of a Barbadian Head of State. It passed the Referendum Act 2005, which made provision for a referendum on the single question of whether Barbados should become a parliamentary republic with the Barbadian Head of State as President. This referendum, however, never took place. The RSTAC and the Parliamentary Republic: Stage 1 While all political parties and public opinion have supported the necessity of the change, the manner in which the September 2020 announcement was made, the appointment of the RSTAC in May of 2021, and the lack of consultation prior to the proposed date for the transition to a parliamentary republic have not been without controversy, with many alleging undemocratic tendencies. Opposition to the announcement is mounted on two fundamental grounds. The first relates to the demand for a referendum which was promised by former Prime Minister Owen Arthur. The basic premise is that constitution making ought not to occur without inclusiveness, representativeness, and participation. To be sure, the current approach is markedly different to previous exercises and to that conducted in other Caribbean jurisdictions. This government-appointed committee is not the typical bi-partisan broad-based constitutional commission or committee charged with consulting citizens at home and abroad on a new, reformed or parliamentary republic constitution. The second main contention is the democratic requirement for consultation on widescale constitutional reform prior to the transition to a republic. Indeed, the argument is that the process ought to be exhaustive, leading to an overhaul of the constitution and engaging in substantial reform pertaining to rights, the existing relationship between the executive and legislative branches of government, as well as the reform of the judiciary, among other governance related issues. Critics of the lack of consultation on the process leading to the 30 November 2021 declaration of a republic point to the 2019 judicial decision of the Caribbean Court of Justice (the final court of Appeal for both Barbados and Jamaica), in which Justice Peter Jamadar noted that “The requirement for broad-based participation in national decision making, can only be realized if all relevant stakeholders are meaningfully included in the dialogical process of consultation. No relevant stakeholder should be excluded from this process….” Critics further contend that the failure to engage in broad-based consultation on the type of republic, among other things, represents an attempt on the part of the administration to amass power (though no concrete evidence of such has been produced) and was done in a non-transparent manner inconsistent with more contemporary understandings of democracy. Though a failed referendum would not have implications for the constitutionality of the proposed change, it appears that the government prefers to avoid the risk of a “no”-vote. The current Constitution of Barbados has no referendum provisions, unlike several other Commonwealth Caribbean countries which have entrenched provisions that can only be altered by a special majority vote in a referendum. Though a failed referendum would not have implications for the constitutionality of the proposed change, nonetheless it appears that the government prefers to avoid the risk of a “no”-vote or low voter turnout (similar to the low turnout and voter rejection of two referendums in Grenada in 2016 and 2018, though on the question of replacing the British Privy Council with the Caribbean Court of Justice). The ten-member RSTAC, chaired by a former Governor of the Central Bank of Barbados, Marion Williams, has a fairly broad mandate, including making recommendations on the type of presidency and the constitutional requirements necessary to effect a transition, and to determine the ceremonial and legal implications of the presidential status. However, since July 2021, the RSTAC mandate appears to have morphed into merely advising on the required reform deemed necessary to achieve a parliamentary republic status, and the drafting of a Charter after consultation with citizens. Prime Minister Mia Mottley explained that “if we are going to have a new Constitution eventually that is going to reflect who we are in the third decade of the 21st century, rather than who we are in the middle of the 20th century, that that should be first and foremost guided by the kind of person that we want to be and the kind of people. Not legal language; not justiciable language, but a Charter, a set of pledges and promises as Bajans to each other, no more than two or three pages….” That Charter (the embodiment of the people of Barbados) will be the basis for further constitutional reform post-transition to a republic. In other words, the die has been cast and Barbados will become a republic on 30 November 2021 with the promise of a Charter (a pledge) bridging the gap between the transition parliamentary republic constitution and what is still an unknown but promised constitution in the near future: a reformed constitution that will redefine the role of the government, and improve the governance arrangements of the country. The RSTAC and the Parliamentary Republic: Stage 2 In an unusual approach to constitutional reform, the government’s approach is to engage in a two-step process: first establishment of a republic, and a comprehensive constitutional reform. The second, more exhaustive phase – that is estimated will take between twelve to fifteen months from November 30 – will emulate the various activities of previous CRCs elsewhere in the Commonwealth Caribbean. In her July 26 address, the Prime Minister announced “from December 1 the journey of the settlement of the new Constitution of Barbados, which will be the subject of extensive consultation and communication with the people of this nation.” This is a source of some concern as there are no guarantees other than the administration’s promise that meaningful and wide-ranging changes will be made based on the recommendations of the RSTAC after consultation with the various publics. While constitution making in the Caribbean over the last two decades has tended to be more consultative in its approach, the RSTAC process is an example of a new exercise in constitution remaking: more efficient and more determined than before. No previous constitutional exercise since the 1970s has resulted in the establishment of a republic in the Commonwealth Caribbean. Despite the pitfalls of the approach, if successful it may well provide the impetus for renewed calls for the termination of the remaining constitutional monarchies in the English-Speaking Caribbean. To be sure it is envisaged that the post-transition period to the parliamentary republic on 30 November 2021 will be marked by a greater level of consultation as envisaged by the CCJ in its 2019 judgment and which will no doubt go a substantial way to alleviating the concerns of the general public on the lack of democratic consultation in the process leading to November 30, 2021. That the seemingly patchy and swift process leading to November 2021 did not instil the much-needed confidence in constitution making that would have been ideal is evident, notwithstanding the general support for the termination of the role of the Queen in the political arrangement of the country. It is hoped that the promise of more sustained and systematic public engagement beginning January 2022 will forestall the disenchantment and opposition unleashed by the chosen approach to constitution making. Professor Cynthia Barrow-Giles is a senior lecturer in Political Science at the Cave Hill campus of the University of the West Indies where she has also served as Deputy Dean of the Faculty of Social Sciences and Head of Department of Government, Sociology and Social Work.
<urn:uuid:689da042-8e6c-4145-9004-73ae063dba37>
CC-MAIN-2022-33
https://constitutionnet.org/news/barbadoss-long-drawn-out-promise-republic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00604.warc.gz
en
0.956188
3,100
2.515625
3
Using Deepfakes In The Treatment of PTSD and Chronic Grief Using Deepfakes to treat patients suffering from PTSD and grief will take exposure therapy to the next level Over the past few decades, the incidence and prevalence of mental disorders have skyrocketed, which is attributed by some experts to the stressful lifestyle of modern society. (1) According to the Canadian Mental Health Association (CMHA), one in five Canadian will go through a mental health issue in any given year. (2) The CMHA also reports that by the age of 40, approximately 50% of the population would have dealt with some form of mental illness. (2) By far, conditions such as major depressive disorder (MDD) and generalized anxiety disorder (GAD) are the most prevalent; however, other mental illnesses are also a major source of concern, including post-traumatic stress disorder (PTSD), bipolar disorder, and to a lesser extent, pathological grief. (3) When it comes to PTSD, veterans are especially vulnerable to this condition due to the major exposure to traumatic events. According to reports, 23,792 Canadian veterans were diagnosed with PTSD in 2019 alone. (4) However, PTSD is not an exclusive ailment to soldiers, as being part of any traumatic incidence can trigger this disorder, including car accidents, history of abuse, work-related injuries, and more. (5) Despite the relative advances made in the field of mental healthcare, researchers are still looking for innovative approaches to manage patients and avoid the use of pharmacological drugs due to their heavy side effect profile. (6) In this article, we will discuss the potential use of a cutting-edge technology known as Deepfakes in the treatment of PTSD and grief. What are Deepfakes? Deepfake technology focuses on manipulating existing videos or images to produce synthetic media content. (7) The idea behind this technique is to utilize machine learning and artificial intelligence to synthetically create and edit a video of a real person talking or performing a certain act, which is astonishingly advanced relative to conventional editing technology (e.g., Photoshop, video-editing software). (8) Unfortunately, Deepfakes have gained a bad reputation due to its illicit use in wrongful acts by rogue individuals. (9) In reality, the technology of Deepfakes is quite impressive and can be used in the field of psychotherapy to help patients with mental disease, which we will discuss in the next sections. Post - Traumatic Stress Disorder (PTSD) and Grief Post-traumatic stress disorder, or PTSD, is included in a new category called ‘Trauma- and Stressor-Related Disorders’ in the Diagnostic and Statistical Manual of Mental Disorder V (DSM-V). (10) As the name implies, PTSD gets triggered after going through a traumatic event that significantly ranges in severity. Experts have been able to pinpoint some common risk factors for PTSD (11), which include: • Stressful careers (e.g., police officers, medical professionals) • Childhood abuse • Sexual assault (e.g., harassment, rape) • Domestic abuse • Violent assault • Substance abuse • Disasters (e.g., earthquakes, tsunamis, flooding, hurricanes) • Medical history of other mental illnesses (e.g., MDD, GAD) • Family history of PTSD The management of PTSD focuses on pharmacological drugs (e.g., anxiolytics, mood stabilizers, antipsychotic medications) and psychotherapy (e.g., cognitive behavioral therapy, exposure therapy). (12) Unfortunately, many patients relapse after a while, which is why PTSD is considered problematic in the field of psychiatry. (13) Oftentimes, grief is conveyed as a natural process that most humans go through during a certain phase of their lives when they lose a loved one. While this statement is true, not all people experience grief the same. According to DSM-V, persistent complex bereavement disorder (i.e., prolonged grief disorder) is defined as the yearning/longing for the loved one and getting preoccupied with the deceased and its circumstances for at least 12 months. (14) Unlike normal grief, these patients are in a constant state of emotional suffering that may precipitate suicidal ideations and death. In one study published by JAMA (15), researchers evaluated the complexity and available treatment options for persistent complex bereavement disorder and concluded that “Individuals with complicated grief have greater risk of adverse health outcomes, should be diagnosed and assessed for suicide risk and comorbid conditions such as depression and posttraumatic stress disorder, and should be considered for treatment.” In other words, this condition could lead to debilitating complications if not treated promptly. How Will Deepfake Technology Help? In psychiatry, patients with PTSD and persistent complex bereavement disorder are treated with a combination of pharmacotherapy and psychotherapy. (16) Oftentimes, this entails exposure therapy, where the patient goes back to the site of the accident or imagines him/herself in the presence of the abuser to gain back control over the situation. Combining pharmacotherapy and psychotherapy is now the gold standard approach. Using Deepfakes to treat these conditions will take exposure therapy to the next level by creating synthetic media content that’s generated using a computer and controlled by an operator to allow patients to have therapeutic conversations with their abuser, a friend who died in a car crash while they were driving, a deceased loved one where the last conversation ended on bad terms, and more. The use of this technology in the field of psychotherapy has never been tested, but we believe that implementing Deepfakes in advanced exposure therapy could be The Next Breakthrough in Psychotherapy. This innovative technique has no side effects and helps create virtual situations in a controlled, safe environment. Similar techniques have been used before to treat anxiety and PTSD, including virtual reality exposure therapy (VRET). (17) In one meta-analysis, researchers analyzed the results of 10 studies to review the efficacy of VRET in the treatment of PTSD. (18) They concluded that “VRET proved to be as efficacious as exposure therapy. VRET can be particularly useful in the treatment of PTSD that is resistant to traditional exposure because it allows for greater engagement by the patient and, consequently, greater activation of the traumatic memory, which is necessary for the extinction of the conditioned fear.” The last sentence of this conclusion is crucial to understand the potential of Deepfake therapy, as it significantly increases the engagement of the patient with the traumatic event to help alleviate the associated memory. Deepfakes have a massive potential in the field of psychotherapy to assist patients with mental illnesses and accelerate recovery. Hopefully, this article managed to shed some light on the uses of Deepfakes in mental health, but if you want to learn more or if you have any questions and/or concerns, please do not hesitate to reach out to us and learn how Delsec Human Security can help you and your community. 5- Bryant, R. A. (2019). Post‐traumatic stress disorder: a state‐of‐the‐art review of evidence and challenges. World psychiatry, 18(3), 259-269. 6- Harvey, A. G., & Gumport, N. B. (2015). Evidence-based psychological treatments for mental disorders: Modifiable barriers to access and possible solutions. Behaviour research and therapy, 68, 1-12. 8- Kietzmann, J., Lee, L. W., McCarthy, I. P., & Kietzmann, T. C. (2020). Deepfakes: Trick or treat?. Business Horizons, 63(2), 135-146.9- https://theoutline.com/post/3179/deepfake-videos-are-freaking-experts-out 10- Santiago, P. N., Ursano, R. J., Gray, C. L., Pynoos, R. S., Spiegel, D., Lewis-Fernandez, R., ... & Fullerton, C. S. (2013). A systematic review of PTSD prevalence and trajectories in DSM-5 defined trauma exposed populations: intentional and non-intentional traumatic events. PloS one, 8(4), e59236. 11- Tang, B., Deng, Q., Glik, D., Dong, J., & Zhang, L. (2017). A meta-analysis of risk factors for post-traumatic stress disorder (PTSD) in adults and children after earthquakes. International journal of environmental research and public health, 14(12), 1537. 12-Watkins, L. E., Sprang, K. R., & Rothbaum, B. O. (2018). Treating PTSD: A review of evidence-based psychotherapy interventions. Frontiers in Behavioral Neuroscience, 12, 258. 13-Martenyi, F., Brown, E. B., Zhang, H., Koke, S. C., & Prakash, A. (2002). Fluoxetine v. placebo in prevention of relapse in post-traumatic stress disorder. The British Journal of Psychiatry, 181(4), 315-320. 14-Boelen, P. A., Spuij, M., & Lenferink, L. I. (2019). Comparison of DSM-5 criteria for persistent complex bereavement disorder and ICD-11 criteria for prolonged grief disorder in help-seeking bereaved children. Journal of affective disorders, 250, 71-78. 15-Simon, N. M. (2013). Treating complicated grief. Jama, 310(4), 416-423. 16-Huhn, M., Tardy, M., Spineli, L. M., Kissling, W., Förstl, H., Pitschel-Walz, G., ... & Leucht, S. (2014). Efficacy of pharmacotherapy and psychotherapy for adult psychiatric disorders: a systematic overview of meta-analyses. JAMA psychiatry, 71(6), 706-715. 17-Watkins, L. E., Sprang, K. R., & Rothbaum, B. O. (2018). Treating PTSD: A review of evidence-based psychotherapy interventions. Frontiers in Behavioral Neuroscience, 12, 258. 18-Gonçalves, R., Pedrozo, A. L., Coutinho, E. S. F., Figueira, I., & Ventura, P. (2012). Efficacy of virtual reality exposure therapy in the treatment of PTSD: a systematic review. PloS one, 7(12), e48469. Let's Work Together We are currently seeking therapists who are interested in beta testing of this application. Contact us for more information.
<urn:uuid:79741e6f-3fcc-4d1b-a63a-cbf7746a8d33>
CC-MAIN-2022-33
https://www.delsec.ca/deepfake-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00205.warc.gz
en
0.891162
2,424
2.53125
3
Newly Diagnosed Patients Robert Bennett, MD Fibromyalgia (fi-bro-my-AL-ja) is a very common condition of widespread muscular pain and fatigue. Seven to ten million Americans suffer from fibromyalgia (FM). It affects women much more than men in an approximate ratio of 20:1. It is seen in all age groups from young children through old age, although in most patients the problem begins in their 20s or 30s. Recent studies have shown that fibromyalgia occurs worldwide and has no specific ethnic predisposition. The Symptoms of Fibromyalgia Fibromyalgia patients have widespread body pain which often seems to arise in the muscles. Some FM patients feel their pain originates in their joints. Pain that emanates from the joints is called arthritis; extensive studies have shown FM patients do not have arthritis. Although many fibromyalgia patients are aware of pain when they are resting, it is most noticeable when they use their muscles, particularly during repetitive activities. Their discomfort can be so severe it may significantly limit their ability to lead a full life. Patients can find themselves unable to work in their chosen professions and may have difficulty performing everyday tasks. As a consequence of muscle pain, many FM patients severely limit their activities including exercise routines. This results in their becoming physically unfit, which eventually makes their fibromyalgia symptoms worse. In addition to widespread pain, other common symptoms include a decreased sense of energy, disturbances of sleep, and varying degrees of anxiety and depression related to patients’ changed physical status. Furthermore, certain other medical conditions are commonly associated with fibromyalgia, such as: tension headaches, migraine, irritable bowel syndrome, irritable bladder syndrome, premenstrual tension syndrome, cold intolerance, and restless leg syndrome. Patients with estalished rheumatoid arthritis, lupus (SLE), and Sjogren’s syndrome often develop FM during the course of their disease. The combination of pain and multiple other symptoms often leads doctors to pursue an extensive course of investigations, which are nearly always normal. There are no blood tests or X-rays that show abnormalities diagnostic of FM. This initially led many doctors to believe that the problems suffered by FM patients were “all in their heads,” or that fibromyalgia patients had a form of masked depression or hypochondriasis. Extensive psychological tests have shown these impressions were unfounded. A physician’s diagnosis of FM is based on taking a careful history and the finding of tender areas in specific areas of muscle. These locations are called “tender points.” They are tender to palpation and often feel somewhat hardened if the muscle is stroked. The Long-Term Outcome for Fibromyalgia The musculoskeletal pain and fatigue experienced by fibromyalgia patients are chronic problems that tend to have a waxing and waning intensity. There is currently no generally accepted cure for this condition. According to recent research, most patients can expect to have this problem lifelong. However, worthwhile improvement may be obtained with appropriate treatment. There is often concern on the part of patients, and sometimes physicians, that FM is the early phase of some more severe disease, such as multiple sclerosis, lupus , etc. Long-term follow-up of fibromyalgia patients has shown that it is very unusual for them to develop another rheumatic disease or neurological condition. However, it is quite common for patients with “well-established” rheumatic diseases, such as rheumatoid arthritis, systemic lupus, and Sjogren’s syndrome, to have fibromyalgia also. It is important for these patients’ doctors to realize they have such a combination of problems, as specific therapy for rheumatoid arthritis and lupus, etc. does not have any effect on FM symptoms. Patients with fibromyalgia do not become crippled with the condition, nor is there any evidence it affects their lifespan. Nevertheless, due to varying levels of pain and fatigue, there is an inevitable contraction of social, vocational, and avocational activities that leads to a reduced quality of life. As with many chronic diseases, the extent to which patients succumb to the various effects of pain and fatigue are dependent upon numerous factors, in particular their psycho-social support, financial status, childhood experiences, sense of humor, and determination to push on. The Treatment of Fibromyalgia The treatment of FM is frustrating for both patients and their physicians. In general, drugs used to treat musculoskeletal pain, such as aspirin, non-steroidals (e.g. ibuprofen), and cortisone, are not particularly helpful in this situation. As in any chronic pain condition, education is an essential component that helps patients understand what can or can’t be done as well as teaching them to help themselves. It is important for a patient’s physician to discover whether there is a cause for sleep disturbances. Such sleep problems include sleep apnea, restless legs syndrome, and teeth grinding. If the cause for a patient’s sleep disturbance cannot be determined, low doses of an anti-depressive group of drugs, called tricyclic anti-depressants or short acting sleeping medications may be beneficial. Patients need to understand these medications are not addictive when used in low dosages (eg., amitriptyline 10 mg at night) and have very few side effects. In general, routine use of sleeping pills such as Halcion, Restoril, Valium, etc., should be avoided as they impair the quality of deep sleep. There is increasing evidence that a regular exercise routine is essential for all fibromyalgia patients. The increased pain and fatigue caused by repetitive exertion makes regular exercise quite difficult. However, those patients who do develop an exercise regimen experience worthwhile improvement and are reluctant to give up. In general, FM patients must avoid impact loading exertion such as jogging, basketball, aerobics, etc. Regular walking, the use of a stationary bicycle, and pool therapy utilizing an Aqua Jogger (a floatation device that allows the user to walk or run in the swimming pool while remaining upright) seem to be the most suitable activities for FM patients. Supervision by a physical therapist or exercise physiologist is of benefit wherever possible. In general, 20 minutes of physical activity three times a week at 70% of maximum heart rate (220 minus your age) is sufficient to maintain a reasonable level of aerobic fitness. Drugs such as aspirin and Advil are not particularly effective and seldom do more than take the edge off FM pain. Opioid analgesics (propoxyphene, codeine, morphine, oxycodone, methadone) may provide a worthwhile pain relief in a subgroup of severely afflicted patients, but fibromyalgia patients seem especially sensitive to opioid side effects (nausea, constipation, itching, and mental blurring) and often decide against the long-term use of these drugs. The use of opioid analgesics (narcotics) in the management of non-malignant pain has been a controversial issue for many doctors, with the usual reasons for concern: addiction, oversight by state medical boards, and criminal diversion of drugs. However, recent research has shown that addiction seldom occurs when these medications are use in chronic pain states. It is important to understand the difference between addiction and dependence (which occurs with all these drugs in the majority of patients (see Addiction/Dependence). Two particularly useful weak opioids in the management of FM pain are tramadol (Ultram) and the combination of tramadol with acetaminophen (Ultracet). Neither of these two medications is a FDA scheduled drug (i.e. they have minimal addiction potential). Particularly painful areas often may be helped for a short time (2-3 months) by trigger point injections. This involves injecting a trigger point with a local anesthetic (usually 1% Procaine) and then stretching the involved muscle with a technique called spray and stretch. It should be noted the injection of a tender point is quite painful (indeed, if it is not painful the injection is seldom successful). After the injection, there is typically a lag of two to four days before any beneficial effects are noted. Other techniques that directly help the tender areas on a transient basis are heat, massage, gentle stretching, and acupuncture. About 20 percent of FM patients have a co-existing depression or anxiety state that needs to be appropriately treated with therapeutic doses of anti-depressants or anti-anxiety drugs often in conjunction with the help of a clinical psychologist or psychiatrist. Basically, patients who have a concomitant psychiatric problem have a double burden to bear. They will find it easier to cope with their FM if the psychiatric condition is appropriately treated. It is important to understand that fibromyalgia itself is not a psychogenic pain problem, and that treatment of any underlying psychological problems does not cure FM. Most FM patients quickly learn there are certain things they do on a daily basis that seem to make their pain problem worse. These actions usually involve the repetitive use of muscles or prolonged tensing of a muscle, such as the muscles of the upper back while looking at a computer screen. Careful detective work is required by the patient to note these associations and, where possible, to modify or eliminate them. Pacing of activities is important; we have recommended that patients use a stopwatch that beeps every 20 minutes. Whatever they are doing at that time should be stopped and a minute should be taken to do something else. For instance, if they are sitting down, they should get up and walk around–or vice versa. Patients who are involved in fairly vigorous manual occupations often need to have their work environment modified and may need to be retrained in a completely different job. Certain people are so severely affected that consideration must be given to some form of monetary disability assistance. This decision requires careful consideration, as disability usually causes adverse financial consequences as well as a loss of self esteem. In general, doctors are reluctant to declare fibromyalgia patients disabled and most FM applicants are initially turned down by the Social Security Administration at the first review. However, each patient needs to be evaluated on an individual basis before any recommendations for or against disability are made.
<urn:uuid:cdf63f20-85f3-4d77-8589-3eb9e18899e0>
CC-MAIN-2022-33
https://www.fmaware.org/new-diagnosed-patients/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00004.warc.gz
en
0.954635
2,121
2.5625
3
Garden History: What did the Medieval Gardens Look Like? Medieval gardens were orderly spaces where beauty coexisted with utility. Gardeners of the Middle Ages developed essential skills and learned to grow edible, medicinal and decorative plants that are still indispensable to us today. In this post I explain who the medieval gardeners were, what was in a medieval garden, and what the gardens of this period looked like. Monastic gardens: medieval garden layout Monasteries were not only the centres of literacy in the Middle Ages, but also of medical, agricultural and culinary knowledge. To practice all these skills monks needed gardens, and so monasteries became the hubs of botanical learning and gardening know-how. Being literate, monks also knew more about the ancient Greek and Roman culture than other classes of society. As a result they seem to have preserved some principles of the classical gardening style, first of all symmetry. The medieval garden layout was strictly geometrical. Paths and alleys crossed at right angles, and flower and vegetable beds were laid between them in measured, symmetrical patterns. Symmetry was not only an expression of beauty, but also of order, discipline, tranquillity and seclusion. Monasteries were places of prayer and meditation, and so harmony and calm were essential psychological states that the gardeners aspired to capture. Monastic gardeners also favoured practical utilitarian approach. They creations had to serve human needs as well as divine. The gardens of the Benedictine monastery of Monte Cassino in Italy, established in 529, were planted with medicinal and edible herbs, as well as simple fruit trees and grape vines. The monks also grew roses, lilies and different vegetables since the skill of cultivating these plants survived from the time of the Roman empire. The art of gardening that developed in Italian monasteries soon crossed the Alps. The monasteries in France and Germany, such as St Gallen, Clairvaux and Wezelay, also became famous for their gardens. In 820 the garden of St Gallen, in line with the principles of balance and utility, was subdivided into 16 symmetrically positioned beds where lilies and roses flourished next to the medicinal and culinary herbs, such as sage and dill. Read more about the layout and plants of medieval gardens: Medieval Garden Plants and Layout: How to Design a Medieval Garden? Royal medieval gardens: Charlemagne Since Christianity had such a dominant role in the life of the medieval society, monasteries had close connections with the royal courts. Monastic gardens influenced royal medieval gardens. A particularly prominent figure in the development of medieval gardening was Charlemagne (768-814). This energetic king established his own gardens in Ingolsheim and Aachen, and supported monastic and private gardens in his lands. Due to his friendly relations with Caliph Harun al-Rashid (modern Iran, 766-809), he introduced many new vegetables and fruit to Germany and France. These included different varieties of beans, melons, figs, peaches, and many other agricultural plants still grown today. Early medieval Germanic law codes, such as the early 7th-century Lex Alamannorum, do not mention gardens or plants. A somewhat later Bavarian law code of 741-748 (Lex Baiuvariorum) already has a section on orchards, forests and bees that names different varieties of apples and pears. But Charlemagne gives a full list of what was growing in his gardens in section 70 of his Capitulare de villis, a document that guided the governance of the royal estates. The list includes: - medicinal plants, such as mallow, rue, elecampane, marshmallow, sage, mint, oregano, thyme and coriander - decorative plants, such as white lily, rose and, interestingly, rosemary - vegetables, such as beans, peas, cabbage, turnip, beetroot, onion, shallot, leek, garlic, celery and parsley - orchard trees, including different varieties of pears, apples, plums, peaches, quinces, hazelnuts, Cornelian cherry and mulberry. This botanical section of Capitulare de villis was based on book 10 of De re rustica (‘About rural matters’), an influential work of a Spanish gardening expert Columella who lived in the 1st century AD. Columella was apparently the first to advise to cover cucumbers and melons with frames during the cold seasons of the year. Gardening style that developed under Charlemagne was not purely, but mostly utilitarian. The gardens considered to be the best were the ones that contained the largest number of useful, particularly rare and medicinal plants. *Read more about elecampane: Elecampane (Inula helenium): Ancient ‘Sunflower’ of Europe Medieval gardening manuals The first literary work of German gardening was De Universo (‘On the universe’) of the famous monk and abbot Hrabanus Maurus (about 780-856). In this encyclopedia he describes the qualities, use, and symbolic and spiritual meaning of around 100 plants. These are the plants that are either mentioned in the Bible or were commonly grown in the gardens of his time. Hrabanus’s student Walafridus Strabus (807-849) wrote a poem Hortulus (‘Small garden’) where he described 23 plants that he grew in the garden of Constanz monastery. The next important work on gardening was by Hildegard (1099-1179), abbess of Bingen. She described several plants that were unknown or rare under Charlemagne, including Citrus medica – lemon. Lemon was rare in ancient Roman gardens, but became popular in the Byzantium. Among plants described by Hildegard are marshmallow, primrose, peony, pulmonaria, calendula, catmint, cyclamen, watercress, radish, cabbage, blackthorn, blackberry, blueberry and many other. Albertus Magnus – medieval gardening expert and magician Probably the most prominent figure of learned medieval gardening was a German Dominican friar Albertus Magnus (1193-1280). He had a reputation as a philosopher, scholar and a magician. In 1260 he was made the bishop of Regensburg, but returned to his monastery in Cologne to pursue science. There he wrote a book on gardening De vegetabilibus (‘About plants’) in which he describes 170 plants. These include aquilegia, catmint, 5 varieties of rose, rice, box, fig tree, olive, almond, peach, quince, sweet chestnut, apple, cherry, grape, black, green, red and yellow plums and many other. Albertus explains how to grow the plants, including what he believes to be the influence of planets on their development. Albertus seems to have established hot houses in his garden. This is suggested by a story of how he entertained king William II of Holland. The king visited Albertus on 6 December 1249. Albertus invited him to dinner in his garden where everything was green and blossomed, as if it were the middle of the summer, rather than deep winter. Clearly the dinner was served in a winter garden. In his book Albertus writes about grafted plants. Some things he says are rather curious by modern standards. He explains, for example, that a rose grafted on a cabbage will produce green flowers without scent. He also complains that he did not have an opportunity to find out whether roses will flower in winter in cool conditions if watered with human blood (!). Utilitarian and pleasure gardens In 1305 Petrus de Crescenziis, a Bolognese jurist, wrote a book Opus ruralium commodorum (‘Book of rural benefits’). It was printed in 1471 in Augsburg. It was very popular in the 15th century as a practical treatise on the planning and cultivating a country estate. Petrus was the first to classify the gardens into utilitarian and those for pleasure. In part 8 of this 12-part book he subdivides the pleasure gardens into three types, according to the owners’ wealth. All three types should be decorated with lawns, scented flowers and small trees. Royal pleasure gardens should have in addition to this enclosures for birds and animals. The Rose of Hildesheim Gardening became less utilitarian and developed a stronger decorative trend in the second half of the 11th century. The leaders here were again monastic gardens, including Clairvaux, Wezelay and St. Gallen. They were highly praised by prominent figures of the time for their beauty, as well as usefulness. One decorative feature from this period still survives. A dog rose (Rosa canina), widely known as a Thousand-year Rose, grows around on the apse of the Hildesheim Cathedral. It is documented to be at least 700 years old and is probably much older. According to a legend it was planted in 815 by the cathedral’s founder Emperor Louis the Pious, the son of Charlemagne. The cathedral was completely destroyed during the Second World War and rebuilt in 1950s. The roots of the rose survived the bombing and it regrew. Today it grows perfectly well and reaches a height of around 10 m. Medieval castle gardens Feudal medieval gardens were smaller than royal and monastic gardens. They were planted in enclosed spaces – it would have been too dangerous to have them outside the castle walls because armed conflicts were common. In the early Middle Ages even woods were not tolerated next to castles and fortresses for fear of an ambush. Nevertheless, gardens were planted in castles whenever possible. They contained both flowers and vegetables and were laid out symmetrically. A famous French medieval poem Roman de la Rose describes a green garden (‘jardin tout vert’), surrounded by a strong and tall wall. It has a square shape (‘it was long as it was wide’) and is planted geometrically. The garden is filled with fruit trees, positioned symmetrically, at equal distances from one another, and there are neatly trimmed green hedges. The garden also has flowers in different colours, including particularly beautiful red roses, and a fountain. French royal medieval gardens The gardens of the French king Charles V (1338-1380) were in Saint-Paul area, part of the modern Marais district in Paris. There the king planted a large cherry plantation – he bought 100 cherry trees for 5 sous. The garden also had roses and lilies, and 8 laurel trees. This garden was redeveloped at the time of the Hundred Years’ War between England and France. In spring 1431, during the trial of Joan of Ark, it belonged to Duke of Bedford, English prince and general. He commanded England’s armies in France and put Joan on trial by pro-English clergy. Bedford ordered to dig a trench about 2000 metres long next to the Château de la Tournelle, a now-demolished castle that was on the left bank of the Seine at the centre of Saint-Paul area. He planted the trench with 5913 elms and filled with fruit trees the garden inside. To them he added, as decoration, 31 holly trees and several blackthorns. Five years later the garden passed back to the French king Charles VII, as the English suffered defeats and were gradually expelled from France. English medieval gardens Scottish king James I (1394-1437) spent several years as a prisoner of the English king Henry V (1413-1422). He described the royal garden at Windsor Castle in one of his poems. He wrote that the garden was surrounded with a stone wall with turrets and planted with trees, flowers and herbs. It had lawns and was transacted by long narrow paths flanked with hawthorn hedges. Poet and historian John Leland (1503-1552) wrote in his ‘Itinerary’, notebooks on his travels in England, about several large gardens. He gives particular attention to Wressle Castle in Yorkshire. He explains that it had a flower garden inside the castle walls and a fruit garden outside. The fruit garden has mounds with steps going up them in a spiral. In the later Middle Ages, as the middle class was becoming more influential and powerful, it became common for wealthy merchants in Augsburg, Regensburg, Nurnberg and other large towns in Germany to have their own gardens. The gardens were planted with white and red roses, lilies, violets, crocuses, pinks and carnations, as well as medicinal herbs and vegetables. The layout of such private gardens was very simple. They were transacted with several straight paths leading to small gazebos. Between the paths were symmetrically positioned beds planted with flowers, small trees and vegetables. Exotics, found in particularly wealthy gardens, were lemon and laurel trees, and rosemary. In spite of their simplicity the gardens were highly valued. There were cruel punishments to those who damaged them. According to Landfriedensgesetz of 1187, anyone who damaged a grafted fruit tree was subjected to mutilation. Later laws introduced perpetual exile in addition to mutilations. At the end of the 15th century gardens experienced a radical change. It followed the discovery of America (1492) and of the route to Ost-India. Merchants, who became wealthy as a result of trade that these discoveries made possible, established luxurious gardens. These gardens were stocked with exotic plants, such as American aloe and Syrian hibiscus. German gardeners particularly excelled in the 16th century, developing many new varieties of fruit trees. By the middle of the century they knew 50 varieties of pear. Gardening became so prestigious that in 1415 it was declared one of the ‘liberal arts’ in Augsburg. In the 17th and the beginning of the 18th century gardeners in Germany had the right to wear a sword. Medieval beliefs about plants In spite of the achievements of the scientific study of plants, popular beliefs about them flourished in the Middle Ages. Plants were commonly used as amulets. People believed that St John’s wort protected against thunder and ghosts, reseda attracted a lover, whereas daisy cured love sickness. But the most important role in magic was given to mandragora – Mediterranean plant Mandragora officinarum. It was used for all kinds of sorcery. Around 1500 monks in Germany cut male or female figures from it and sold for a princely sum of 30 gold guldens. Image credits: featured image – cloister garden next to the Dom church in Utrecht by Bart van Leeuwen; Abbey Saint Germain des Prés in 1687 – WikiCommons; medieval garden, Cahors Cathedral, Lot, France by Phillip Capper; medieval garden at Ermenouville, Seine Maritime, France by isamiga76; the Rose of Hildesheim by Ashley Van Haeften; mandragora officinarum by Candiru.
<urn:uuid:8703a2f2-5fa4-4193-a0b4-9ab33b872d69>
CC-MAIN-2022-33
https://starofnature.org/garden-history-what-did-medieval-gardens-look-like/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00206.warc.gz
en
0.968127
3,194
3.46875
3
Note: This essay is the final part of The Dharma Dispatch series documenting the methodical and systematic manner in which the British not only destroyed Indian food production but converted the country into a nation of beggars. This series has been excerpted from the meticulously researched book, “Annam Bahukurvita” authored by Dr. J K Bajaj and Dr. M D Srinivas with permission. Some formatting changes have been made. Read the previous essays in this series - Part 1: How the British Systematically Destroyed Indian Food Production - Part 2: How the British Broke Our Charitable Institutions and Created a Nation of Beggars Scarcity takes the place of plenty The Indian discipline of sharing was thus subjected, by the alien rulers and their Indian followers, to a concerted stream of ridicule, contempt and control that began with the coming of the British and did not abate till their departure. In time, the discipline began to weaken, and the will to flounder. But, it is not only the will to share food with others that came under stress during the British period, the capacity to share itself dwindled rapidly. Decline in productivity of lands The abundance of food began to turn into a state of acute scarcity within decades of the onset of British rule. As the British began to dismantle the elaborate arrangements of the Indian society and began to extract unprecedented amounts of revenue from the produce of lands; vast areas began to fall out of cultivation and the productivity of lands began to decline precipitously. In the Chengalpattu region where the lands had yielded at least 2.5 tons of paddy per hectare on the average in the 1760’s, and where average yields according to the British administrative records had remained around that figure up to 1788 in spite of the devastating wars of the period, productivity had declined to a mere 630 kg per hectare by 1798. Lionel Place, the British collector of the district at that time, was in fact greatly worried about the decline in productivity and the consequent difficulty of raising sufficiently large revenues from the land. He believed that part of the reason for the loss of productivity was to be found in the decrease in the availability of manure, resulting from a sharp decline in the number of sheep, which were being consumed in such large numbers by the Europeans as to “threaten an extermination of the breed”. He also felt that the proximity of the region to the fast expanding city of Madras was depriving the land of straw and dung. But perhaps the most important factor was that under the British dispensation, agriculture had become so un-remunerative that cultivators were loath to cultivate their lands; and Lionel Place often had to use force in order to make them take to the plough. Thus Indian agriculture seems to have suffered a decline throughout the long period extending from late eighteenth century up to the time of independence in 1947. Scarcity and callousness have become the norm The figures for availability of food in India clearly point towards widespread hunger of people and animals in India. And every available statistical indicator confirms the prevalence of hunger. Thus, according to generally accepted statistics, 40 percent of the Indian people do not have access to the bare minimum number of calories required for survival, 63 percent of children under the age of five are malnourished and 88 percent of pregnant women suffer from anemia. But one does not need to look at figures to see the hunger that prevails. In every city and town of India one can see cows and dogs roaming the streets searching for bits of food amongst heaps of dirt. And, in the larger cities, one can see an occasional child or even an adult competing with the cows and dogs for a share of the edible waste. But nowadays there is hardly anything edible in the waste from Indian households; and the cows are often content with filling their bellies with mere paper and plastic, the dogs howl through the night in hunger, and the human children and adults stand and lie on the streets crazed by sheer starvation. A journey through any part of India in the great railway trains, that crisscross the country heralding the arrival of modernity here, brings one in even closer contact with hunger and starvation. Young children, with their eyes glimmering with the sharp intellect of early age, sweep the floors of the trains to earn a bellyful, and fight with the passengers, with the waiters and with each other for the right to the left-overs of food. Their less adventurous and less energetic brothers wait on the platforms silently watching the passengers eat and almost cry with gratitude for the gift of a single slice of dry bread or a stale roti or idli. The scenes of hunger and starvation become even grimmer as one heads towards the great pilgrimage centres of India, the roads to which, as we have seen, used to be dotted with chatrams where bells were rung at midnight to invite the laggard seeker to come and receive his food, and where orphaned children of the passers-by were provided shelter, food, education and care till they were ready to face the world on their own. The persisting image that the pilgrim centres and the trains leading to them now leave on the mind is that of immense hunger and starvation. One of the most unfortunate images that comes to mind is that of a child of five soothing a younger child of two with a rubber nipple at the end of an empty bottle of milk on the main street of the great city of Tirupati, where a vast stream of pilgrims converges every day. The statistical figures and the day-to-day images on the streets all speak of a great hunger stalking the lands of India. But, we insist that we have sufficient food for ourselves. The economists and the policy planners have been claiming such sufficiency of food in India at least since the early seventies. They have now begun to claim that the food available in India is not only sufficient, it is a little too much for our needs, and we should make efforts to export some food and shift some of the food grain lands to more exportable cash-crops. The claim of sufficiency is based on the fact that the food that we produce cannot all be sold within the country at economic prices. There is no dearth of food, it is said, for those who can afford to buy; and those who cannot buy probably do not deserve to be fed. Lack of food grains for the animals is explained through a similar argument: Those who feed good food to the animals, it is said, also eat their flesh; we do not rear animals for economic exploitation, so we do not need to allocate food grains for them. Thus we condone both the scarcity and the hunger. But, the essence of the Indian position on food, and perhaps the position of all societies on the question of food, is that all those who are born deserve to eat. Others would perhaps expect some economic returns from the feeding, Indians believe that feeding is its own reward. But perhaps no society in the world believes that people or animals can be left to starve if they cannot be put to use. Healthy animals and healthy men are useful in themselves. We, who as a people, used to be so scrupulous about caring for all creation, have become callous about the hunger and starvation of people and animals. We know of the hunger around us, and we fail to care. We, all of us together, all the resourceful people of India, bear this terrible sin in common. But we cannot continue to live in sin. No nation with such a sin on its head can possibly come into itself without first expiating it. We should begin to pay attention to the lands and to the fulfilling of the inviolable discipline of annam bahu kurvita. But we cannot continue to be indifferent to the hunger around us until the abundance arrives. Because, as classical India has taught with such insistence, hungry men and animals exhaust all virtue of a people. Such a nation is forsaken by the devas, and no great effort can possibly be undertaken by a nation that has been so forsaken. In fact, not only the nation in the abstract, but every individual grhastha bears the sin of hunger around him. We have been instructed, in the authoritative injunctions of the Vedas, that anyone who eats without sharing, eats in sin, kevalagho bhavati kevaladi. Therefore, even before we begin to undertake the great task of bringing the abundance back to the Indian lands, we have to bring ourselves back to the inviolable discipline of sharing. We have to make a national resolve to care for the hunger of our people and animals. There is not enough food in the country to fully assuage the hunger of all; but, even in times of great scarcity, a virtuous grhastha and a disciplined nation would share the little they have with the hungry. We have to begin such sharing immediately, if the task of achieving an abundance is to succeed. To us, Indians, sharing of food comes naturally. We do not have to be taught how to share, how to perform annadana. Because, we have been taught the greatness of anna and annadana by our ancestors, and we have practiced the discipline of growing and sharing in abundance for ages. For such a nation to obliterate the memory of a mere two centuries of scarcity and error is a simple matter. Let us recall the inviolable discipline of sharing that defines the essence of being Indian. Let a great annadana begin again through the whole of this sanctified land. Let a stream of anna begin to flow through every locality of the country. The abundance will surely arrive in the wake of such annadana. May we have the strength of mind and body to be Indians again, and fulfil the vrata of growing and sharing a plenty. - See, R. Ratnaffi, Agricultural Development in Madras State prior to 1900, Madras 1966, p. 11. - See, Lionel Place, Report on the Settlement for Fuslis 1202-4, dated 6.10.1795, Tamilnadu State Archives, Chengalpattu District Records, vol. 492, para 25. Letter of Lionel Place to the Madras Board of Revenue, dated 22.1.1797, Tamilnadu State Archives, Proceedings of the Board of Revenue, 25.1.1797, vol. 172. - See, for example, United Nations Development Programme: Human Development Report 1994, Oxford University Press, New Delhi 1994, pp. 151 and 165.
<urn:uuid:926f5be6-04e2-4171-b984-b9c1bce1180c>
CC-MAIN-2019-22
https://dharmadispatch.in/a-plea-for-annam-bahukurvita-abundance-of-food/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255562.23/warc/CC-MAIN-20190520041753-20190520063753-00302.warc.gz
en
0.957789
2,198
3
3
Contributions to the History of the Re-organization of Border Defence/Border Guards after World War II The armistice agreement signed on 20 January 1945 put Hungary under the obligation to withdraw its army and personnel within the borders valid on 31 December 1937. The organization of border defence started along this provisional borderline and its full force was limited to 5,000 persons. The recruitment of the border guard started according the proclamation of the Interim National Government in January, 1945. The organization of the Hungarian border guard became so urgent because of the recurrent atrocities of the Yugoslavian partisans, who by crossing the border, occupied some settlements in the vicinity of Baja and Szeged with the aim of annexing them to Yugoslavia. At the end of the 1940s, however, significant changes happened, which influenced both the structure of border defence/border guards and its working circumstances. The changes were in connection with the establishment of the State Security Authority of the Ministry of the Interior. Border guards, river authority, aerial authority, the Central Authority in Charge of Controlling Foreigners and passport office were integrated within one structure. The author analyses the structural changes of border guards between 1945 and 1949 and describes the most significant characteristics of the border guard system in her study. “Eaglets” in the tempest The Tribulations of a Catholic Priest in the Communist Dictatorship Having Done Children’s Safety Service The author reveals the biography of an outstanding person in his study. István Regőczi’s life, partly because of its length, could demonstrate the practices of the political police during both the Rákosi and Kádár eras. As a chaplain he was a teacher of religion in Pestszenterzsébet during World War II when he gathered together the orphans giving them the name of “Eaglets”, which name he found in one of the Christmas meditations of the great devotional writer Ottokár Prohászka. He started his work with them and built a house out of the ruins for them. During the bombardment of Budapest he took care for fifteen children and by giving shelter to a number of Jewish families he also saved their lives during the Arrow-cross terror. After Communists’ seizure to power churches belonged to one of the chief enemies of the regime and were at the target point of the political police. Although the state security authorities were re-organised several times, but the main goal of them never changed: to stop religious life, to ban the activities of the churches, or at least to have a strict control over them. These aims were realised by putting loyal church leaders to the chief position of the churches, by making the activity of competent priests impossible, sometimes even removing them from their positions. Anybody being at any position in the church hierarchy could fall victim to such a procedure, which remained more militant and oppressive than the official party policy itself. The life of István Regőczi is a good example for this. Members of the Catholic Church were even observed not long before the system changes at the end of the 1980s although the hierarchy became co-operative with the regime. The situation was even worse for those, like Regőczi, who dealt with young people, because Communists were aware of the importance of education: the future belongs to those who win the youth. The Hungarian Resistance Movement Leaflets in the village of Békéssámson in the 1950s The stabilization of the Communist dictatorship and the keeping of it in motion always presumed finding and making enemies and increased the apparatus and power of the political police. The cult of personality, together with terror, made the whole society an enemy of the system and the political power even emphasized the defencelessness of the individual by the general atmosphere of distrust. The very strong oppression obviously provoked the resistance of the Hungarian society. The resistance brought about movements even before the revolution of 1956, such as White Guards, White Partisans, the Association of the Sword and Cross, the National Resistance Movement, or as it is analysed in the study of István Orgoványi, the Hungarian Resistance Movement. The political police, however, often discovered these movements before their significant growth by its extensive network of agents. In some cases, the small findings were exaggerated by false testimonies or tortures in order to make the court of law bring a charge against the perpetrators. Because of the war propaganda the members of the resistance movements expected the outbreak of a new war in many places. There was a common unrest against the Communist dictatorship because of the terror, the presence of the Soviet troops and the forced social changes. Among these circumstances young local people in the village of Békéssámson started to throw leaflets and organize the Hungarian Resistance Movement. However, it was uncovered by the state security organs very soon. Éva Sz. Kovács “The Agents of Kádár terrorize Vienna…”, or how to Kidnap Somebody? The documents analysed by the study of Éva Sz. Kovács illustrated one of the operations of the Hungarian state security in Austria with the aim of bringing home Bertalan Geőcze (Gőcze), or “Grey-haired” as he was mentioned by the authorities according to his code-name. Bertalan Geőcze came to Hegyeshalom after World War II where he became the director of the elementary school. At the same time he was the leader of the local agricultural co-operative. Due to his familiarity with the region, Geőcze supplemented his income by smuggling. Local police and border guard organs turned a blind eye to his activity. Despite this, Geőcze left Hungary in 1948 illegally, since he was accused of many other crimes. Nonetheless, he had good relations to the Hungarian state security organs, and in the hope of being able to come home he offered his services. However, Geőcze’s connections with the Hungarian state security was cut in 1951. At that time he was said to set up a spy residency against Hungary in Vienna and he sold his previously gathered information. He rejected the repeated requests of the Hungarian state security to get into contact. Therefore the Hungarian authorities decided the search of him and stop his adversary activity, which they wanted to act out by bringing Geőcze home. The documents reveal the details of this action, called “Rowing-man”. We learn how the action was planned, who co-operated in its realization, which is an example for both the co-operation of the state security organs of the Socialist countries and the employment of joint agents. Hybrid Maize and State Security Hungarian party leadership found itself under a pressure after 1956 because of the situation of agriculture and peasantry. In internal politics it became obvious that the sufficient supply of the population with agricultural goods and food had an absolute priority, which presumed a strong agricultural sphere. But in foreign politics Soviet leadership had a significant pressure over János Kádár after the transitory year of 1957 to finish the previously failed collectivisation of agriculture and liquidate the small and medium-sized peasant estates and peasant society. Consequently a new term was born in party terminology: the so-called “double task”. This expression meant that the agricultural development and production growth must have been parallel to the building of the system of agricultural co-operatives. The document published by the author in his study is a proof of how even a narrowly interpreted special problem of cultivation became overpoliticized. It could even arouse the interest of the state security. It gave an evidence to the thesis that in 1958 the totalitarian model of dictatorship was still alive, which was supported by the political police. To decide whether great state farms were the most appropriate places for producing hybrid maize, or new types of state companies had to be built for it, does not seem a relevant political question today. But in the study the absurdity of such polemics is put in historical context and therefore we are closer to understanding. János M. Rainer A Handbook and Starting Point A bookreview about György Gyarmati – Mária Palasik (eds.): Trójai faló a Belügyminisztériumban. Az ÁVH szervezete és vezérkara. [The Wooden Horse of Troy in the Ministry of the Interior. The Structure and General Staff of the State Security Authority.] Budapest, 2013. Állambiztonsági Szolgálatok Történeti Levéltára – L’Harmattan Kiadó. The volume published by the Historical Archives of the Hungarian State Security at the end of 2013 is the second piece of a series dedicated to especially the history of the organization of the State Security Authority (ÁVH). It both presents a clearer view on the history of the organization and goes beyond the borders of it, because the structure of the organization proper is preceded by an introductory essay of the editors, followed by the most voluminous part of the book, the so-called archontology. This latter takes the largest part of the book and contains the biographies of almost two hundred persons in leading position in the State Security Authority in the Ministry of the Interior between 1953-1956. This is enough. however, to define the volume as “a handbook”. The introductory essay of Mária Palasik and György Gyarmati has general intentions to write political history beyond the special research methodological explication how to deal with state security sources. It is an almost confessed ambition of the authors to give a fresh reading of the short, but significant period between 1953-1956, to stimulate thinking, or start debate about it. The book also contains the study of Ildikó Cserényi-Zsitnyányi on the history of organization of the Ministry of the Interior, which is a professional and precise overview. It provides a great help to those researchers who deal with the history of the State Security Authority in the Ministry of the Interior; they might rely on this study and this is the most what can be said about a study: it helps, directs, gives the framework of interpretation and forms a solid basis. The 186 biographies constitute the main part of the volume, which supplements organically the history of the organization thus providing a useful handbook. Speaking Differently about the Great Show Trial A bookreview about István Ötvös: Koncepcióváltások. A Rajk-per katonai vonala [Changes of Concepts. The Military Line of the Show Trial of Rajk]. Attraktor, 2012. Stalinist dictatorship is one of the darkest periods of the Hungarian history. The keywords first coming to mind when speaking about the Rákosi era are total terror, state security authority, internment camps, deportation, forced collectivization and cult of personality. Also show trials belong among these atrocities. Two of them were the greatest trials, those of Primate Mindszenty’s and Rajk’s, which like a drama ended in the execution of Rajk, the former Communist minister. There have been a lot of publications about his trial, many historians tried to describe and analyse its history, therefore it is an interesting question what novelty could be in it? This is the main question of the author of the book review when reading István Ötvös’ monograph. Ötvös argues in his book that the show trials of 1949-1950 (the Rajk-Brankov trial, the procedure against László Sólyom and other military leaders, the Szebenyi trial) were based not only on false political concepts, but used concepts of the intelligence services, which were changed during the trial several times. Further positive contribution of the book Changes of Concepts is to show the most characteristic features of Rákosi era. It successfully introduces the mechanism of creating enemies, analyses the reasons and realization of reckoning. This book is a chronicle of the cruelest clashes within the party elite for the power over the secret services. The author presents these events and processes with a scientific apparatus sometimes in an ironic, but profound style. “A Compromise of Popular Front Type” A book review about Gábor Tabajdi: Kiegyezés Kádárral. „Szövetségi politika”, 1953-1963. [Compromise with Kádár. “Politics of Alliance”, 1953-1963]. Budapest, Jaffa Kiadó, 2013. The title of the new monograph of Gábor Tabajdi is “A Compromise with Kádár”. Kádár, as the one-time first secretary of MSZMP, might have been proud when hearing that his name suggested the term “compromise” to somebody after putting down with ruthless violence the Hungarian revolution of 1956 and effectuating a bloody revenge by mass executions. The author himself acknowledged in the introduction of the book with some astonishment: even in public debate about history the concept of a compromise with Kádár (although a forced one) after the revolution of 1956 is getting more popular when speaking about the relationship of the power elite and the representatives of the society. According to Gábor Tabajdi, Kádár and his group applied a new technique of power practice from the end of 1956. The deeper reasons for this has been still undisclosed. He attempts to analyse these levels of deeper and personal reasons and examines the “politics of alliance” of MSZMP in a chronological order and according to different aspects of the power. First he analyses the formal systems and after discussing the official ideology he tries to analyse the realization of power in practice in the everyday life of the political world. The monograph follows a logical structure: the preliminaries and tradition of the “politics of alliance” are followed by the international context, the resolutions of the leading corps of the party, their decisions and finally the re-organization of the Popular Front. After that the newest results of the author’s researches are introduced: the activity of the state security services in order to help the fulfilment of the aims of the party and the analysis of the relationship between the Ministry of the Interior and other actors of “the politics of the alliance”, the presentation of the personal and informal connections. The latest monograph of Gábor Tabajdi corrects and completes our knowledge about the Kádár regime in many ways. It is a well-written and even enjoyable reading not only for professional historians but also for the larger public. It describes how Kádár and his circle stabilized his power by personal deals, blackmailing, disintegration and opportunism and how he chose his “enemies” and “compromised alliances”.
<urn:uuid:839029c7-3167-4955-937a-758a2285f31f>
CC-MAIN-2022-33
https://www.betekinto.hu/en/4_2013
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00205.warc.gz
en
0.954857
3,203
2.953125
3
<p style='text-align: justify;'><p>Thomas Gray (1716-1771) was a poet and scholar. He spent much of his life in the University of Cambridge, first at Peterhouse then at Pembroke College, although he also spent significant periods living in London and travelling the British Isles, and he accompanied his friend Horace Walpole (1717-1797) on a Grand Tour of Europe between 1739 and 1741. Throughout the 250 years that have passed since Gray’s death, he has primarily been celebrated as a poet, especially for his <i>Elegy Written in a Country Church Yard</i> (1751). While he lived, however, he was equally renowned for his scholarship: his friend William Johnson Temple speculated that he was ‘the most learned man in Europe’. Although he did not publish any of his research, he had a significant influence on intellectual as well as literary life in the mid-eighteenth century, and like many scholars of the period he shared his learning as well as his verse through correspondence and manuscript circulation among coterie networks. Gray was a polymath, and his research traversed British, European, and global fields of knowledge, ancient and modern, including literature, history, geography, philosophy, law, religion, politics, music, visual art, natural history, and architecture, often in the course of what felt to him like single, unified enquiries. His characteristic method was to make preliminary notes in smaller notebooks and in the margins of his books, then digest and present his work more formally in the Commonplace Book that is presented here. It is the most important repository of his multi-faceted scholarly activity, and also of his poetry, much of which is copied here in unique versions. </p><p>Gray’s Commonplace Book has been held by Pembroke College since 1809, when it was bequeathed by his friend Richard Stonhewer. It is in three large volumes, but it is usually described as a single document – a Commonplace Book rather than three commonplace books – because Gray continued his pagination from one volume to the next, made cross-references between volumes, and included references to all volumes in his index at the start of Volume I. It is indebted to John Locke’s influential system for organising a commonplace book, which Gray summarised in his early entry ‘Adversaria’ (Volume I, fol. 6v). Locke’s system meant that the compiler of a commonplace book did not have to use established ‘heads’ or write them into the volume in advance and then fit entries into preallocated spaces. Instead, compilers could devise their own headings, make entries sequentially, and add each heading’s page number to a finding aid: an alphabetic table organised by initial letter and subsequent vowel that enabled information retrieval. The page number for Gray’s entry ‘Adversaria’, for example, would be added to the section for ‘A’ (initial letter) under the sub-division for ‘e’ (subsequent vowel); this is exactly where Gray entered it in the tabular index that he drew up according to Locke’s guidelines at the start of Volume I (fols 4v-5r). He also usually followed Locke in using Latin headings for his entries, beginning entries at the top of a leaf’s verso and allowing each entry at least one full opening (i.e. a double page spread), and cross-referencing entries with the abbreviation ‘V’ when adding further material under the same heading to later openings. </p><p>Like almost all compilers of commonplace books, however, Gray also broke these rules, and he broke them with increasing frequency across his three volumes. He sometimes used multiple headings on a single page, and occasionally missed headings out or did not Latinise them. Several of his cross-references link entries that do not share headings but have more subjective connections. He left many cross-references blank and made mistakes in others. Some were written on or lead to otherwise blank pages, indicating that he did not always use the space that he anticipated an entry would need. His most significant departure from Locke was to add an index of a different kind at the end of Volume I (fols 227r-229r). This is an alphabetised, descriptive list of contents in English that was evidently written after the volume was full, and it suggests that he may not have found Locke’s tabular index sufficiently helpful, perhaps because it contains numbers rather than words and therefore taxes the memory of its user. Gray would first have had to remember that he had used the heading ‘Adversaria’ in order to find its page number in the tabular index section for ‘A’ under the sub-division for ‘e’, for example; in contrast, the corresponding entry in his descriptive index – ‘Common-Place. M<sup>r</sup> Locke’s method’ – is more self-explanatory. </p><p>The entries in Gray’s Commonplace Book are impressively various in discipline, genre, language, and form. Many are written in continuous English prose and read like essays, and some have been extracted and edited as such following the example of Thomas James Matthias, who presented extracts in his 1814 edition of Gray’s <i>Works</i>. Gray also used his Commonplace Book to copy out original poems and verse translations written by himself and his friends in English, Latin, and Greek. He usually gave each poem a subtitle under the general heading ‘Carmina’ – his headings can be distinguished from his subheadings and subtitles because he almost always marked headings out with a closing parenthesis – ‘Carmina)’ – but he skipped the ‘Carmina’ heading in Volume II and grouped some poems that had originally been sent as letters under the heading ‘Epistolæ’ in Volume I. His subtitles often differ from the more familiar titles under which his poems were published: ‘Noon-Tide, An Ode’ (Volume I, fols 143r and 144v), for example, is more commonly known as ‘Ode on the Spring’. Gray generally attributed verse that he did not write himself using his friends’ school nicknames, such as ‘Favonius’ for Richard West. Although the essays and poems are the most widely known of the Commonplace Book’s contents, however, the great majority of its entries could not be categorised as either. Gray also used it to transcribe quotations, assemble chronologies, sketch maps, summarise books, compile lists, draw up tables, record vocabulary from a staggering range of languages, and compose genealogies in the form of annotated family trees. For ‘Genealogia’ entries in particular, although also in others, he used red ink alongside his customary brown to highlight special features and turned the volume through 90 degrees to work across a whole opening. He also frequently used the space provided by a whole opening to add annotations, entering continuous prose on a verso keyed to notes directly opposite on a recto. </p><p>Entries in the Commonplace Book that are not in Gray’s characteristically neat hand were added after his death. The most substantial such entries were made by his friend and executor William Mason (1724-1797), who added notes to Gray’s ‘Carmina’ entries recording the poems’ posthumous publication, and used the pages following Gray’s final entry (a Russian alphabet) to copy out material from other surviving manuscripts (Volume III, fols 84v-92r). There are also frequent curatorial additions in pencil, which usually seek to correct gaps and mistakes in Gray’s pagination. His mistakes were so extensive and consequential, however, that correction efforts often had to be abandoned. </p><p>Gray paginated his Commonplace Book rather than foliating it (i.e. he assigned numbers to each side of a leaf rather than to each leaf) and the volumes have not been subsequently foliated either. Because his pagination was erratic, however, and because he abandoned it altogether shortly after beginning Volume III, foliation is essential in order to allow reliable referencing. A complete foliation has therefore been undertaken for this digital edition and it is recorded in the contents after each image number, although the Digital Library system uses the word ‘page’ to display this metadata: ‘image 461, fol. 226r’ therefore displays as ‘(image 461, page 226r)’, for example. Also recorded in the contents are Gray’s heading for each page or for the entry of which it is part, Gray’s subtitles in ‘Carmina’ and ‘Epistolæ’ entries, Gray’s page number where given, Gray’s cross-reference where given, and the watermark for each leaf. Within the contents, headings and subtitles in quotation marks are Gray’s own, and they retain his idiosyncratic use of the long ‘s’ (‘ſ’) and ligatured ‘æ’ and ‘œ’. Where Gray used a recto to add annotations to continuous prose on a facing verso, as in the ‘Itinerarium’ entry that begins Volume I, fols 176v-177r, the notes are described in the contents in the form ‘‘Itinerarium’ notes’. Gray’s pagination errors mean that caution is required when looking up page numbers referred to by later scholars or in his own cross-references, especially since he sometimes used the same page number twice (he wrote ‘340’ on Volume I fol. 175v and fol. 176r, for example). On all such occasions letters have been added in square brackets to distinguish them (i.e. ‘p. 340[a]’ and ‘p. 340[b]). All three volumes were repaired and rebound in 1972, and the modern binding is tight, so small amounts of text are sometimes lost in the gutter. This is a particular problem for entries where Gray worked at 90 degrees across an opening, as in the ‘Genealogia’ entries, and it can be helpful to download both images so that the whole opening can be viewed at once. </p><p>Gray began using his Commonplace Book in the mid-1730s, and he stopped around 1760 when he was living in London and pursuing research in the newly opened British Museum Reading Room. He adopted different note-taking methods such as complete manuscript transcription while working there, and experimented with different methods again as he pursued natural history during the final decade of his life under the influence of Carl Linnaeus (1707-1768). But although the Commonplace Book therefore cannot be taken to represent the whole of Gray’s scholarly career, it offers an unparalleled view into its richness and range. Dazzlingly multidisciplinary, imposingly multilingual, and immoderate or even prodigal in the quantity, quality, and scope of the research to which it testifies, it provides a window onto Gray’s interest in the organisation and classification of knowledge as well as his work in and across a staggering variety of fields. It is published in this digital edition to mark the 250<sup>th</sup> anniversary of his death on 30<sup>th</sup> July 1771. </p><p>Ruth Abbott</p></p> The images contained in the pdf download have the following copyright: This will create a PDF with thumbnail images for all pages, and may take some time for large documents. The images contained in this document have the following copyright: This image has the following copyright: Choose one of the available sizes to download: This metadata has the following copyright: Do you want to download metadata for this document?
<urn:uuid:fa90799a-261e-4fd2-a78f-0524f3b48221>
CC-MAIN-2022-33
https://cudl.lib.cam.ac.uk/view/MS-PEMBROKE-GRA-00001-00001/293
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00005.warc.gz
en
0.968764
2,550
2.921875
3
To understand the state of intergovernmental relations today, consider the state of the U.S. Advisory Commission on Intergovernmental Relations (ACIR), a once-proud, federally funded institution that has fallen on hard times. Among the functions outlined in its charter, ACIR is supposed to bring together representatives of the federal, state, and local governments to discuss common problems; provide a forum to discuss how to coordinate grant and other programs requiring intergovernmental cooperation; provide technical assistance to determine how legislation in Washington would affect the federal system; recommend how best to allocate governmental functions, responsibilities, and revenues among levels of government; and suggest how to coordinate tax laws and administrative practices to achieve a more orderly, less competitive fiscal relationship among levels of government. Twenty years ago, ACIR was a prestigious institution that produced numerous analytical reports on the intergovernmental impact of federal policy. Its role was augmented by the establishment of intergovernmental offices in the Office of Management and Budget and the General Accounting Office. But in recent years, ACIR has lost stature, influence, and resources. In 1986, Congress cut ACIR's budget by 53 percent. Most recently, Congress considered eliminating all funding and sharply reduced it further. Today, ACIR sometimes has trouble attracting a quorum to its meetings. The ACIR's decline is just one reason--albeit a symbolically important one--why state and local officials view the federal government as unconcerned about the intergovernmental effects of its decisions. More important are the federal government's decisions about how much money to give states and localities, how to package that money in grants and other programs, and how to require that states and localities offer services that Washington cannot afford to provide itself. The health of our intergovernmental system may strike some as a boring, merely philosophical matter. In fact, the importance of a well-functioning intergovernmental system can hardly be overstated. We cannot achieve the National Performance Review's (NPR) broad goals--cutting red tape, putting customers first, empowering employees to get results, and cutting back to basics--without a new approach to intergovernmental partnership in delivering services to the public. In addition, a well-functioning system is central to Americans' quality of life and Washington's ability to pursue a domestic policy agenda. Americans spend hundreds of billions of dollars each year to implement public policies at all levels of government. Hundreds of thousands of dedicated public employees, along with thousands of other committed citizens, work hard to solve human and societal problems, helping one another and striving to build a better country. Despite all of these efforts and money, Americans increasingly feel that public institutions and programs aren't working. In fact, serious social and economic problems seem to be getting worse. The percentage of low-birth-weight babies, the number of single teens having babies, and arrest rates for juveniles committing violent crimes are rising; the percentage of children graduating from high school is falling; welfare rolls and prison populations are swelling; median incomes for families with children are falling; more than half of children in female- headed households are poor; and 37 million Americans have no basic health care coverage or not enough. Why? At least part of the answer lies in an increasingly hidebound and paralyzed intergovernmental process. A significant number of federal domestic programs are administered through federal grants to state and local governments--for everything from wastewater treatment to well-baby care--or through income transfers administered jointly by federal and state governments. Together, these grant and income transfer programs will amount to an estimated $226.1 billion in fiscal 1994. Notwithstanding years of debate at all levels about grant consolidation and simplification, the number of grant programs--now more than 600--continues to escalate. Of these programs, 451--75 percent--are grants of $50 million or less.[Endnote 1] So, too, do the problems of duplication and overlap. Take, for instance, the case of federal programs designed to help children and their families. Today, 10 departments and two independent agencies administer more than 140 such programs. More than 15 percent of them are directly administered by the federal government, more than 40 percent by state governments, and another 40 percent by local, private, or public groups.[Endnote 2] Unfortunately, the myriad of federal mandates and regulations that accompany grant programs are cumbersome and very costly to administer, lack a coordinated implementation strategy between levels of government, and are not achieving the intended outcomes. Each separate program has its own array of rules and regulations that must be observed, regardless of their impact on the effectiveness and quality of customer service. States and localities have limited ability to customize service delivery by integrating programs because of competing, often conflicting federal rules and requirements that accompany each grant program. In Cincinnati, for instance, local officials were working to restore a severely blighted but historical area. They were using federal Community Development Block Grant funds in conjunction with public and private resources to create new and rehabilitated affordable housing for residents of the area. But when they sought to combine these activities with federal job training funds to hire and train unemployed persons in the construction industry, conflicting federal regulations got in the way.[Endnote 3] To the taxpayer "a tax is a tax" and "a service is a service" regardless of which level of government is responsible. Reinvention of the federal government must recognize this reality and must place a high priority on improving government management at all levels. Meanwhile, Washington has increasingly imposed mandated requirements and regulations (often without adequate funding to cover costs) to help realize policy objectives. As of December 1992, at least 172 pieces of federal legislation were imposing mandates on states and localities. "The federal government's own fiscal weakness has not made it any less eager to tell states and localities what to do," wrote Alice Rivlin. "Indeed, when its ability to make grants declined, the federal government turned increasingly to mandates as a way of controlling state and local activity without having to pay the bill."[Endnote 4] A Vision for the Future. In a perfect world, we would consolidate the 600 federal grant programs into broad funding pools, organized around major goals and desired outcomes--for example, safe and secure communities, a competitive workforce, healthy and self-sufficient families and children, or a clean environment. In addition, we would streamline administrative mechanisms, providing flexibility to account for regional differences and the diversity of needs; ensuring accountability by measuring performance and outcomes, not transactions and errors; and driving program design and management responsibility down to the point of contact between government and the end consumer. To create this perfect world, we would have to massively reform the existing system of intergovernmental grantmaking. Such a reform would touch every federal department and agency, every congressional committee and subcommittee, every special interest and advocacy group, and each and every one of the thousands of states, counties, cities, townships, and special purpose districts across the country. Previous reform efforts, mainly designed to consolidate grants and reduce administrative red tape, have largely flopped. President Reagan achieved limited success in his early efforts to create a system of block grants, but subsequent efforts to expand the model to other categorical programs have almost universally failed. While the political obstacles to enacting such proposals continue to seem almost insurmountable, an opportunity for change may be at hand. Even Congress itself is becoming exasperated with the micromanaged nature of grantmaking.[Endnote 5] As one congressional staffer noted, "There is a tremendous pent-up legion of followers in Congress [and elsewhere] if forceful leadership is provided . . ." Recent actions, such as passage of the 1991 Intermodal Surface Transportation Efficiency Act, demonstrate some willingness by major congressional committees to approach grantmaking more rationally. In addition, the National Governors' Association and the National Conference of State Legislatures have developed a proposed grant consolidation plan, the spirit of which many see as feasible to provide increased flexibility to states and localities. Even with an enthusiasm for change that breaks sharply with history, the federal government will not achieve its goals easily or quickly. We cannot achieve improvements solely, even primarily, through federal action. As a result, each partner in the system must work collaboratively with the others-- federal, state, and local--to refine the concepts and recommendations outlined in this report. Such collaboration has already begun; in mid-1993, President Clinton and Vice President Gore held discussions with the nation's governors and mayors. Specific solutions can be perfected and refined over time, but the basic needs are, and have been, clear for more than a decade: 1. The number of categorical grants must be reduced; 2. Governments at all levels (but especially the federal government) must reduce the degree to which unfunded mandates are imposed on other levels of government; 3. Program rules and regulations must be fundamentally rethought and their focus changed from compliance to outcomes, from sanctions to incentives; and 4. Federal interdepartmental and intergovernmental collaboration must be actively facilitated if any real improvement in government's credibility is to be successful. The federal government will have to work with states and localities to define a more viable federal partnership, find the optimal balance between flexibility and accountability, while simultaneously addressing the budget constraints imposed by the federal deficit. Federal, state, and local government attention should focus on mutually agreed-upon measurable outcomes for public service delivery. The intergovernmental relationship should be a partnership, not an adversarial or competitive system. Federal financial support should be provided to achieve broad goals, but also should provide latitude and flexibility in how to accomplish them and be tailored to real local needs. Rather than defining accountability by inputs, transactions, error rates, and failure to progress, the federal government should hold state and local governments accountable for performance. The system should support and reward what works, rather than imposing rules and sanctions on the majority because of errors or omissions by the minority. In this report, we offer the following five broad recommendations on how to improve the system: --improve federal grant administration through simultaneous bottom-up and top-down initiatives; --cut red tape and eliminate roadblocks by allowing waivers of regulations that detract from accomplishing program objectives or interfere with effective service delivery; --simplify cost reimbursement procedures, saving time and money; --eliminate needless paperwork by simplifying the compliance certification process and the common grant rule on small purchases; and --reinvent ACIR and promote collaboration between the federal government and its state and local partners across federal policymaking and administration. If implemented, our recommendations will result in: --savings in overhead and administrative costs at all levels; --much greater flexibility up and down the line to design solutions that work; --more effective concentration of limited resources; and most importantly --a much greater likelihood that federal, state, and local objectives will be achieved. 1. U.S. General Accounting Office, Federal Aid Programs Available to State and Local Governments, GAO/HRD-91-93FS (Washington, D.C.: U.S. General Accounting Office, May 1991). 2. Library of Congress, Congressional Research Service, Federal Programs for Children and Their Families (Washington, D.C., December 15, 1992) 3. This occurred in the city's Betts-Longworth area. 4. Rivlin, Alice, Reviving the American Dream (Washington, D.C.: The Brookings Institution, 1992), p. 107. 5. See, for example, Institute for Educational Leadership, Solving the Maze of Federal Programs for Children and Families: Perspectives from Key Congressional Staff (May 1993). Who We Are |||Latest Additions |||Initiatives |||Customer Service |||News Room |||Accomplishments |||Awards |||"How To" Tools |||Library |||Web Links
<urn:uuid:4af6a145-e2d8-468e-b180-d3242e32e1fe>
CC-MAIN-2019-22
http://govinfo.library.unt.edu/npr/library/reports/fslexec.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257781.73/warc/CC-MAIN-20190524224619-20190525010619-00382.warc.gz
en
0.93844
2,410
2.5625
3
This section is from "The Horticulturist, And Journal Of Rural Art And Rural Taste", by P. Barry, A. J. Downing, J. Jay Smith, Peter B. Mead, F. W. Woodward, Henry T. Williams. Also available from Amazon: Horticulturist and Journal of Rural Art and Rural Taste. A few years since, a person, for the sake of employment, took an agency from a reliable nursery for the sale of their trees. He was wholly inexperienced in tree culture; still, on visiting farmers and others for the sale of his wares, he in-formed them, with as much assurance as though relating a fact based on his personal experience, that their previous failures in orchard planting were the result of mistaken culture. This was probably to some extent correct; but he laid down a course of culture for them to pursue, which, if carried out, would, in a few years, give them large trees in full bearing. His plan was this : for several successive years after the trees were set, use the cultivator and grow buckwheat. Perhaps this was a judicious system to adopt in some cases. We do not say but it may have been; but, so far as our observation extended, it did not amount to much, and soon went out of fashion. Orchard culture, like that of other crops, must be brought to meet circumstances. Different soils, locations, and climates call for varying processes, so that few general rules can be adopted, to carry out with assurances of success. Of these, we consider a preparation of soil before transplanting, as of the greatest importance. Some soils are naturally deep and open. Where this is not the case, they should be made so before the tree is placed in them; for no tree will flourish for any length of time in a thin or compact soil. It is labor lost to place them there, either in expectation that they will flourish in the ground as it is, or in the hope that after culture will remedy the deficiencies. The last can not be done, for every inch of soil needs a thorough pulverisation, which can not be effected under the roots when they have once been put in place. In planting trees of any kind, especially fruit trees, we would say, then, pre-pare the land before hand; that is, if the soil is not naturally deep, make it so by deep tillage; if not fine, reduce it, no matter how fine. If not so dry that water will not settle and stand under the trees, drain it; if it requires manure, apply it according to the necessity of the case in previous tillage; in short, bring the land into that high state of cultivation, which is necessary to the successful growth of any other crop. Then trees may be put into it, if they are healthy trees, well taken up and well replanted, with a fair prospect of success. As it respects their after culture, the good sense of the cultivator ought to be sufficient to give him direction. If he wishes a rapid growth, it will be necessary to feed high, and perhaps to continue cultivation with plowed crops. South and West, where the winters are mild, or in a portion of the country where there can scarcely be said to be any winter, this course may answer well, but in New England, and, indeed, all regions where the winters are severe, we question whether keeping the ground in plowed crops or high feeding is best. It is a well-established fact, we believe, that plowed lands freeze deeper and are more subject to repeated freezings and thawings, than those in grass. Consequently, the roots of the trees are more exposed to the vicissitudes these changes bring. Even in plowed grounds, however, this objection may be removed by littering to secure the tree from the extremes of these changes; still, in our Northern climate, if the ground is well prepared, we can see more advantages than objections in foregoing the use of the plow after the trees are set; and if the ground is stocked, we have found no particular objection. Truly, the trees may not grow so fast under such circumstances. Rapid growth in a cold • climate is not desirable; it is the harbinger of early decay; for who is not aware that the texture of quick growing trees is much more loose and spongy, open to the action of frosts, than those of slower and more compact growth? Where trees are highly fed, in such a climate, it is no unusual thing for the bark to crack off by freezing and thawing, and even for the trees to split. Where trees are overfed, the branches too often grow so late in autumn that it is impossible for the wood to ripen, and winter cuts it down as though it were an herbaceous plant. Not so with the trees that nature plants and that grow under her maturing and protecting care. She gives them a needful supply of food to answer the purposes of a healthful growth, and causes them to ripen their wood in full preparation for frosts and storms. Her teachings are worthy of the careful consideration of those who would be successful like her. Again, nature, when she plants trees, does not disturb their roots with plow or spade. In her forests; she keeps the ground around them in a light, porous condition by the top dressing she gives them. In autumn the leaves of forest trees fall from their branches to cover and protect the roots from the inclement season that awaits them, and in the coming spring these leaves commence to decay to keep the earth light beneath them, so that the tender roots may push around to gather food and give stability to the tree. They also form a fine, healthy manure, which of itself furnishes the aliment of future tree growth. How far it is expedient to follow nature, others must decide to suit themselves. We have imitated her in furnishing the elements of growth to a few fruit trees, and are so well pleased with the result, that for our own practice, we consider it the best. In other localities, however, it may not be so. Cultivators must decide this matter for themselves. An experiment with a few trees can do no harm, and it will settle the question. So, then, we have come to the conclusion that the true way for us to raise healthy and long-lived fruit trees is first to prepare the land thoroughly by draining if necessary, and then by a deep and very thorough tillage before the trees are set; then obtain good trees, and see that they are well set; and after the trees are once located in this well-prepared soil, we-would keep it in its fine, light condition by as frequent top dressings as were necessary to secure the result. We have seen land so dressed that was kept as light as when first released from the labors of the plow. Who has not seen fruit trees in locations where the soil was top dressed by the frequent deposits brought on by rains, and admired their thrif-tiness, though neither plow nor spade had disturbed the earth around them since they were set? Such trees are vigorous enough in growth, and abundant bearers. The largest and one of the oldest pear trees we ever saw, stands in a place where it takes the wash of the highway, and bears heavily. For this top dressing, other manures than those usually employed for plowed crops may safely be used, thereby making the thing more economical to the farm than when corn or other crops are to be raised. Composts are better than yard or stable manures for fruit trees, and there is no decaying substance on the farm that can not safely be employed in the compost heap. Leaves and muck may form the basis of the heap, and all the odds and ends of the premises may be thrown in to hasten their decay and produce their immediate value. Ashes, whether leached or not, slops, brine, every thing almost thrown upon the heap, prevents waste and makes the compound more valuable. [There is always something fresh in the views of Mr. Bacon, looking to a practical application. There ought to be a general concurrence of opinion in regard to the importance of a thorough preparation of the soil previous to planting an orchard. It can not be as well done after the trees are set, and is very apt to be entirely omitted in consequence of the additional trouble. The cultivation of orchards has occupied a good deal of attention lately. We have no doubt at all as to the utility of cultivating young orchards; we think it ought always to be done. That it is not always satisfactory (though it is very generally) is owing to the fact that the roots of the young trees are needlessly cut to pieces by the plow. This need not, and should not be done. We are also of opinion that old orchards are benefited by cultivation, especially in cases where the original preparation of the soil was not thoroughly done. There can be little doubt, also, that cultivation is the best, cheapest, and quickest mode of renovating an old and worn-out orchard. A thoroughly prepared orchard, after it has become well established, may be put down to grass, and kept in good condition by proper top dressings. It is a great mistake to grow com in an orchard; root crops may be grown judiciously. There can be no doubt that grass protects the roots of trees; but it may well be doubted whether the roots of the apple and other hardy trees require such protection. The damage done in winter is not to the roots, but to the tops. Where the wood is not ripened, top and bottom will suffer more or less. These are merely hints which our readers may take up and follow out- The remarks of Mr. Bacon in regard to high feeding deserve consideration; but it is a rare thing to see this in an orchard. Where the growth is gross the wood generally ripens imperfectly, and is apt to be winter killed; it is, moreover, liable to other casualties. Our readers all know how tender we are of the roots of plants; still we must not make too strict an application of the fact that Nature uses neither spade nor plow; for in the field of Nature, what is true of trees in this respect, is also true of all plants; yet we know we can not get along without these useful implements. Nature teaches us many useful lessons, which we can not disregard without a penalty; yet it has been wisely ordained that man shall labor to perfect the fruits which Nature has so bountifully provided. Mr.Bacon understands all this as well as we do. We have dwelt on the subject for a moment for the benefit of those indolent souls who wrest the argument of Nature to excuse their wretched neglect of all the means providentially placed within their reach. If these men will only prepare their orchards, plant their trees, and top dress as Mr. Bacon directs, we will cheerfully consent that their orchards shall remain in grass for the next ten years. - Ed].
<urn:uuid:043464a9-ec90-4c88-85df-593228dfa2d0>
CC-MAIN-2022-33
https://chestofbooks.com/gardening-horticulture/Journal-13/Orchard-Culture.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00605.warc.gz
en
0.970623
2,306
2.78125
3
Website Under Construction Click on the tabs below for an overview of our organization. Thank you for visiting HubBucket. HubBucket Inc. ("HubBucket") is an Interdisciplinarity Science and Technology, Research and Development - R&D company. We conduct science and technology, research and development - R&D in order to design and develop innovative technologies that will help save lives, and help save our planet for future generations. Furthermore, we collaborate with various organizations, institutions, corporations, agencies and a wide array of professionals from various fields, as we conduct our science, technology and engineering research and development. Our research focuses on the design and development of innovative technologies to improve the following fields: - Health Information Technology - HealthIT - Health Technology - HealthTech - Medical Technology - MedTech - Mobile Health Technology - mHealth - Surgical Robotics - Healthcare Robotics - Medical Research - Scientific Research - Assistive Technology for People with Disabilities - Renewable Energy Technology - Sustainability Technology - Humanitarian Aid - AND MORE We support and promote Open Science. What does Open Science mean? Open Science is the movement to make scientific research (including publications, data, physical samples, and software) and its dissemination accessible to all levels of an inquiring society, amateur or professional. Open Science is a transparent and accessible knowledge that is shared and developed through collaborative networks. Open Science encompasses practices such as publishing open research, campaigning for open access, encouraging scientists to practice open notebook science, and generally making it easier to publish and communicate scientific knowledge. Open Science can be seen as a continuation of, rather than a revolution in, practices begun in the 17th century with the advent of the academic journal, when the societal demand for access to scientific knowledge reached a point at which it became necessary for groups of scientists to share resources with each other so that they could collectively do their work. In modern times there is a debate about the extent to which scientific information should be shared. The conflict that led to the Open Science movement is between the desire of scientists to have access to shared resources versus the desire of individual entities to profit when other entities partake of their resources. Additionally, the status of open access and resources that are available for its promotion are likely to differ from one field of academic inquiry to another. Science is broadly understood as collecting, analyzing, publishing, reanalyzing, critiquing, and reusing data. Proponents of Open Science identify a number of barriers that impede or dissuade the broad dissemination of scientific data. These include financial paywalls of for-profit research publishers, restrictions on usage applied by publishers of data, poor formatting of data or use of proprietary software that makes it difficult to re-purpose, and cultural reluctance to publish data for fears of losing control of how the information is used. According to the FOSTER taxonomy, Open science can often include aspects of Open access, Open Data and the Open Source Software and Open Source Hardware movements whereby modern science requires software in order to process data and information. Open Research computation also addresses the problem of reproducibility of scientific results. The FOSTER Open Science taxonomy is available in RDF/XML and high resolution image. We support and promote Open Access. What does Open Access mean? Open access refers to the practice of making peer-reviewed scholarly research and literature freely available online to anyone interested in reading it. Open access has two different versions—gratis and libre. Gratis open access is simply making research available for others to read without having to pay for it. Open access refers to the practice of making peer-reviewed scholarly research and literature freely available online to anyone interested in reading it. Open access has two different versions—gratis and libre. Gratis Open Access Gratis open access is simply making research available for others to read without having to pay for it. However, it does not grant the user the right to make copies, distribute, or modify the work in any way beyond fair use. Libre Open Access Libre open access is gratis, meaning the research is available free of charge, but it goes further by granting users additional rights, usually via a Creative Commons license, so that people are free to reuse and remix the research. There are varying degrees of what may be considered Libre open access. For example, some scholarly articles may permit all uses except commercial use, some may permit all uses except derivative works, and some may permit all uses and simply require attribution. While some would argue that Libre open access should be free of any copyright restrictions (except attribution), other scholars consider a work that removes at least some permission barriers to be libre. In addition to the gratis/libre distinction regarding users’ rights to a work, there are also distinctions regarding the venue in which open access works are published and archived—green and gold. Green open access involves authors self-archiving their articles by sharing them on their own website, or more preferably, in their institution's Institutional Repository or in some other public archive. Gold Open Access Articles Gold open access articles are published in a journal that is open access, which means the journal will handle hosting and distributing the journal article in a free and open manner. Gold open access can come with a cost—some gold open access journals have publication fees that need to paid by the author (or the author's employer) to cover the cost of publishing the article. These publication fees can be costly, but thankfully less than a third of gold open access journals have a publication fee. Currently, most Gold open access journals are still publishing gratis (free of charge to read) as opposed to libre (free of charge to read, copy, distribute, etc). We support and promote Open Source Software and Open Source Hardware. What does Open Source Software and Open Source Hardware mean? The Open Source Definition Version 1.9 Open source doesn't just mean access to the source code. The distribution terms of open-source software must comply with the following criteria: 1. Free Redistribution The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale. By constraining the license to require free redistribution, we eliminate the temptation for licensors to throw away many long-term gains to make short-term gains. If we didn't do this, there would be lots of pressure for cooperators to defect. 2. Source Code The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost, preferably downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed. Rationale: We require access to un-obfuscated source code because you can't evolve programs without modifying them. Since our purpose is to make evolution easy, we require that modification be made easy. 3. Derived Works The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software. The mere ability to read source isn't enough to support independent peer review and rapid evolutionary selection. For rapid evolution to happen, people need to be able to experiment with and redistribute modifications. 4. The integrity of The Author's Source Code The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software. Encouraging lots of improvement is a good thing, but users have a right to know who is responsible for the software they are using. Authors and maintainers have reciprocal right to know what they're being asked to support and protect their reputations. Accordingly, an open-source license must guarantee that source be readily available, but may require that it be distributed as pristine base sources plus patches. In this way, "unofficial" changes can be made available but readily distinguished from the base source. 5. No Discrimination Against Persons or Groups The license must not discriminate against any person or group of persons. In order to get the maximum benefit from the process, the maximum diversity of persons and groups should be equally eligible to contribute to open sources. Therefore we forbid any open-source license from locking anybody out of the process. Some countries, including the United States, have export restrictions for certain types of software. An OSD-conformant license may warn licensees of applicable restrictions and remind them that they are obliged to obey the law; however, it may not incorporate such restrictions itself. 6. No Discrimination Against Fields of Endeavor The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research. The major intention of this clause is to prohibit license traps that prevent open source from being used commercially. We want commercial users to join our community, not feel excluded from it. 7. Distribution of License The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties. This clause is intended to forbid closing up software by indirect means such as requiring a non-disclosure agreement. 8. License Must Not Be Specific to a Product The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution. This clause forecloses yet another class of license traps. 9. License Must Not Restrict Other Software The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software. Distributors of open-source software have the right to make their own choices about their own software. Yes, the GPL v2 and v3 are conformant with this requirement. Software linked with GPLed libraries only inherits the GPL if it forms a single work, not any software with which they are merely distributed. 10. License Must Be Technology-Neutral No provision of the license may be predicated on any individual technology or style of interface. This provision is aimed specifically at licenses which require an explicit gesture of assent in order to establish a contract between licensor and licensee. Provisions mandating so-called "click-wrap" may conflict with important methods of software distribution such as FTP download, CD-ROM anthologies, and web mirroring; such provisions may also hinder code re-use. Conformant licenses must allow for the possibility that (a) redistribution of the software will take place over non-Web channels that do not support click-wrapping of the download, and that (b) the covered code (or re-used portions of covered code) may run in a non-GUI environment that cannot support popup dialogues. The HubBucket Community focuses on the free and open collaboration between professionals, institutions, organizations, businesses, agencies, etc. The HubBucket Community is FREE to join. JOIN THE HUBBUCKET COMMUNITY If you are interested in joining the HubBucket Community, please complete click this link, http://hubbucket.xyz/community/ complete the form located on that page and submit it. The HubReview Journal is an online digitial journal that focuses on developments in science, technology, engineering, medicine, etc. The HubDispatch is an online digital journal that focuses on technology innovations in Healthcare, Health Information Technology - HealthIT/HIT, Health Technology - HealthTech, Medical Technology - MedTech, and related areas. Technology Solutions For Research Projects At HubBucket, we design and develop technology, applications, and systems that help save lives. In addition, we design and develop technology that will help save our planet for future generations. We use the word "help" because we know that without professionals (humans), technology, applications and systems cannot save lives and save our planet by themselves.
<urn:uuid:d175a1b2-fe9b-4600-a92c-49a4b7ad0240>
CC-MAIN-2019-22
http://hubbucket.xyz/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256887.36/warc/CC-MAIN-20190522163302-20190522185302-00502.warc.gz
en
0.919651
2,666
2.765625
3
‘Too close to home’: bats across the Island face a looming threat that has devastated bats elsewhere A deadly fungal disease has been identified just 100km away from the Island Want to know keep up-to-date on what's happening in Victoria? Subscribe to our daily newsletter: A deadly fungal disease has been identified just 100km away from the Island A pungent smell hit Janet Gray’s nose as she climbed into the attic of the Metchosin Community Hall. Dressed in overalls, masks and other protective gear, the Metchosin resident slowly stepped through the dark room with a small headlamp guiding her way. Tucked away in the rafters she spotted bats—hundreds of them. Turning around, she realized they were all around her. The grand display of nature living inside of a man-made structure wasn’t the only thing that took her breath away—the scent of guano caked all over the ground brought her back to reality. “That was my first time seeing a bat up close,” said Gray, who had spotted the hordes of bats flying past her home just weeks before in the summer of 2015. She ended up telling her friend who worked at Victoria’s Habitat Acquisition Trust (HAT), a land trust that conserves nature on the South Island. “The two of us went up there to investigate and discovered that it was a huge maternal colony. It’s such a special place, ‘cause that’s where the babies are born.” The small creatures were wrapped up in their wings and hanging upside down less than an inch apart. As it was in the middle of the day, most of the bats were fast asleep. According to HAT, there are around 1,500 bats living in the community hall alone. Over the following months, Gray and her friend from HAT would return to set up cameras to observe the bats for research purposes, install audio devices to hear their chirps, and clean up mounds of bat poop. But only a few years after this colony was discovered in Metchosin, the safe haven is under threat by a disease that has the potential to wipe out the majority of the bat population across southern Vancouver Island and the rest of the province for good. In February 2006, a bat was photographed in a cave nearby Albany, New York with white fuzz on its nose. The fuzz was a fungus, a deadly one that kills between 90 to 100% of bats it infects North America. Dubbed as white-nose syndrome (WNS), the fungus Pseudogymnoascus destructan latches itself onto a bat and the white fuzz spreads to its nose, ears, wings, and sometimes the tail too. WNS ends up chipping away at bats’ health, as they have to spend a chunk of their hibernation period awake, grooming the fungus to prevent it from spreading across their body. By doing this, the bats burn up fat that is needed to survive during the winter. If dehydration and starvation isn’t inevitable, the skin on their wings can get wrinkled, flaky, and thin and the fungus can cause respiratory problems. WNS can only be spread amongst bats and studies show the fungus only grows between 5 to 20°C. By 2016 the fungal disease was estimated to have killed more than six million bats in North America. Notably, bats across Europe and Asia are able to tolerate the fungus, in which they don’t end up killing entire colonies at a time. Although it can’t be traced back to an exact moment, researchers believe WNS was introduced to North American bats for the first time in New York, originating somewhere in Europe. After the initial sighting in 2006, WNS spread throughout the eastern half of North America’s bat population. By 2010, it had jumped the border, killing bats in southern Ontario and Quebec. But the alarm bells rang loud for BC bat researchers in 2016 when a local species, the little brown bat, was found infected with WNS in the Seattle area. When Mandy Kellner heard about the confirmed infected bat in Washington, her greatest fears inched closer to reality. “Bats move around and migrate; that’s a given,” says the provincial coordinator of the BC Community Bat program. “We thought we would have several more years to continue much-needed research as it spread from the East Coast, but it jumped over here quickly. It’s too close to home. It’s a real concern for bats on the southern part of the Island.” Since 2016, WNS has crept over to the city of Everett, which is 20 kilometres closer to Greater Victoria. Currently, the distance between the two cities is around 100 kilometres as the crow flies, (or rather the bat). In comparison, the confirmed case in Seattle was more than 2,000 kilometres from the previous western-most location, just the year before. Of all provinces and territories across Canada, BC has the most bat diversity, with 16 different identified species. Within the southern part of the Island, there are nine species of bats. Gray says Metchosin’s community hall is home to both Yuma bats and little brown bats, which have both been detected with WNS across the water in Washington. Experts say by 2026, little brown bats could be completely wiped out of eastern North America. In a 2013 study, researchers estimated the entire Canadian bat population would likely be infected within 12 to 18 years, as most species have a travel range of 200 to 250 kilometres per year. Kellner says they haven’t confirmed the spread of white nose syndrome in BC yet, but they are regularly testing bats for the disease. When it comes to a cure, there are preliminary findings that point to UV light as a means of damaging the deadly fungus. But there is still more research to be completed, as researchers have to understand any unintended effects the exposure may cause to live bats with WNS. Kellner admits she gets a good chuckle when people call her asking where they can move within the province to a place that doesn’t have bats. “I think we paint bats with a broad stroke,” she says. “There’s this sort of adverseness to being around bats because of a fear of rabies or COVID. I think a majority of it comes from the fear of the unknown.” Kellner points out that WNS cannot be spread from bats to humans, but rabies can. Even then, bats make up a sliver of rabies cases at all. According to WHO, dogs are the main source of human rabies deaths, with 99% of transmissions coming from them. Notably, WNS can be spread from humans to bats, as the fungus can be carried through spores on clothing or equipment. The best way to prevent these cross-contaminations is by avoiding bringing equipment or clothing from WNS hot-spots to places where BC bats naturally live, such as caves. Alternatively, if you find a dead bat, you’re asked to call 1-855-922-2287 and note the location, time, and day you found one. With paid membership, every penny goes directly to helping our newsroom continue its work and helps our team grow and expand our coverageBecome an Insider Kellner says educating people about what bats contribute to the ecosystem is still needed. She points out that on top of their guano being great fertilizer, bats are key predators for insects, including mosquitos, beetles and moths. In addition, bats are integral to the agricultural industry. According to a 2011 US study, bats are estimated to provide roughly $22.9 billion worth of “ecosystem services” to the agricultural industry every year, due to reduced costs of pesticides that aren’t needed to repel the insects that bats end up eating. Gray, who lives behind the Metchosin hall, says that she can’t recall seeing as much as a single mosquito since she moved into the neighbourhood decades ago. “When I first found out about the bats at the hall, I started asking around if anyone knew about them and soon found out that the residents wanted to keep it quiet,” Gray tells Capital Daily. “The community organizers didn’t want word getting out because they thought people would cancel their bookings for events at the hall. Luckily, the attic is completely blocked off from the rest of the hall, so there are no worries there. With help from HAT, we’ve really come together over the past few years. We’ve essentially become the guardians of these bats.” Every June, the BC annual bat count takes place across the province. One of them takes place at Metchosin Community Hall. There are one or two counts held in June before the pups are born, then another in late July to early August to count the pups that are starting to fly around. This is done to estimate the number of babies that were born to the local population. Last year, 15 counts were held across the Greater Victoria region. Gray has participated in most of the ones at the hall since it started in 2016, and says all you have to do is bring a camping chair, a tally counter (on your phone or physical), and a keen eye. Between 10 to 15 minutes after sunset, Gray says the bats begin flying out like clockwork. She compares the sound of the bats flying around to the light slapping of leather. Gray pointed out that residents have built and installed bat houses, which also can hold bats during the summer months. In late April, Wild Wise Society built 24 bat boxes, a makeshift home where bats can roost during the day, similar to the Metchosin community hall. Sam Webb, a spokesperson for Wild Wise, told Capital Daily the project was a joint effort with the Sooke Pathfinders to actively combat lost habitat areas for bats due to development in Sooke and the Westshore. The houses will be donated to the District of Sooke to hang out in parks for the annual bat count. “The whole thing is magical,” says Kellner. “There is so much anticipation in the air. It’s such a great opportunity to see something that you’ve never seen before.” From April to October, the bats will stay at the community hall. Then, when winter arrives, the bats will leave to hibernate in various parts of the province, from caves, to abandoned mines, or deep crevices in rocks. “It’s neat that the province is monitoring this situation, but it’s tough to watch,” says Gray, quietly. “There’s nothing that we can really do to stop [white nose syndrome] from coming this way. It’s so important to be aware of what we have even if we’re going to lose it.” Nonetheless, the Metchosin resident will eagerly await the upcoming bat count, holding out hope that the bats who call Metchosin community hall home will return once again from hibernation safe and sound. Want to find out more? Click to see where white-nose syndrome is spreading through North America in this interactive map.
<urn:uuid:5aed3621-fc3c-4321-aa3a-11337dc5c0ac>
CC-MAIN-2022-33
https://www.capitaldaily.ca/news/bats-vancouver-island-white-nose-syndrome
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00205.warc.gz
en
0.964153
2,376
2.9375
3
About the Species The white abalone belongs to a group of plant-eating marine snails that were once common in California. They once numbered in the millions off the California coast, but now they are endangered. Before the time of commercial fisheries, native people along California’s coast ate abalone for thousands of years. Large groups of abalone shells indicating human settlement, or “middens,” date back 7,400 years. Abalone shells were also traded along routes starting in southern California and reaching east of the Mississippi River. White abalone continue to live in the coastal waters of Southern California and Mexico. They are “broadcast spawners,” releasing eggs and sperm into the water by the millions when environmental conditions are right. Their strong, muscular “foot” allows them to hold tightly to rocks and other hard surfaces while their oval-shaped shells protect them from predators. Although fishing for white abalone has been illegal in California since 1997, the high price of abalone meat makes them a target of poachers. White abalone were listed as endangered under the Endangered Species Act in 2001, and were the first marine invertebrate to be listed. White abalone are one of NOAA Fisheries' Species in the Spotlight—an initiative that includes animals considered most at risk for extinction and prioritizes their recovery efforts. The black abalone is also listed as endangered under the ESA. NOAA Fisheries is dedicated to conserving and restoring white abalone. Our scientists use innovative techniques to study, protect, and restore their population. We also work with our partners to ensure that regulations and management plans are in place to reduce poaching and increase the wild abalone population. Commercial fishing has severely reduced white abalone numbers from historical levels. Surveys in southern California show a 99 percent decrease in the number of white abalone since the 1970s. While there were once millions, the current population is about 1,600 to 2,500 individuals. One well-studied population of white abalone in southern California decreased by about 78 percent between 2002 and 2010 (from about 15,000 individuals to just 3,000). California’s closure of the white abalone fishery in 1997 may have slowed the animals’ decline, but likely not by enough to recover the population. The species now faces threats from low breeding rates and disease. For example, if that well-studied population in southern California is left alone, it will likely continue to decrease by about 10 percent per year. But, while white abalone are close to extinction, efforts to breed them in captivity and reintroduce them to the wild could help the species recover. - Throughout Its Range White abalone have a thin, oval-shaped shell. The shell has a row of holes used to breathe, remove waste, and reproduce. The bottom of its foot—the muscle it uses to move and adhere to rocks—is orange. It also has a tan-orange epipodium, an extension of the foot with tentacles used to sense the surrounding environment. Behavior and Diet Abalone are slow-moving bottom dwellers. They attach to rocks and other hard surfaces using their muscular foot and, when disturbed, they become difficult or impossible to remove. An abalone can also use its foot to move across surfaces. Adults eat different types of algae. They can catch kelp drifting along the seabed or eat kelp still attached to rocks. The reddish-brown color of their shells shows that white abalone eat some types of red algae throughout their lives. Where They Live White abalone live on rocky substrates alongside sand channels, which tend to accumulate the algae they eat. They are usually found at depths of 50 to 180 feet, making them the deepest living abalone species. Historically, white abalone were found in the Pacific Ocean from Point Conception, California, to Punta Abreojos, Baja California, in Mexico. In California, they were most abundant at offshore islands (especially San Clemente and Santa Catalina Islands) and submerged banks (primarily Tanner and Cortes Banks). At the southern end of the range in Baja California, white abalone were often reported along the mainland coast, but were also found at many islands, including Isla Cedros, Isla Natividad, and Isla Guadalupe. Today, researchers have found extremely low numbers of white abalone along the mainland coast of southern California, and at a few of the offshore islands and banks. The status of the species in Mexico remains largely unknown. While there is little or no recent information from Baja California, commercial fishery data suggest that the population there is also depleted. Lifespan & Reproduction White abalone live about 35 to 40 years. Adults become sexually mature in the wild when they are four to six years old. Abalone reproduce by broadcast spawning—releasing their eggs and sperm into the water. This means fertilization succeeds more often when groups of adult male and female abalone are close to each other when they spawn. Fertilized eggs hatch into larvae, which settle and grow into juveniles and adults. Due to their unique mating habits, white abalone can be depleted by intense fishing that targets groups of animals. Commercial and recreational harvest of white abalone in California peaked in the 1970s, decreased in the late 1970s to early 1980s, and closed in 1997. The fishery used size limits and seasons to reduce the number of abalone caught. Even with these protections, the fishery greatly decreased the abalone populations and has had long-term effects on their recovery. Low Reproduction Rates The most significant threat to white abalone recovery is low reproduction rates. One female abalone can release as many as 10 million eggs at a time—but unless the eggs come in contact with sperm from spawning males, they cannot be fertilized. With their low population, abalone are often found alone, without potential mates nearby. This makes spawning in the wild unlikely or impossible. Wild abalone have produced few offspring since the late 1960s/early 1970s. Studies have found that abalone mortality exceeds reproduction in the wild. In a review of the status of white abalone in 2000, scientists estimated that the remaining wild white abalone would disappear without help from humans. Abalone are also threatened by disease. Withering syndrome, one common type of infection, is a fatal disease that affects the digestive organs of abalone. The pathogen that causes it is currently present in the coastal oceans of southern California. No wild white abalone have been found to have the fatal symptoms of withering syndrome, but captive abalone have died from the disease and wild white abalone are known to carry the pathogen that causes it. Although disease was not a threat to abalone in the past, withering syndrome now threatens the recovery of this species. In the Spotlight The white abalone is one of NOAA Fisheries' Species in the Spotlight. This initiative is a concerted, agency-wide effort launched in 2015 to spotlight and save the most highly at-risk marine species. White abalone are plant-eating marine gastropods (similar to snails and slugs) that live on rocky parts of the sea floor. Of the seven species of abalone that occur off the West Coast of North America, white abalone are the closest to extinction. White abalone were once plentiful along the coasts of California and Baja California, Mexico, but the population has declined rapidly. This decline was largely due to the operation of a brief, but intense commercial fishery in southern California prior to the 1980s. All abalone fisheries have been closed since 1997, but unfortunately the white abalone populations have not recovered as expected. NOAA Fisheries listed white abalone as endangered under the Endangered Species Act in 2001. The rapid decline and dire status of the white abalone population makes it a priority for focusing efforts within NOAA Fisheries and with our partners to stabilize and prevent the extinction of this unique species. To aid the recovery of white abalone, NOAA Fisheries formed a team of scientists and stakeholders to assist with developing a white abalone recovery plan which was finalized in October 2008. Development of the plan relied upon scientific studies and other sources of information to establish specific criteria that would indicate the recovery of these animals. Species in the Spotlight Priority Actions We developed a Species in the Spotlight 2021–2025 Priority Action Plan for white abalone that builds on the recovery plan and the 2016–2020 Priority Action Plan and details the focused efforts that are needed over the next five years. The plan lists key actions NOAA Fisheries and its partners can take from 2021 to 2025 to help recover the species. These actions include: - Improve reproductive output and maximize survival of captive-bred animals - Expand conservation aquaculture capacity to reach production goal of 10,000 to 25,000 juveniles for outplanting per year through 2025 - Expand outplanting and monitoring programs in the wild - Develop a shared database for recovery partners - Develop a comprehensive, multi-institution outreach approach In our first five years of the Species in the Spotlight initiative, we have: - Expanded partnerships to support the captive breeding program - Increased captive production by several orders of magnitude: from thousands to millions over the last two years - Implemented the first experimental outplant of juvenile white abalone to the wild—release of approximately 4,200 juveniles - Developed a plan to continue outplanting approximately 9,600 abalone per year through 2024, for a total of more than 51,000 - Expanded research and outreach partnerships with Mexico - Refined and expanded habitat monitoring to identify future outplanting sites These actions will help NOAA Fisheries, other federal and state resource agencies, environmental organizations, and other partners to stop the decline of white abalone and promote their recovery. Watch scientists outplanting captive-bred white abalone in their native waters of Southern California: 2017 Species in the Spotlight Hero Award Dr. Kristin Aquilino has played an instrumental role in shaping the captive breeding program for white abalone. Kristin manages the program—charged with rebuilding the declining populations of wild abalone—at the University of California, Davis Bodega Marine Laboratory. 2019 Partner in the Spotlight Award Amanda Bird, founder of the Paua Marine Research Group, has played an instrumental role in advancing field-based methods to restore white abalone populations in the wild throughout the Southern California Bight. In 2013, as part of her Master's program at California State University, Fullerton, Amanda focused on assessing the population status of Southern California pinto abalone. Pinto abalone are closely related to white abalone. During her thesis research, Amanda worked closely with NOAA Fisheries on white abalone recovery efforts. White abalone are protected under the Endangered Species Act. NOAA Fisheries has dedicated significant resources to monitoring and rebuilding their populations. We have developed a captive breeding program and routinely monitor the status and habitats of wild abalone in California. Recovery Planning and Implementation The ESA requires NOAA Fisheries to develop and implement recovery plans for the conservation and survival of listed species. Our plan for white abalone seeks to help them thrive, allowing them to be reclassified from “endangered” to “threatened” and ultimately removed from the list of protected species. The plan recommends five major actions: - Monitor populations and their habitat in the wild - Protect populations and their habitat in the wild - Use a captive breeding program to enhance wild populations - Develop an enforcement, public outreach, and education plan - Get financial support for white abalone recovery Together with our partners, we undertake many activities to support the goals of the white abalone plan. The goal is to increase the wild white abalone populations in California and Mexico to self-sustaining levels. Efforts to conserve white abalone include: - A captive breeding program - Pilot outplanting to establish and enhance wild populations - Monitoring the wild population and its habitat use - Public outreach and education Captive Breeding Program NOAA Fisheries and its partners have developed a captive breeding program to produce young abalone that can be reintroduced into the wild, in hopes to protect white abalone from extinction. Our West Coast Region coordinates the captive breeding program in close partnership with the University of California at Davis’ Bodega Marine Laboratory and in partnership with several other facilities throughout California. Once the captive-bred abalone are old enough, researchers will release them into the wild. These captive-bred abalone will grow and become a part of the remaining wild population, where they will hopefully improve the spawning success and be incorporated into healthy, self-sustaining populations. The Bodega Marine Laboratory oversees the captive breeding program. The program’s first successful spawning attempt in more than a decade occurred in 2012 at the Aquarium of the Pacific and at the University of California, Santa Barbara. The program has successfully raised white abalone and increased the number of individuals raised in captivity each year since 2012. Captive breeding efforts by current and future partners are expected to produce hundreds of thousands of animals that are ready to be reintroduced to the wild over the next 5 to 15 years. NOAA Fisheries is working closely with its partners to reduce disease risks for captive-bred abalone and to develop tools for increasing the survival of captive-bred abalone once reintroduced to the wild. NOAA Fisheries and its partners have begun experimental outplanting of white abalone to the wild. In November 2019, captive-bred juvenile white abalone were released for the first time into coastal waters off southern California. Since then, additional juveniles have been outplanted and monitored to assess their survival, movements, and growth over time. The lessons learned from these experimental outplantings will guide future, large-scale efforts to restore white abalone and bring this species back from the brink of extinction. Monitoring the Wild Population Researchers monitor wild white abalone habitats to track population trends over time. We work with our partners on the monitoring program in southern California. These surveys help us assess the recovery of wild white abalone populations and will help us determine whether our captive breeding program is working. We monitor the distribution, abundance, and behavior of white abalone using remotely-operated vehicles (ROVs), SCUBA, acoustic telemetry, and time lapse cameras. We steadily improve our methods for surveying populations and studying their movements, and are developing genetic techniques to track individual animals. We are also helping abalone health specialists monitor for the pathogen that causes withering syndrome in southern California waters and study the risks that healthy abalone face when they come in contact with the pathogen. Continuing and expanding our monitoring program will help the species by: - Providing data needed to measure long-term population trends. - Finding signs of disease so that we can avoid mortality in the captive breeding program. - Developing tools to identify white abalone in the wild and determine whether they are captive-bred or wild-bred. - Understanding factors that affect white abalone survival, growth, and reproduction. - Synthesize available information to improve abalone conservation efforts. Public Outreach and Education NOAA provided funding and guidance to create an interactive exhibit about white abalone at the Aquarium of the Pacific. We also supported "Get Inspired," a local non-profit organization, in creating a classroom abalone program and curriculum. Many high school classrooms in Orange County, California currently culture abalone through this program. Commercial fisheries severely reduced white abalone numbers from historical levels. The state of California closed the white abalone fishery in 1996, then closed all abalone fisheries in central and southern California in 1997. The same year, we designated the white abalone as a candidate for listing under the Endangered Species Act from central California to Baja California, Mexico. After completing a comprehensive status review of the species, we listed white abalone as an endangered species under the Endangered Species Act in 2001. We assessed but did not designate critical habitat to protect the location of remaining wild white abalone populations. NOAA Fisheries published the White Abalone Recovery Plan in 2008 to identify actions that would protect the species. In addition, we have taken steps to rebuild the population including: - Development of a captive breeding program to reintroduce white abalone into the wild - Release of captive-bred white abalone into the wild to establish and enhance populations - Monitoring wild abalone populations and their habitat use Key Actions and Documents NOAA Fisheries conducts research on the biology, behavior, and ecology of the white abalone. The results are used to inform management decisions and enhance recovery efforts for this species. Along with NOAA Fisheries, many groups—both in the United States and in other countries—are working to help save the white abalone. Among them are Channel Islands National Park, the California Department of Fish and Game, and El Centro de Investigación Científica y de Educación Superior de Ensenada (CICESE; Baja California, Mexico). White Abalone Restoration Consortium The White Abalone Restoration Consortium is made up of many groups, all working towards expanding scientific knowledge of white abalone and increasing public awareness. Scientists, fishermen, conservation organizations, universities, federal and state agencies, and private organizations are working together to: - Locate white abalone in the wild by surveying their natural habitat. - Collect abalone from the wild to support a captive breeding program. - Breed and raise new generations of young abalone. - Enhance populations of white abalone that can reproduce on their own in the wild. Our scientists are working to learn more about which habitats are best suited to white abalone. We use remotely operated vehicles, SCUBA, seabed-mapping sonars, and computer models to study abalone habitats in great detail. Those details let us narrow down the wide variety of habitat features important to white abalone. We also collect information on general habitat features like depth and algal types, which could help predict the presence of white abalone in unexplored areas. These surveys help ensure that conservation efforts focus on areas most likely to support healthy white abalone populations. The Species in the Spotlight initiative is a concerted agency-wide effort to spotlight and save… The summary and evaluation of progress to date on recovery implementation of White abalone In 2015, NOAA Fisheries announced a new program to focus and redouble our efforts to protect eight…
<urn:uuid:35f68991-4ba3-4999-9029-2570c241c95a>
CC-MAIN-2022-33
https://www.fisheries.noaa.gov/species/white-abalone/spotlight
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00605.warc.gz
en
0.92841
3,970
3.90625
4
More Than Just Hypertension Major links to other conditions. Hypertension does not just occur on its own, it is a symptom of multiple underlying health conditions including inflammation, oxidation and acidosis. As a result, it is associated (Comorbid) with many other health conditions. That is if you have hypertension, you are more likely to have any number of these conditions and visa-versa if you have any one of these conditions you are more likely to have hypertension. So if you have hypertension you are at increased risk of dozens of other health conditions. Not to mention cardiovascular conditions like elevated cholesterol and blood lipids. These are some of the conditions linked directly with hypertension - Metabolic syndrome (diabetes 2 etc) - Multiple cancers - Bone health including osteopenia, osteoporosis and bone fractures - Autoimmune conditions including arthritis - Diabetes 1 - Asthma and other allergies - Reflux and other gut health issues - Alzheimer’s and other forms of dementia, - Mental health including depression, anxiety and stress For example Hypertension is associated with a 76% increase risk for vertebral fractures. While hypertension in patients with autoimmune diseases is also significantly increased and the fact the immune system in primary hypertension mimics several autoimmune mechanisms observed in many autoimmune conditions such as systemic lupus erythematosus, psoriasis, systemic sclerosis, rheumatoid arthritis and periodontitis. Hypertension is present in approximately one third of patients with type 1 diabetes, especially in men and the risk of renal (kidney) cell cancer is 2-4 times higher for persons with hypertension. Each 10-mmHg increase in blood pressure is associated with 10 and 22% increased risk of kidney cancer. It is also associated with a higher risk of colorectal, prostate cancer and malignant melanoma. So which one of these will you treat. Following the medical model it is not uncommon for many people to be on more than a dozen drugs to treat all the various symptoms. Interestingly, using drugs to lower hypertension may have a positive impact on some of the conditions it also has been shown to have a negative impact on other ones. The answer lies not in treating hypertension symptoms but in treating the underlying causes of hypertension and all these other conditions. Literally thousands of studies have shown the benefits of diet and lifestyle factors on hypertension but they never get into the news. The Truth About Blood Pressure Medications: Side Effects Over the past 35 years, patients have suffered from a largely hidden epidemic of side effects from drugs that usually have few offsetting benefits. The pharmaceutical industry has corrupted the practice of medicine through its influence over what drugs are developed, how they are tested, and how medical knowledge is created and even marketed. While they continue to exaggerate the potential benefits and grossly under recognise the side effects and negative consequences. As a result pharmaceutical medicines are now recognized as one of the major causes of illness and mortality around the world. Meeting the needs of the drug companies has taken priority over meeting the needs of patients. Harms of BP medications are very real, but not as well documented in trials as benefits, in fact it often takes decades for many of the side effects to be identified. In one study for example a total of 238 patients were randomized to be treated with two different drugs, 115 given irbesartan and 123 enalapril. While BP reductions were similar in the 2 groups (DBP, 12.7 mmHg irbesartan vs 12.4 mmHg enalapril; SBP, 19.0 vs 17.5 mm Hg). The overall incidence of adverse events (40.0% irbesartan, 51.2% enalapril) was not statistically different between groups. That is, 40% using one drug reported side effects and more than 50% using the other drug reported side effects. Unlike nutritional approaches which can be just as effective and which we show people have ZERO negative side effects. Another study found 34.5% of surveyed people stopped taking the drugs but a huge 85% of the participants experienced side effects over a 12 month period. WOW. And they still sell these drugs? However, even in short term studies roughly 10% of the trial populations stop a drug due to immediate intolerability. Types of side effects vary between antihypertensive classes, including some that can be severe and many of these side effects are dose related, so the more or longer you take them the worse the side effects. While there are literally thousands of studies on the different side effects from the different BP drugs here are a few major concerns I found in a 5 minute search. Yes just 5 minutes. Antihypertensive drugs increase the fall risk and therefore risk of major injury, particularly for elderly patients which is probably more dangerous than having high blood pressure. As a result perhaps we should not be giving them to the elderly? Another study cohort (78,615 men) showed the use of antihypertensive drugs led to a 16% increased prostate cancer risk. And a 36% increased risk of metastatic (more deadly spreading) prostate cancer. ACE inhibitors, beta-blockers (10% increased), and diuretics (14% increased) excess risk. So perhaps we should not be giving them men? While for women current use of any antihypertensive medication was associated with an 18% increased risk of ovarian cancer compared to never users. Mostly from thiazide diuretics which had a 37% increased risk and the associations were stronger for longer use of thiazide diuretics and Calcium Chanel Blockers. So perhaps we should not be giving them to women? Using Calcium Channel Blockers was also associated with a 13% increased risk of lung cancer when compared with the use of other antihypertensive drugs. With risks increasing with longer people took these drugs. The increased risk for less than 5 years was 12%; 5-10 years: 22%; and taking the drugs for more than 10 years a whopping 33% increased risk. In another study investigating just the side effects on the skin, Beta blockers, they reported the triggering and exacerbation of psoriasis, psoriatic and rheumatoid arthritis, anaphylaxis, contact dermatitis, occupational contact dermatitis, Raynaud’s disease, alopecia, lichen planus-like drug eruption, hyperhydrosis and vitiligo. Not to mention that patients with hypertension usually report lower health-related quality of life (HRQoL). Participants with hypertension and not using BP drugs had higher HRQoL scores than those using BP drugs either with uncontrolled or controlled BP. Individuals with hypertension have worse quality of life, particularly when their BP is controlled by drugs. The answer lies not in treating hypertension symptoms with drugs with deadly side effects but in treating the underlying causes of hypertension and all these other conditions. Literally thousands of studies have shown the benefits of diet and lifestyle factors on hypertension but they never get into the news. For example more than 10000 studies show you can lower blood pressure naturally and in many cases as effective as any medication, with only positive side effects and at the same time fixing the underlying problems and conditions. I know as I have reviewed more than 1000 studies to create The Complete hypertension solution which is now available in our membership or as a stand alone Masterclass which includes all our other Master Classes for just $20 more. You can lower your blood pressure naturally and improve all the other health conditions related to it. References Part 3 and Part 4 Geriatr Gerontol Int. 2012 Apr;12(2):330-5. doi: 10.1111/j.1447-0594.2011.00775.x. Epub 2011 Nov 28. Breast arterial calcification and hypertension associated with vertebral fracture. Wada H1, Hirano F, Kuroda T, Shiraki M. Radic Biol Med Actions. 2018 Sep;125:104-115. doi: 10.1016/j.freeradbiomed.2018.05.085. Epub 2018 May 30. Hypertension: Focus on Autoimmunity and Oxidative Stress Heather Y Small 1 , Serena Migliarino 1 , Marta Czesnikiewicz-Guzik 2 , Tomasz J Guzik 3 DOI: 10.1016/j.freeradbiomed.2018.05.085 Curr Hypertens Rep . 2019 Feb 2;21(1):10. doi: 10.1007/s11906-019-0914-2. Autoimmune Disease-Associated Hypertension Victoria L Wolf 1 , Michael J Ryan 2 3 PMCID: PMC6394456 DOI: 10.1007/s11906-019-0914-2 J Diabetes Complications Actions. Jul-Aug 2011;25(4):232-6. doi: 10.1016/j.jdiacomp.2011.03.006. Epub 2011 May 20. Insulin Resistance and Hypertension in Patients With Type 1 Diabetes Juan J Chillarón 1 , María P Sales, Juana A Flores-Le-Roux, Jesús Murillo, David Benaiges, Ignasi Castells, Albert Goday, Juan F Cano, Juan Pedro-Botet PMID: 21601483 DOI: 10.1016/j.jdiacomp.2011.03.006 Br J Clin Pharmacol Actions. 2018 Apr;84(4):776-785. doi: 10.1111/bcp.13482. Epub 2018 Jan 25. Undertreatment of Hypertension and Hypercholesterolaemia in Children and Adolescents With Type 1 Diabetes: Long-Term Follow-Up on Time Trends in the Occurrence of Cardiovascular Disease, Risk Factors and Medications Use Fariba Ahmadizar 1 , Patrick Souverein 1 , Anthonius de Boer 1 , Anke H Maitland-van der Zee 1 2 PMCID: PMC5867118 DOI: 10.1111/bcp.13482 Medicina (Kaunas) Actions. 2016;52(2):89-98. doi: 10.1016/j.medici.2016.03.002. Epub 2016 Mar 10. Hypertension, Serum Lipids and Cancer Risk: A Review of Epidemiological Evidence Ričardas Radišauskas 1 , Irena Kuzmickienė 2 , Eglė Milinavičienė 3 , Rūta Everatt 2 DOI: 10.1016/j.medici.2016.03.002 J Hypertens . 2017 Jul;35(7):1333-1344. doi: 10.1097/HJH.0000000000001286. Blood Pressure and Kidney Cancer Risk: Meta-Analysis of Prospective Studies Khemayanto Hidayat 1 , Xuan Du, Sheng-Yi Zou, Bi-Min Shi DOI: 10.1097/HJH.0000000000001286 Ups J Med Sci Actions. 2018 Jun;123(2):109-115. doi: 10.1080/03009734.2018.1473534. Epub 2018 Jun 18. Positive Association Between Hypertension and Urinary Bladder Cancer: Epidemiologic Evidence Involving 79,236 Propensity Score-Matched Individuals Victor C Kok 1 2 , Han-Wei Zhang 3 4 5 , Chin-Teng Lin 6 7 , Shih-Chung Huang 8 , Ming-Feng Wu 9 PMCID: PMC6055751 DOI: 10.1080/03009734.2018.1473534 Epidemiology Actions. 2011 Nov;22(6):797-804. doi: 10.1097/EDE.0b013e3182300720. Hypertension and Risk of Renal Cell Carcinoma Among White and Black Americans Joanne S Colt 1 , Kendra Schwartz, Barry I Graubard, Faith Davis, Julie Ruterbusch, Ralph DiGaetano, Mark Purdue, Nathaniel Rothman, Sholom Wacholder, Wong-Ho Chow PMCID: PMC3188386 DOI: 10.1097/EDE.0b013e3182300720 Medicine (Baltimore) . 2015 Apr;94(16):e753. doi: 10.1097/MD.0000000000000753. Hypertension and Subsequent Genitourinary and Gynecologic Cancers Risk: A Population-Based Cohort Study =Li-Min Sun 1 , Huang-Tsung Kuo, Long-Bin Jeng, Cheng-Li Lin, Ji-An Liang, Chia-Hung Kao PMCID: PMC4602691 DOI: 10.1097/MD.0000000000000753 JAMA Intern Med. 2014 Apr;174(4):588-95. PMID: 26643686 PMCID: PMC5863783 DOI: 10.1093/ajh/hpv185 . Tinetti ME, Han L, Lee DS, et al. Antihypertensive medications and serious fall injuries in a nationally representative sample of older adults. Scand J Urol . Oct-Dec 2018;52(5-6):321-327. doi: 10.1080/21681805.2018.1559882. Epub 2019 Jan 30. Antihypertensive Drugs and Prostate Cancer Risk in a Finnish Population-Based Cohort Aino Siltari 1 2 , Teemu J Murtola 2 3 4 , Kirsi Talala 5 , Kimmo Taari 6 , Teuvo L J Tammela 2 3 , Anssi Auvinen 7 DOI: 10.1080/21681805.2018.1559882 Int J Cancer . 2016 Jul 15;139(2):291-9. doi: 10.1002/ijc.30066. Epub 2016 Mar 25. Hypertension, Use of Antihypertensive Medications, and Risk of Epithelial Ovarian Cancer Tianyi Huang 1 2 , Elizabeth M Poole 1 , A Heather Eliassen 1 2 , Olivia I Okereke 1 2 3 , Laura D Kubzansky 4 , Anil K Sood 5 , John P Forman 1 6 , Shelley S Tworoger 1 2 PMCID: PMC5105887 DOI: 10.1002/ijc.30066 Ann Pharmacother Actions. 2019 May;53(5):445-452. doi: 10.1177/1060028018814684. Epub 2018 Nov 15. Calcium Channel Blockers and the Risk for Lung Cancer: A Population-Based Nested Case-Control Study Victoria Rotshild 1 , Laurent Azoulay 2 , Ilan Feldhamer 3 , Amichai Perlman 1 , Mendel Glazer 4 , Mordechai Muszkat 5 , Ilan Matok 1 DOI: 10.1177/1060028018814684 Exp Ther Med . 2019 Aug;18(2):955-959. doi: 10.3892/etm.2019.7504. Epub 2019 Apr 18. Immunologic Adverse Reactions of β-Blockers and the Skin Alin Laurentiu Tatu 1 , Alina Mihaela Elisei 1 , Valentin Chioncel 2 , Magdalena Miulescu 3 , Lawrence Chukwudi Nwabudike 4 PMCID: PMC6639944 DOI: 10.3892/etm.2019.7504 J Hum Hypertens Actions. 2012 Jun;26(6):374-80. doi: 10.1038/jhh.2011.48. Epub 2011 May 19. Health-related Quality of Life Is Worse in Individuals With Hypertension Under Drug Treatment: Results of Population-Based Study D J Trevisol 1 , L B Moreira, F D Fuchs, S C Fuchs Dr Dingle is one of Australia’s leading researchers, educator and communicator. He was an Associate Professor and leading researcher in Health and the Environment and is passionate about common sense and sustainable health approaches. Don’t miss the chance to get our 30 Days to Greater Self Love FREE 53 Page e Book with Work Sheets, Daily Tracker and Check List when you subscribe to our Magazine - FREE
<urn:uuid:066fd080-3f78-46fc-b248-69f6c530e9b3>
CC-MAIN-2022-33
https://consciouslivingmagazine.com.au/the-complete-hypertension-solution/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00004.warc.gz
en
0.845246
3,448
2.71875
3
When, Why and How did Marijuana Become Illegal? Last updated March 7-2019 Published April 18-2017 https://www.cannabis.info/en/blog/when-why-how-become-illegal These days the US and other countries are changing the legislation governing the legality of cannabis. But, as our society begins to change its opinions on cannabis, many people wonder why weed was made illegal in the first place. There are a lot of theories out there on the different factors that lead the US government to enforce prohibition. If you’re a nut for conspiracy theories, feel free to Google “why is weed illegal;” we guarantee you’ll have more than enough to keep you busy for at least a few days. When did Marijuana Become Illegal in the US? Restrictions on cannabis use for medical, recreational, and industrial reasons took off in most states in the US from around 1906. Prior to this, cannabis was being used to produce medical tinctures or industrial products like fiber, for example. Recreational cannabis use was also relatively popular from around 1850 onwards, with oriental-style hashish bars to be found in most major cities in the US. The major restrictions on cannabis came to be enforced through poison laws such as the Pure Food and Drug Act, passed by Congress in 1906. This law required certain drugs, including cannabis, to be accurately appropriately labeled. From there on out, individual states began to pass their own laws regarding specific labeling of drugs such as cannabis. For example, further regulations regulating the sale of cannabis and cannabis- derived products followed in Massachusetts in 1911, and in New York and Maine in 1914. In 1925 the US officially supported the the regulation of Indian Hemp (essentially THC-rich cannabis) at the International Opium Convention. The convention restricted the exportation of Indian hemp and any derivative products (such as hashish) to countries that had already banned the substance. By 1930, the US formed the Federal Bureau of Narcotics as a push to outlaw and control recreational drugs. The bureau was lead by Harry J. Anslinger who, as we’ll see, is often crowned the father of cannabis prohibition in the US. (Humph! The same old story of a bureaucrat attempting to justify his existence! ALL too familiar! ~ Don) In 1932, the US passed the Uniform State Narcotic Act, which basically called for all states to unite in their front against the traffic of narcotic drugs and manage trafficking under uniform laws. By the mid 30s, all US states had enforced some kind of regulation on cannabis. The possession or transfer of marijuana for recreational uses officially became illegal across the US under federal law in 1937 under the Marijuana Tax Act. In 1970, the Tax Act was replaced by the Controlled Substances Act, which officially listed controlled under 5 different schedules based on their danger and risk of addiction, with Schedule I substances deemed the most dangerous and addictive. Cannabis was listed as a Schedule I drug. Schedule I substances are described to possess a high potential for addiction, no currently accepted medical uses, and completely unsafe. Why Was Marijuana Criminalized? This is where theories get very interesting and complex. Harry J. Anslinger, the head of the US Federal Bureau of Narcotics, is often noted as one of the pivotal members in cannabis prohibition in the US. Anslinger held his position as commissioner of the bureau for 32 years (until 1962) and also served U.S. Representative to the United Nations Narcotics Commission for 2 years. Prior to his role at the bureau, Anslinger also served as the head of Department of Prohibition in Washington, D.C. According to Johann Hari, author of the book “Chasing The Scream: The First and Last Days of the War on Drugs,” Anslinger began his focus on cannabis after alcohol prohibition ended in 1933. Up until this point, Anslinger allegedly said he saw no problem with cannabis, mainly as it didn’t hurt anyone nor make anyone violent. However, Anslinger quickly changed his mind, noticing that (according to Hari) he was in charge of a huge department with nothing to do. So, Anslinger quickly came to warn people about the effects of cannabis; first it would throw you into a delirious rage; then you’d suffer from erotic dreams/hallucinations, before finally reaching the inevitable endpoint: insanity. He was quite known for his ridiculous and racist quotes on cannabis and cannabis users. Anslinger’s go-to case to demonstrate the power of the “devil’s weed” was that of Victor Licata, a boy from Florida who hacked his family to death with an axe. This case, combined with a statement from 1 doctor that cannabis was dangerous (out of 30 Anslinger contacted, 29 who apparently answered “no”), would go on to be Anslinger’s fuel to instill fear in the hearts of all Americans about the power of “the demon weed.” In 1936, the bureau noticed an increase in the use of marijuana. This increase continued growing by 1937. At This point, Anslinger launched a campaign against cannabis (Reefer Madness!), leveraging media mogul William Randolph Hearst’s newspaper empire to demonize the cannabis plant. By 1937, cannabis officially became an illegal substance across the US under the Marijuana Tax Act. The Effect of Mexican Immigration on Marijuana Prohibition In an article on drugpolicy.org, Dr. Malik Burnett and Amanda Reiman propose an interesting argument on how Mexican immigration affected the move to marijuana prohibition in the early 1900s. While we won’t explore Burnett and Reiman’s argument in full detail, we’ll summarize it here because we think it raises a very interesting point. The Mexican Revolution was a violent struggle that took place from roughly 1910-1920 and radically changed Mexican culture and government. The revolution lead to a large influx of immigrants to the US, especially into states like Texas and Louisiana, who brought with them new customs and cultures. One of those customs was the use of cannabis, which Mexicans referred to as “marihuana.” As the media began to demonize the large wave of Mexican immigrants (as seems to be habitual in many countries when they’re faced with a sudden influx of foreign people), the fact that Americans didn’t know what “marihuana” was came in super handy. In essence, Burnett and Reiman argue that the demonization was really an extension of the demonization of Mexican people who came to the US escaping the challenges in their own country. This tactic was nothing new; the same thing happened in the US, Australia, and many other nations when Chinese immigration hit. The only difference was that the Chinese were demonized for bringing opium with them rather than cannabis. Marijuana Prohibition Around the World Cannabis laws vary from country to country. However, cannabis became illegal in most nations in 1925 after the International Opium Convention, a follow up to the first convention signed in 1912 at the The Hague in The Netherlands. The convention of 1912 essentially served as the first international drug control treaty and was particularly concerned with the growing trade and use of opium. It was signed by Germany, the United States, China, France, the United Kingdom, Italy, Japan, the Netherlands, Persia, Portugal, Russia, and Siam. A revised International Opium Convention was then held in 1925 in Geneva, Switzerland. At this convention, Egypt, China, and The US suggested a prohibition on hashish be added to the text of the treaty, which was previously mainly concerned with cocaine and opium. A sub-committee suggested expanding the text to prohibit the production, sale, and trade of charas hashish, and various other products derived from cannabis, while restricting the use of Indian hemp strictly for scientific and medical purposes. India and a few other countries, however, objected to this, arguing that due to various social and religious customs as well as the prevalence of wild cannabis would make it difficult to enforce these restrictions. Hence, this text never made it into the final treaty, However, the exportation of Indian hemp was banned to any country where it has been illegalized. Any countries wishing to import Indian hemp had to demonstrate that its use was strictly for medical or scientific purposes. Meanwhile, all nations were expected to do their best to prevent the international trade of indian hemp and products such as hashish. In 1961, the Convention was effectively replaced by the Single Convention on Narcotic Drugs, which became the first international treaty to officially prohibit cannabis. Held and signed in New York City, this treaty broadened the effects of those before it to control and restrict new opioid drugs and broaden the scope on cannabis. The Convention gave the Commission on Narcotic Drugs and the World Health Organization the power to add, remove, and transfer drugs between four different schedules established by the treaty. Meanwhile, the International Narcotics Control Board was put in charge of administering controls on drug production, international trade, and dispensation, and the United Nations Office on Drugs and Crime (UNODC) was delegated to work with individuals countries and their authorities to ensure compliance with the convention. So, there you have it; a detailed look at when, how and why cannabis became illegal in the US and around the world. Like we mentioned earlier, there are countless alternative theories on the reasons for prohibition floating around on the internet. If you’re interested in them, we trust a good old Google search will be enough to unearth at least the most popular ones. In this article, we’ve tried to provide you with a basic timeline of the events that lead to cannabis decriminalization. And, while cannabis is still a federally controlled substance in the US, we trust it won’t remain that way for much longer.
<urn:uuid:64d861d4-ada1-46af-9e70-70491f49e6a4>
CC-MAIN-2022-33
https://www.light-path-resources.org/when-why-and-how-did-cannabis-become-illegal/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00406.warc.gz
en
0.968844
2,058
2.984375
3
A new study published today reveals the suite of traits that ancient nomadic peoples selected to develop the type of horse that best fit their purposes Horses were probably first domesticated by the Botai culture roughly 5500 years ago, somewhere in the vast Kazakh Steppe that lies at the southern end of the Ural Mountains, that traditional dividing line between Europe and Asia. The Botai peoples were a true "horse culture" -- highly dependent upon horses, which allowed them to travel quickly and to conquer vast territories -- and in fact, they may have even provided the loanword for "horse" to the local language family. Nomadic Scythians (probably comprising groups of unrelated peoples that shared similar lifestyles, cultural practices and language), maintained herds of horses, cattle, and other livestock, lived in wagons covered by tents, and roamed widely throughout the central Asian steppes during the Iron Age. They were amongst the first peoples to master mounted warfare, and they developed exceptional equestrian skills as well as pioneering the use of the composite bow whilst riding. Historically and culturally, the influence of horses on these cultures was strong. This influence later expanded to encompass many civilizations and regions, and was particularly visible in cities and economies, starting in the 18th century through the early 20th century, before cars and other modes of transport replaced horse power. In short; horses had a lengthy and profound impact upon the development and progress of human civilizations. But how has the horse been affected by people? People have reshaped the horse through selective breeding and crossbreeding, as seen in other domestic animals and plants (more examples: here; here; and here). Human influence is captured in the genomes of modern horses in a number of ways: (i) extreme diversity in mitochondrial genomes, which contrasts sharply with a Y-chromosome that is virtually identical in all modern domestic horses; (ii) higher mutational loads than in wild horses from the Upper Paleolithic; and (iii) selection at genes involved in locomotion, physiology, development, and behavior (ref). Although we no longer depend upon them as we once did, people still influence horses by selecting for specific traits, which is obvious as both the horse racing and horse showing seasons are regaining their annual momentums throughout much of the Northern Hemisphere. This raises the question whether ancient horse people also selectively bred horses to fit their particular needs? If so, what traits were they selecting for? DNA from ancient horse fossils shows they were genetically diverse Surprisingly, well-preserved horse fossils are quite rare, so it has been difficult to study genetic changes occurring during that critical time period when horses were being transformed by domestication. But several remote archaeological sites do have rich grave goods -- particularly a number of exceptionally preserved ancient horses and their furnishings. To explore how domestication has altered modern horses, molecular archaeologist, Ludovic Orlando, a professor at the Natural History Museum of Denmark at the University of Copenhagen, and Research Director of the Anthropologie Moléculaire et Imagerie de Synthèse (AMIS) laboratory at University of Toulouse, and an international team of 33 scientists from 16 universities, sequenced and analysed the genomes extracted from a small piece of bone of 14 ancient horses excavated from three separate royal Scythian burial sites across the steppes (Figure 1A). These horse fossils were between 2,300-2,700 years old, and the sites included Arzhan, in the Tuva Republic, where over 200 horses have been excavated, also Berel', Kazakhstan, where no less than 13 horses were preserved in a single, permafrozen funerary chamber, and one 4,100 year-old mare from a site in Chelyabinsk, Russia, that belonged to the earlier Sintashta culture, which first invented two-wheeled chariots drawn by horses. "With the exception of two horses, none of the animals were related," said a co-lead author on the paper, horse geneticist, Pablo Librado, a post-doctoral researcher at the Centre for GeoGenetics at the Natural History Museum of Denmark, in a press release. This lack of inbreeding suggests that Scythian horse breeders maintained natural herd structures and did not breed a limited number of valued lineages. It also reveals that the sacrificed horses came from widely dispersed populations. "It fits with Herodotus' depiction of Scythian funerary rituals, whereby sacrificed horses represented gifts from allied tribes spread across the steppes," said Dr. Librado, noting that the horses excavated at Berel’ also wore a variety of harness ornaments. DNA analyses reveal a diversity of coat color patterns within Scythian horses, including bay, black, chestnut, cream and spotted animals (Figure 1A), indicating that stallions with a variety of coat-color patterns were used in elite funerals. Although they are widely viewed as warriors, the Scythians apparently were skilled horse breeders, too. For example, the team identified 121 genes selected by Scythian breeders, most of which are involved in the development of forelimbs. This indicates that Scythian breeders selected horses with strong legs. Many -- but not all -- of the ancient horses carried gene variants associated with speed -- the same gene variants found in present-day racehorses. But the Sintashta mare and four of the Scythian stallions were heterozygous for these genes and thus, probably were not as fast as racehorses. Further, the unexpected discovery of one gene in particular, the MSTN mutation that is associated with the enlarged muscles seen in modern racehorse sprinters, suggests that Scythian breeders were selecting animals with both speed and endurance. The team found that Scythian horses did not carry the DMRT3 "gait keeper" gene mutation that is responsible for alternate gaits, so these horses were neither natural, nor speedy, amblers. (The amble is a four-beat gait that is similar to a trot, slower than a canter and a gallop but faster than a walk.) Not surprisingly, the Scythians selected gene variants that minimize water loss, an advantage in the arid steppes where daily water sources are scarce -- gene variants that, coincidentally, promote horse milking, which has been a common practice throughout the region for longer than 5,500 years. Horses experienced a significant collapse in genetic diversity during the last 2,000 years Although it is interesting to learn about the phenotypes of ancient horses, such as the coat color patterns and whether they were gaited, the genomic data provide a sobering look at the genetic cost of domestication for horses. For example, it was recently discovered that a now-extinct lineage of wild horses existed in the Arctic until at least 5,200 years ago, and these animals significantly contributed to the genetic makeup of present-day domesticated horses (ref). Yet comparisons between genomes from Scythian horses and that ancient vanished lineage reveal that the Scythian horses shared more genetic diversity with the Arctic lineage than with modern domesticated horses. This shows that sometime within the past 2,000 years, equine genetic diversity collapsed. This loss of genetic diversity reflects ongoing changes in horse husbandry practices, which have moved towards maintaining fewer and fewer stallions, such that, today, almost all domesticated horses carry identical, or nearly identical, Y-chromosomes. "Many Y-chromosome haplotypes co-existed within Scythian horse populations," said co-lead author, anthropologist Cristina Gamba, who was a postdoctoral researcher at the Centre for GeoGenetics at the time of the study. "The first three millennia of horse domestication thus preserved a large diversity of male lineages. It only vanished within the last 2,000 years." This depletion of Y-chromosome diversity was mirrored by a significant accumulation of deleterious mutations in the genome of modern domesticated horses: both the Sintashta and Scythian horses had lower mutational loads than those seen in horses today. These findings directly challenge the idea that ancient horses were the product of a small number of stallions and a comparatively unlimited number of mares. They also highlight the severe reduction in the effective population size of modern horses. On a more fundamental level, this study provided evidence in support of the neural crest hypothesis, which is sort of a "grand unified theory" describing the domestication process. Basically, this hypothesis proposes that tamer animals also possess a suite of physical traits, such as smaller brains, diverse coat colors or patterns, curly tails or floppy ears, that can be selected for. The genomes of modern horses reveal the domestication secrets of ancient people It's interesting what can be learned about people by studying the genome of another closely-associated species -- horses, in this case. For example, by studying the domesticated horse genome, the authors have unveiled important features of Scythian funerary rituals. But most important, the authors provide evidence to revise our understanding of how Scythians managed and bred their horses -- practices that contrast sharply with contemporary horse husbandry. "In this study we wanted to go beyond the myth of Scythians being aggressive warriors, drinking the blood of their enemies in skull mugs," Professor Orlando said. "We wanted to reveal the many facets of the exceptional relationship that these people developed with their horses." Pablo Librado, Cristina Gamba, Charleen Gaunitz, Clio Der Sarkissian, Mélanie Pruvost, Anders Albrechtsen, Antoine Fages, Naveed Khan, Mikkel Schubert, Vidhya Jagannathan, Aitor Serres-Armero, Lukas F. K. Kuderna, Inna S. Povolotskaya, Andaine Seguin-Orlando, Sébastien Lepetz, Markus Neuditschko, Catherine Thèves, Saleh Alquraishi, Ahmed H. Alfarhan, Khaled Al-Rasheid, Stefan Rieder, Zainolla Samashev, Henri-Paul Francfort, Norbert Benecke, Michael Hofreiter, Arne Ludwig, Christine Keyser, Tomas Marques-Bonet, Bertrand Ludes, Eric Crubézy, Tosso Leeb, Eske Willerslev, Ludovic Orlando (2017). Ancient genomic changes associated with domestication of the horse, Science, 356 (6336):442-445. Published online on 27 April 2017 before print. doi:10.1126/science.aam5298 Pablo Librado, Antoine Fages, Charleen Gaunitz, Michela Leonardi, Stefanie Wagner, Naveed Khan, Kristian Hanghøj, Saleh A. Alquraishi, Ahmed H. Alfarhan, Khaled A. Al-Rasheid, Clio Der Sarkissian, Mikkel Schubert and Ludovic Orlando (2016). Review: The Evolutionary Origin and Genetic Makeup of Domestic Horses, Genetics, 204(2):423-434. doi:10.1534/genetics.116.194860 Mikkel Schubert, Hákon Jónsson, Dan Chang, Clio Der Sarkissian, Luca Ermini, Aurélien Ginolhac, Anders Albrechtsen, Isabelle Dupanloup, Adrien Foucal, Bent Petersen, Matteo Fumagalli, Maanasa Raghavan, Andaine Seguin-Orlando, Thorfinn S. Korneliussen, Amhed M. V. Velazquez, Jesper Stenderup, Cindi A. Hoover, Carl-Johan Rubin, Ahmed H. Alfarhan, Saleh A. Alquraishi, Khaled A. S. Al-Rasheid, David E. MacHugh, Ted Kalbfleisch, James N. MacLeod, Edward M. Rubin, Thomas Sicheritz-Ponten, Leif Andersson, Michael Hofreiter, Tomas Marques-Bonet, M. Thomas P. Gilbert, Rasmus Nielsen, Laurent Excoffier, Eske Willerslev, Beth Shapiro, and Ludovic Orlando (2014). Prehistoric genomes reveal the genetic foundation and cost of horse domestication, Proceedings of the National Academy of Sciences, 111(52):E5661-E5669. doi:10.1073/pnas.1416991111
<urn:uuid:1d21a74a-628b-47eb-b578-1dc1736a2103>
CC-MAIN-2022-33
https://www.forbes.com/sites/grrlscientist/2017/04/27/how-domestication-altered-the-horse-genome/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00004.warc.gz
en
0.924628
2,632
4.09375
4
Black American History Many of us grew up watching Westerns on TV and at the movies. Seldom did anyone other than a white person play the hero. Books and textbooks also presented a heavily whitewashed picture of the Old West. However, the real Wild West was filled with colorful characters of all races and creeds. If the history of Texas is any indication, perhaps as many as one in four cowboys were black. Many people have read the story of how George Washington Carver invented peanut butter. Others are familiar with the story of Sarah Breedlove, aka Madam C. J. Walker, the inventor of beauty products. Here are some black inventors you may not know. Literature in particular has been a space for black authors to tell their stories authentically, and bookworms seeking good reads can choose from an array of fiction, poetry, historical texts, essays, and memoirs. From literary icons to fresh, buzzworthy talent, we're highlighting 25 books by African-American authors you should add to your reading list today. Plenty would not exist were it not for black pioneers; here’s a very small glimpse at what modern day inventions came from the African American community. The mission of the African American Civil War Museum is to correct a great wrong in American history which ignored the contributions of the United States Colored Troops (USCT) in keeping America united under one flag and ending slavery in the United States. Female African-American Inventors who help shape our everyday lives. Discover the people and events that shaped African American history, from slavery and abolitionism to the Harlem Renaissance and Civil Rights Movement. The black history that pre-dates the slave trade is rarely taught in schools and is almost never acknowledged. As a result many African-Americans grow up believing that slavery is the only event to occur in their history before the civil rights movement, which is not accurate. The history of African Americans in the United States has been a paradox of incredible triumph in the face of tremendous human tragedy. This site serves as a portal to the vast and growing array of information on the Web and in other sources on the thirty seven million African Americans in the nation. African American History Timeline: 1619 - 2008 . 1619 The first African American indentured servants arrive in the American colonies. Less than a decade later, the first slaves are brought into New Amsterdam (later, New York) Some of the Inventions African Americans created in America and their contribution to the advancement of America This is a list of African-American authors and writers, all of whom are considered part of African-American literature, and who already have Wikipedia articles. The list also includes non-American authors resident in the USA and American writers of African descent. Was fought over the right to own slaves and not State rights. The State rights ruse was merely an attempt to justify slavery. President Barack Obama was elected the first African-American president of the United States on November 5, 2008, transcending centuries of inequality in America. An American attorney and politician who served as the 44th President of the United States from January 20, 2009, to January 20, 2017. A member of the Democratic Party, he was the first African American to serve as president. He was previously a United States Senator from Illinois and a member of the Illinois State Senate. Accounted for up to 25 percent of workers in the range-cattle industry from the 1860s to 1880s, estimated to be between 6,000 and 9,000 workers. Typically former slaves or born into the families of former slaves, many black men had skills in cattle handling and headed West at the end of the Civil War. Though the industry generally treated black men equally to white men in terms of pay and responsibilities, discrimination persisted, though to a lesser extent than in other industries of the time. Black Lawmen, Outlaws and Cowboys of the old west you might be saying with wonderment and head scratching! “Why that’s an oxymoron! I’ve never heard of such a thing!”. Yeah, Yeah I know you haven’t because they were literally “white washed” (pun intended) out of Old West history. One in four cowboys was black. So why aren’t they more present in popular culture? Was a cowboy, rodeo, Wild West show performer and actor. In 1989, Pickett was inducted into the ProRodeo Hall of Fame. This library of podcasts includes Stuff You Missed in History Class episodes on black history. A community site dedicated to past influential and living black leaders and the history surrounding them. Online Resources General Collection National Research. The Complete List of Genius Black American (African American) Inventors, Scientists, and Engineers with Their Revolutionary Inventions That Changed the World and Impacted History - Part One The Complete List of Genius Black American (African American) Inventors, Scientists, and Engineers with Their Revolutionary Inventions That Changed the World and Impacted History - Part Two He worked mostly in Arkansas and the Oklahoma Territory. During his long career, he was credited with arresting more than 3,000 felons. He shot and killed 14 outlaws in self-defense. The first African American to assume the presidency (2009–2017) and previously served as a United States Senator from Illinois (2005–2008). Originally were members of the 10th Cavalry Regiment of the United States Army, formed on September 21, 1866, at Fort Leavenworth, Kansas. This nickname was given to the Negro Cavalry by Native American tribes who fought in the Indian Wars. The term eventually became synonymous with all of the African American regiments formed in 1866. Were African American soldiers who mainly served on the Western frontier following the American Civil War. In 1866, six all-black cavalry and infantry regiments were created after Congress passed the Army Organization Act. Their main tasks were to help control the Native Americans of the Plains, capture cattle rustlers and thieves and protect settlers, stagecoaches, wagon trains and railroad crews along the Western front. Their duties included escorting stagecoaches, trains, and work parties and policing cattle rustlers and illegal traders who sold guns and liquor to the Indians, but their principal mission was to control the Indians of the Plains and Southwest. Was an American stevedore of African and Native American descent, widely regarded as the first person killed in the Boston massacre and thus the first American killed in the American Revolution. They are the famous African-American writers who have fearlessly examined cultural stigmas, provided intimate life details, presented new ideas and created remarkable fiction through literary works. For their prophetic genius, these men and women have received Pulitzer Prizes, NAACP awards and even Nobel Prizes, among other honors. Journalist, Civil Rights Activist, Author, Government Official. Famed 19th-century author and orator Frederick Douglass was an eminent human rights leader in the anti-slavery movement and the first African-American citizen to hold a high U.S. government rank. In his journey from captive slave to internationally renowned activist, Frederick Douglass (1818-1895) has been a source of inspiration and hope for millions. His brilliant words and brave actions continue to shape the ways that we think about race, democracy, and the meaning of freedom. This is a list of examples of Jim Crow laws, which were state and local laws in the United States enacted between 1876 and 1965. Jim Crow laws existed mainly in the South and originated from the Black Codes that were passed from 1865 to 1866 and from prewar segregation on railroad cars in northern cities. The laws sprouted up in the late 19th century after Reconstruction and lasted until the 1960s “It shall be unlawful for a negro and white person to play together or in company with each other in any game of cards or dice, dominoes or checkers.”. “Marriages are void when one party is a white person and the other is possessed of one-eighth or more negro, Japanese, or Chinese blood.”. “Separate free schools shall be established for the education of children of African descent; and it shall be unlawful for any colored child to attend any white school, or any white child to attend a colored school.”. “All railroads carrying passengers in the state (other than street railroads) shall provide equal but separate accommodations for the white and colored races, by providing two or more passenger cars for each passenger train, or by dividing the cars by a partition, so as to secure separate accommodations.”. Learn more about racism in America. Learn more about slavery in America. Profiled here are African American men and women who have contributed to the advancement of science and engineering. The accomplishments of the past and present can serve as pathfinders to present and future engineers and scientists. African American chemists, biologists, inventors, engineers, and mathematicians have contributed in both large and small ways that can be overlooked when chronicling the history of science. By describing the scientific history of selected African American men and women we can see how the efforts of individuals have advanced human understanding in the world around us. Who Are the Tuskegee Airmen of World War II? The Tuskegee Airmen were dedicated, determined young men who enlisted to become America’s first black military airmen, at a time when there were many people who thought that black men lacked intelligence, skill, courage and patriotism. Tuskegee Airmen were the first black military aviators in the U.S. Army Air Corps (AAC), a precursor of the U.S. Air Force.Trained at the Tuskegee Army Air Field in Alabama, they flew more than 15,000 individual sorties in Europe and North Africa during World War II. Their impressive performance earned them more than 150 Distinguished Flying Crosses, and helped encourage the eventual integration of the U.S. armed forces. White nationalist, right-wing extremists and other white supremacist groups have killed more Americans than terrorist have. White nationalist, right-wing extremists and other white supremacist groups are domestic terrorist and should be branded as the domestic terrorist they are. This page is dedicated to shining a light on the threat White nationalist, right-wing extremists and other white supremacist groups to America and our citizens.
<urn:uuid:551357c5-d001-4d8d-90c5-e0e071ca4488>
CC-MAIN-2022-33
http://www.augustsoft.com/black-american-history.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00605.warc.gz
en
0.962183
2,153
3.375
3
If you think load-shedding is bad, brace yourself for water-shedding... coming to a tap near you. South Africa is fast running out of water, with the worst drought since 1992 leaving dams at critical levels and diminishing rivers and streams. By NIKI MOORE. The reason for any potential water shedding is almost a mirror image of why we have load-shedding. Since 1994, millions of people have been added to the water grid with very little thought being given to increasing the capacity of water storage or water intake plants. Combined with mismanagement of water, non-payment for water, huge water wastage through lack of maintenance and neglect, and poor governance through corruption, we are facing a high noon of water shortages that might start affecting us in as soon as a few months. Smaller municipalities are going to be hit first, and hardest. The Kannaland Municipality (Caltizdorp) has a month of water left. Parts of KZN – northern Ethekwini, the South Coast, the rural north – are facing water restrictions as dams dry up. Much of South Africa is about to be declared an official drought zone. Even where water utilities have access to adequate water supplies – such as the Lesotho Highlands Water Scheme and the Midmar Dam – the strain will be immense. Water will have to be pumped from large dams to smaller dams; pollution will increase in rivers and dams as the water level decreases, water tables will drop as people pump more from boreholes. While the current crisis can be blamed on the severe drought, there is a large element of bad governance as well. Twenty years of municipal mismanagement has come home to roost, meaning that between 50% and 70% of our fresh water is being wasted through burst pipes, malfunctioning pumps, broken taps and reckless water use (the ‘acceptable’ global figure for non-revenue water is 30%). Adding to our water woes is an historical accumulation of bad waste-water treatment: fully half of our waste-treatment plants are operating below average standards and fully a third are critical. Fresh water is needed to flush out the pollution of raw sewage oozing into our dams and rivers, and a drought will concentrate effluent to dangerous levels. Leading the water-shedding charge is the Ugu district municipality in southern KZN, where it was announced through the local newspaper on 4 June that some areas would have water ‘restrictors’ installed while in other areas there would be scheduled water interruptions. The two local municipalities hardest hit would be Umuziwabantu (Harding) and Vulamehlo (inland from Pennington). In order to prevent more widespread water shedding, Ugu is asking households and businesses to reduce their water consumption by 30%. This is bad news for the region’s most important industry: tourism. Holiday-makers don’t like unflushable toilets and dry taps. But the water shortage is nothing new. For the last ten years, the South Coast has experienced water problems during peak holiday season as the influx of visitors puts a strain on the water grid. The rainy season has usually been counted on to refill the dams and flush out the pollution, but this year the rains did not arrive. What did arrive: a huge headache for the South Coast’s water utility, the Ugu District Municipality. “The main problem,” says the DA Ugu South Constituency Head Dr Rishigen Viranna, “is that for the last twenty years Ugu has been expanding water supply to rural areas and townships, and adding thousands of users to the water grid, which is its mandate. The DA supports that, except that they have not planned to upgrade the main water sources, which are two water plants on the Umzimkulu and Umtamvuma Rivers. As more people have been using water, the capacity of the two plants has come under more and more strain. The two plants supply 28Ml of water per day. In peak season they run over capacity at 38Ml of water per day. But the Ugu region needs 40 Ml of water per day at all times. With the plants running at full capacity all the time, there is no downtime for repair or maintenance.” AfriForum has also taken on the water crisis in Ugu. “Months ago we asked the Ugu District for their water maintenance plan,” says Hibiscus Coast AfriForum representative Wessel Pretorius. “But either they don’t have one, or they just don’t want us to see it. We actually wanted to help. We can call on the expertise of around 80 retired engineers and technical experts here on the Hibiscus Coast, but they don’t want to work with us.” At the moment the three dams in Ugu are less than half full and thousands of people receive water from tankers as their only source. Towns such as Harding and Murchison, just outside Port Shepstone, had water riots earlier this year because of water shortages. (The real reason, says locals in Harding, is that frustration about poor service delivery and the lack of water finally overflowed when it was revealed that the mayor had bought herself a new car for R1 million). “We have been disappointed with poor water supply for a long time,” says Murchison local resident Samkelo Ndwalane. “Water comes on for only a few hours a day, and then it is dirty and full of mud. In July last year, after several weeks for no water, a group of us got together and asked the mayor, ND Gumede, to come and see us to explain. She did not come. The community got angry and wanted to close the N2, but instead we asked the local chief to request the mayor to visit. Again she did not come. By that time the community was very angry. There were about 5,000 of the people by then, and they decided to close the N2.” The highway was closed for a week. Service delivery protests around the country have begun to focus more and more on water supply. Water Affairs Minister Edna Molewa said in a breakfast briefing on May 20 2013 that unless our water resources were better used, there was a risk of ‘running out of fresh water’. The following day she told Parliament that the dangers of a water shortage had been exaggerated and that ‘South Africa will not run out of water in the next 100 years.’ But scarcity of water depends almost entirely on where you live. Mature and functioning water supply systems, such as Rand Water and Umgeni Water, which serve the large metros of Gauteng and KZN respectively, have multiple water sources in case of drought. The real problems – and the potential for massive civil unrest over a lack of water – lies in the smaller municipalities where a single or finite water source has been compromised by poor management and corruption. For instance, the Ugu district actually has plenty of water. The area is bracketed by two massive rivers. There are a number of dams that can be topped up. It is a lack of planning that has created the current shortage. A staff member at the Ugu head-office, who refused to be named, said that the Ugu water management was extremely worried about the water shortage. “They are probably more concerned than the residents themselves,” he said. “They have a long-term plan, a short-term plan, and a medium-term plan.” However, it was impossible to find out what this plan was, as neither the municipal manager DD Naidoo, the Head of Services for Water and Sanitation Lungile Cele, or the municipal spokesman Francis Zama, were available for comment. “Ugu is doing their best and things are improving,” said the head of the Hibiscus Coast Ratepayers Association Bruce Hulley, “despite a twenty-year backlog of neglect. Things are getting better.” The same cannot be said for other areas in the country such as North West, Limpopo and Mpumalanga, where water supply has broken down completely and the population rely on expensive water trucks. In some cases, such as Brits, the water plant has allegedly been deliberately sabotaged so that councillors can benefit from water-trucking tenders. In Mpumalanga, and especially Ermelo, the problem is non-existent maintenance of infrastructure so that water is maddeningly sporadic through constant burst pipes. A countrywide problem is standpipes in rural areas and townships that are either broken, stolen or simply left running until reservoirs run dry. The majority of township and rural residents declare that they would not mind paying for water as long as a secure and reliable source is provided. Whether this declaration will stand the test of billing remains to be seen, but it is certainly true that many people pay for water anyway… in many rural areas there is a brisk trade from the owner of a borehole selling water to the neighbouring community, or a local chief who holds the keys to the taps. Last month the Department of Water Affairs launched Water Week, stressing the importance of conserving water in the face of a national shortage this year. Their theme was ‘What if this were the last drop’. That is a sobering thought for anyone who has suddenly found a dry tap due to a pipe burst, and it is a daily reality for millions of people throughout South Africa. It could become a daily reality for us all. DM Photo: A young boy drinks water from a tap metres from the Juskei river that runs through Alexandra township in Johannesburg not knowing that it is the most polluted river in Southern Africa and this mostly because of human waste. EPA-PHOTO/EPA/KIM LUDBROOK Daily Maverick © All rights reserved
<urn:uuid:28aa2e96-7b46-4d17-8b69-6beeead791bc>
CC-MAIN-2022-33
https://www.dailymaverick.co.za/article/2015-06-25-water-shedding-feel-it-it-is-almost-here/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00204.warc.gz
en
0.971338
2,071
2.75
3
Alpaca fleece is the natural fiber harvested from an alpaca. There are two different types of alpaca fleece. the most common fleece type comes from a Huacaya. Huacaya fiber grows and looks similar to sheep wool in that the animal looks "fluffy". The second type of alpaca is Suri and makes up less than 10% of the South American alpaca population. Suri fiber is more similar to natural silk and hangs off the body in locks that have a dreadlock appearance. (Alpacas Magazine, Spring 2002, Suri Fiber Electron Microscopy, Andy Tillman. While both fibers can be used in the worsted milling process using light weight yarn or thread, Huacaya fiber can also be used in a woolen process and spun into various weight yarns. It is a soft, durable, luxurious and silky natural fiber. While huacaya fiber is similar to sheep's wool, it is warmer, not prickly, and has no lanolin, which makes it hypoallergenic. Alpaca fiber is naturally water-repellent and fire resistant. Huacaya, an alpaca that grows soft spongy fiber, has natural crimp, thus making a naturally elastic yarn well-suited for knitting. Suri has no crimp and thus is a better fit for woven goods. The designer Armani has used Suri alpaca to fashion men's and women's suits. Alpaca fleece is made into various products, from very simple and inexpensive garments made by the indigenous communities to sophisticated, industrially made and expensive products such as suits. In the United States, groups of smaller alpaca breeders have banded together to create "fiber co-ops," to make the manufacture of alpaca fiber products less expensive. There are two types of alpaca: Huacaya (which produce a dense, soft, crimpy sheep-like fiber), and the Suri (with silky pencil-like locks, resembling dreadlocks but without matted fibers). Suris, prized for their longer and silkier fibers, are estimated to make up 19–20% of the North American alpaca population. Since its import into the United States, the number of Suri alpacas has grown substantially and become more color diverse. The Suri is thought to be rarer, most likely because the breed was reserved for royalty during Incan times. Suris are often said to be less cold hardy than Huacaya, but both breeds are successfully raised in more extreme climates. They were developed in South America. Alpacas have been bred in Pre-Columbian, South America for over 5,000 thousands of years. Domesticated from the Vicuñas by the ancient tribes of the Andean highlands of Ecuador, Peru, Chile, Bolivia and Northwest of Argentina. According to archaeological studies alpaca fiber was similar in quality to the wild Vicuña prior to the Spanish Conquests in the 1500s. Two-thousand-year-old Paracas textiles are thought to include alpaca fiber. Also known as "The Fiber of the Gods", Alpaca was used to make clothing for royalty. In recent years, alpacas have also been exported to other countries. In countries such as the US, Australia and New Zealand, breeders shear their animals annually, weigh the fleeces and test them for fineness. With the resulting knowledge, they are able to breed heavier-fleeced animals with finer fiber. Fleece weights vary, with the top stud males reaching annual shear weights up to 7 kg total fleece and 3 kg good quality fleece. The discrepancy in weight is because an alpaca has guard hair, which is often removed before spinning. History of fiber industry The Amerindians of Peru used this fiber in the manufacture of many styles of fabrics for thousands of years before its introduction into Europe as a commercial product. The alpaca was a crucial component of ancient life in the Andes, as it provided not only warm clothing, but also meat. Incan culture involved the alpaca, as well as llamas and guanacos, in ritual sacrifice. Methods of killing the beasts varied based on the god receiving the sacrifice, the festival during which it took place, and even the color of the animal's fur. One method involved slitting open the animal's left side and reaching inside the chest cavity to remove the heart. The first European importations of alpaca fiber were into Spain. Spain transferred that fiber to Germany and France. Apparently, alpaca yarn was spun in England for the first time about the year 1808, but the fiber was condemned as an unworkable material. In 1830, Benjamin Outram, of Greetland, near Halifax, appears to have reattempted spinning it, and again it was condemned. These two attempts failed due to the style of fabric into which the yarn was woven—a type of camlet. With the introduction of cotton warps into Bradford trade about 1836, the true qualities of alpaca could be assessed as it was developed into fabric. It is not known where the cotton warp and mohair or alpaca weft plain-cloth came from, but it was this simple and ingenious structure which enabled Titus Salt, then a young Bradford manufacturer, to use alpaca successfully. Bradford is still the great spinning and manufacturing center for alpaca. Large quantities of yarns and cloths are exported annually to the European continent and the US, although the quantities vary with the fashions in vogue. The typical "alpaca fabric" is a very characteristic "dress fabric." Due to the successful manufacture of various alpaca cloths by Sir Titus Salt and other Bradford manufacturers, a great demand for alpaca wool arose, which could not be met by the native product. Apparently, the number of alpacas available never increased appreciably. Unsuccessful attempts were made to acclimatize alpaca in England, on the European continent and in Australia, and even to cross English breeds of sheep with alpaca. There is a cross between alpaca and llama—a true hybrid in every sense—producing a material placed upon the Liverpool market under the name "Huarizo". Crosses between the alpaca and vicuña have not proved satisfactory, as the crosses that have produced offspring have a very short fleece, more characteristic of the vicuña. Current attempts to cross these two breeds are underway at farms in the US. Alpacas are now being bred in the US, Canada, Australia, New Zealand, UK, Germany and numerous other places. In recent years, interest in alpaca fiber clothing has surged, perhaps partly because alpaca ranching has a reasonably low impact on the environment. Individual U.S. farms are producing finished alpaca products like hats, mitts, scarves, socks, insoles, footwarmers, sweaters, jackets, as well as almost any other product. Outdoor sports enthusiasts claim that its lighter weight and better warmth provides them more comfort in colder weather. Using an alpaca and wool blend such as merino is common to the alpaca fiber industry to reduce price, however no additional materials need to be added to improve processing or the qualities of the final product. Alpaca improves any other textile it is blended with, however 100% alpaca garments can be made without the addition of other materials, which creates a long lasting and very luxurious product. Alpaca fiber is similar in structure to sheep wool fiber. The fiber softness comes from having a different smoother scale surface than sheep wool. American breeders have enhanced the softness by selecting for finer fiber diameter fiber, similar to merino wool. Fiber diameter is a highly inherited trait in both alpaca and sheep. The difference in the individual fiber scales compared to sheep wool also creates the glossy shine which is prized in alpaca. Alpaca fibers have a higher tensile strength than wool fibers. In processing, slivers lack fiber cohesion and single alpaca rovings lack strength. Blend these together and the durability is increased several times over. More twisting is necessary, especially in Suri, and this can reduce a yarn's softness. The alpaca has a very fine and light fleece. It does not retain water, is a thermal insulator even when wet and can resist solar radiation effectively. These characteristics guarantee the animals a permanent and appropriate coat to protect against extreme changes of temperature. This fiber offers the same protection to humans. Medullated fibers are fibers with a central core, which may be continuous, interrupted, or fragmented. Here, the cortical cells that make up the walls of the fiber, are wrapped around a medulla, or core, that is made up of another type of cell (called medullary cells). Later, these cells may contract or disappear, forming air pockets which assist insulation. Medullation can be an objectionable trait. Medullated fibers can take less dye, standing out in the finished garment, and are weaker. The proportion of medullated fibers is higher in the coarser, unwanted guard hairs: there is less or no medullation in the finer, lower micrometer fibers. These undesirable fibers are easy to see and give a garment a hairy appearance. Quality alpaca products should be free from these medullated fibers. Good quality alpaca fiber is approximately 18 to 25 micrometers in diameter. While breeders report fiber can sell for US$2 to $4 per ounce, the world wholesale price for processed, spun alpaca "tops" is only between about $10 to $24/kg (according to quality), i.e. about $0.28 to $0.68 per oz. Finer fleeces, ones with a smaller diameter, are preferred, and thus are more expensive. As an alpaca gets older, the diameter of the fibers gets thicker, between 1 μm and 5 μm per year. This is sometimes caused by overfeeding; as excess nutrients are converted to (thicker) fiber rather than to fat. Elite alpaca breeders in the United States are attempting to breed animals with fleece that does not degrade in quality as the animals age. They are looking for lingering fineness (fiber diameters remaining under 20 micrometers) for aging animals. It is believed this lingering fineness is heritable and thus can be improved over time. As with all fleece-producing animals, quality varies from animal to animal, and some alpacas produce fiber which is less than ideal. Fiber and conformation are the two most important factors in determining an alpaca's value. Alpacas come in 22 natural colors, with more than 300 shades from a true-blue black through browns-black, browns, fawns, white, silver-greys, and rose-greys. However, white is predominant, because of selective breeding: the white fiber can be dyed in the largest ranges of colors. In South America, the preference is for white, as they generally have better fleece than the darker-colored animals. The demand for darker fiber have sprung up in the United States and elsewhere, though, to reintroduce the colors, but the quality of the darker fiber has decreased slightly. Breeders have been diligently working on breeding dark animals with exceptional fiber, and much progress has been made over the last few years. Before dyeing, the alpaca fiber must go through other stages: - Selection of wool, according to color, size and quality of fiber - "Escarminado", removal of grass, dirt, thorns, and other impurities - Washing, to remove all the dirt and grease Once the fiber is clean, it is possible to begin the process of dyeing. To dye 1 kg of alpaca wool with cochinilla (natural dye), - Boil 5 liters of water in an aluminum can with 100 g of cochinilla for an hour. - Sift and put the fiber in the water. - Boil again for an hour and add 50 lemons cut in halves. - Then take out the wool and hang for drying. Note: For dyeing with another natural dye (native plants), add 2 kg of the products to the water and boil. Alpaca fiber is used for many purposes, including making clothing such as bedding, hats, mitts, scarves, gloves, and jumpers. Rugs and toys can also be made from alpaca fiber. Sweaters are most common. - Quiggle, Charlotte. "Alpaca: An Ancient Luxury." Interweave Knits Fall 2000: 74-76. - Stoller, Debbie, Stitch 'N Bitch Crochet, New York: Workman, 2006, p. 18. - "Alpaca." 22 April 2008. HowStuffWorks.com. 19 July 2009. - "ProperFashion.com". ProperFashion.com. Archived from the original on 2008-11-21. Retrieved 2013-11-09. - "Alpaca Registry". Alpaca Registry. 2007-05-01. - Fowler, Murray (1998). Medicine and Surgery of South American Camelids. Wiley-Blackwell. p. 3. ISBN 978-0-8138-0397-5. - Wheeler, Jane (June 2012). "Dr". Alpaca Culture. 1 (1): 6–23. Retrieved 1 October 2019. - Paracas Textiles, British Museum, accessed 27 September 2010 - "Alpaca | URBANARA Buying Guide". Urbanara.co.uk. Archived from the original on 2013-11-05. Retrieved 2013-11-09. - Besom, Thomas (2009). Of Summits and Sacrifice: An Ethnohistoric Study of Inka Religious Practices. University of Texas Press. p. 96. Retrieved 2016-03-28. - "Alpaca". The New Encyclopædia Britannica. 11th ed. 1911. - The Quality and Processing Performance of Alpaca Fibres Australian Government RIRDC 2003 - http://www.aia.org.pe/aia.html?32 Archived 2009-02-15 at the Wayback Machine> - J. Villarroel, presumably A study of alpaca fibre, University of N.S.W., 1959, as cited in Crying over spilt onions? Archived 2013-11-09 at the Wayback Machine (Published in Australian Alpacas, Autumn, 2004) - "Davison/Holt 2004" (PDF). Archived from the original (PDF) on 2013-11-09. Retrieved 2013-11-09. - Fiber Characteristics of U.S. Huacaya Alpacas by Angus McColl, Yocom-McColl Testing Laboratories, Inc., Chris Lupton, Texas A&M University System, and Bob Stobart, University of Wyoming 2004 - "Alpha Tops". Alpha Tops. Retrieved 2013-11-09. |Wikimedia Commons has media related to Alpaca fibers.|
<urn:uuid:18a3c04e-d318-401b-9eec-0b54c9d040f2>
CC-MAIN-2022-33
https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Alpaca_fiber
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00206.warc.gz
en
0.935817
3,245
2.953125
3
How To Remove Mold From Shower & Bathtub Caulking | TipHero ( How To Get Rid Of Mold In A Shower #5) Images Gallery Howhow1 (hou),USA pronunciation adv. - in what way or manner; by what means?: How did the accident happen? - to what extent, degree, etc.?: How damaged is the car? - in what state or condition?: How are you? - for what reason; why?: How can you talk such nonsense? - to what effect; with what meaning?: How is one to interpret his action? - what?: How do you mean? If they don't have vanilla, how about chocolate? - (used as an intensifier): How seldom I go there! - by what title or name?: How does one address the president? - at what price: How are the new cars going, cheaper than last year's models? - by what amount or in what measure or quantity?: How do you sell these tomatoes? - in what form or shape?: How does the demon appear in the first act of the opera? How does the medication come? - and how! [Informal.]certainly! you bet!: Am I happy? And how! - Here's how, [Informal.](used as a toast). - how come? [Informal.]how is it that? why?: How come you never visit us anymore? - how so? how does it happen to be so? why?: You haven't any desire to go? How so? - the manner or way in which: He couldn't figure out how to solve the problem. - about the manner, condition, or way in which: I don't care how you leave your desk when you go. Be careful how you act. - in whatever manner or way; however: You can travel how you please. - that: He told us how he was honest and could be trusted. - a question concerning the way or manner in which something is done, achieved, etc.: a child's unending whys and hows. - a way or manner of doing something: to consider all the hows and wherefores. - a word formerly used in communications to represent the letter H. Toto (to̅o̅; unstressed tŏŏ, tə),USA pronunciation prep. - (used for expressing motion or direction toward a point, person, place, or thing approached and reached, as opposed to from): They came to the house. - (used for expressing direction or motion or direction toward something) in the direction of; toward: from north to south. - (used for expressing limit of movement or extension): He grew to six feet. - (used for expressing contact or contiguity) on; upon: a right uppercut to the jaw; Apply varnish to the surface. - (used for expressing a point of limit in time) before; until: to this day; It is ten minutes to six. We work from nine to five. - (used for expressing aim, purpose, or intention): going to the rescue. - (used for expressing destination or appointed end): sentenced to jail. - (used for expressing agency, result, or consequence): to my dismay; The flowers opened to the sun. - (used for expressing a resulting state or condition): He tore it to pieces. - (used for expressing the object of inclination or desire): They drank to her health. - (used for expressing the object of a right or claim): claimants to an estate. - (used for expressing limit in degree, condition, or amount): wet to the skin; goods amounting to $1000; Tomorrow's high will be 75 to 80°. - (used for expressing addition or accompaniment) with: He added insult to injury. They danced to the music. Where is the top to this box? - (used for expressing attachment or adherence): She held to her opinion. - (used for expressing comparison or opposition): inferior to last year's crop; The score is eight to seven. - (used for expressing agreement or accordance) according to; by: a position to one's liking; to the best of my knowledge. - (used for expressing reference, reaction, or relation): What will he say to this? - (used for expressing a relative position): parallel to the roof. - (used for expressing a proportion of number or quantity) in; making up: 12 to the dozen; 20 miles to the gallon. - (used for indicating the indirect object of a verb, for connecting a verb with its complement, or for indicating or limiting the application of an adjective, noun, or pronoun): Give it to me. I refer to your work. - (used as the ordinary sign or accompaniment of the infinitive, as in expressing motion, direction, or purpose, in ordinary uses with a substantive object.) - raised to the power indicated: Three to the fourth is 81( 34 = 81). - toward a point, person, place, or thing, implied or understood. - toward a contact point or closed position: Pull the door to. - toward a matter, action, or work: We turned to with a will. - into a state of consciousness; out of unconsciousness: after he came to. - to and fro. See fro (def. 2). Removere•move (ri mo̅o̅v′),USA pronunciation v., -moved, -mov•ing, n. - to move from a place or position; take away or off: to remove the napkins from the table. - to take off or shed (an article of clothing): to remove one's jacket. - to move or shift to another place or position; transfer: She removed the painting to another wall. - to put out; send away: to remove a tenant. - to dismiss or force from a position or office; discharge: They removed him for embezzling. - to take away, withdraw, or eliminate: to remove the threat of danger. - to get rid of; do away with; put an end to: to remove a stain; to remove the source of disease. - to kill; - to move from one place to another, esp. to another locality or residence: We remove to Newport early in July. - to go away; - the act of removing. - a removal from one place, as of residence, to another. - the distance by which one person, place, or thing is separated from another: to see something at a remove. - a mental distance from the reality of something as a result of psychological detachment or lack of experience: to criticize something at a remove. - a degree of difference, as that due to descent, transmission, etc.: a folk survival, at many removes, of a druidic rite. - a step or degree, as in a graded scale. - a promotion of a pupil to a higher class or division at school. Moldmold1 (mōld),USA pronunciation n. - a hollow form or matrix for giving a particular shape to something in a molten or plastic state. - the shape created or imparted to a thing by a mold. - something formed in or on a mold: a mold of jelly. - a frame on which something is formed or made. - shape or form. - a prototype, example, or precursor. - a distinctive nature, character, or type: a person of a simple mold. - a three-dimensional pattern used to shape a plate after it has been softened by heating. - a template for a frame. - a molding. - a group of moldings. Also,[esp. Brit.,] mould. mold′a•ble, adj. - to work into a required shape or form; - to shape or form in or on a mold. - to form a mold of or from, in order to make a casting. - to produce by or as if by shaping material; - to have influence in determining or forming: to mold the character of a child. - to ornament with moldings. Fromfrom (frum, from; unstressed frəm),USA pronunciation prep. - (used to specify a starting point in spatial movement): a train running west from Chicago. - (used to specify a starting point in an expression of limits): The number of stores will be increased from 25 to 30. - (used to express removal or separation, as in space, time, or order): two miles from shore; 30 minutes from now; from one page to the next. - (used to express discrimination or distinction): to be excluded from membership; to differ from one's father. - (used to indicate source or origin): to come from the Midwest; to take a pencil from one's pocket. - (used to indicate agent or instrumentality): death from starvation. - (used to indicate cause or reason): From the evidence, he must be guilty. Showershow•er1 (shou′ər),USA pronunciation n. - a brief fall of rain or, sometimes, of hail or snow. - Also called show′er bath′. a bath in which water is sprayed on the body, usually from an overhead perforated nozzle(showerhead). - the apparatus for this or the room or stall enclosing it. - a large supply or quantity: a shower of wealth. - a party given for a bestowal of presents of a specific kind, esp. such a party for a prospective bride or prospective mother: a linen shower; a baby shower. - a fall of many objects, as tears, sparks, or missiles. - See air shower. - showers, a room or area equipped with several showerheads or stalls for use by a number of people at the same time. - send to the showers, [Baseball.] - to replace (a pitcher) during a game, usually because he or she is ineffective: The coach sent him to the showers after he walked three batters in a row. - to cause (a pitcher) to be replaced in a game, as by getting many hits off him or her; knock out of the box: Two home runs and a line-drive double sent her to the showers. - to bestow liberally or lavishly. - to deluge (a person) with gifts, favors, etc.: She was showered with gifts on her birthday. - to bathe (oneself ) in a shower bath. - to rain in a shower. - to take a shower bath. Bathtubbath•tub (bath′tub′, bäth′-),USA pronunciation n. - a tub to bathe in, esp. one that is a permanent fixture in a bathroom. Howdy guys, this blog post is about How To Remove Mold From Shower & Bathtub Caulking | TipHero ( How To Get Rid Of Mold In A Shower #5). This attachment is a image/jpeg and the resolution of this attachment is 911 x 477. This picture's file size is just 29 KB. Wether You decided to save This image to Your PC, you can Click here. You also too download more images by clicking the following photo or read more at this post: How To Get Rid Of Mold In A Shower. Among the most common questions we request is how do you repaint my tub vanity? The baths have advantages through the years and so are additionally the bathroom's focus. By remodeling or repainting your How To Remove Mold From Shower & Bathtub Caulking | TipHero ( How To Get Rid Of Mold In A Shower #5), you repaint the bath counter with relative simplicity, can bring lifestyle towards the aged bathroom and requires just a few nights of work and produce a good weekend project. We have to prepare bathroom showcase to do this you will need sandpaper screwdriver. Using your screwdriver, take away the knobs and eliminate all of the drawers out of your cabinet that is recent. Next grab your sandpaper as well as a little bit of mud all completed from the makeup showcase. Ensure the sand both sides of the restroom doorway. Somewhat scrub the complete bathroom with mild soap once you have accomplished sanding the door. Use a high quality primer to let the exterior area of the How To Remove Mold From Shower & Bathtub Caulking | TipHero ( How To Get Rid Of Mold In A Shower #5) t consult your neighborhood equipment shop to have the right primer for your task that is unique. Let before wanting to paint your bathroom vanity, the primer dried. Record from all edges around your bathroom counter to not get colour on surfaces or your surfaces.
<urn:uuid:5686e99a-e247-41ad-8edf-e6dcee2dedbf>
CC-MAIN-2019-22
https://www.ronanforcongress.com/att-1023/how-to-remove-mold-from-shower-bathtub-caulking-tiphero-how-to-get-rid-of-mold-in-a-shower-5/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00182.warc.gz
en
0.905469
2,753
2.75
3
NCERT Solutions for Class 10 Maths Chapterwise List - Free The answers for the NCERT books are the best study material for students. These NCERT Solutions for Class 10 Maths will help students understand the concepts better. Mathematics Textbook for Class 10Author: NCERTPublisher: NCERTLanguage: English Shaalaa provides solutions for NCERT Class 10 and has all the answers for the questions given in Mathematics Textbook for Class 10. Shaalaa is surely a site that most of your classmates are using to perform well in exams. You can solve Mathematics Textbook for Class 10 textbook questions and use Shaalaa NCERT Solutions for Class 10 Maths to verify your answers. NCERT Class 10 solutions for other subjects Chapters covered in NCERT Solutions for Class 10 Maths NCERT Class 10 Mathematics (10th) Chapter 1: Real Numbers solutions NCERT Class 10 Mathematics (10th) Chapter 2: Polynomials solutions NCERT Class 10 Mathematics (10th) Chapter 3: Pair of Linear Equations in Two Variables solutions NCERT Class 10 Mathematics (10th) Chapter 4: Quadratic Equations solutions NCERT Class 10 Mathematics (10th) Chapter 5: Arithmetic Progressions solutions NCERT Class 10 Mathematics (10th) Chapter 6: Triangles solutions NCERT Class 10 Mathematics (10th) Chapter 7: Coordinate Geometry solutions NCERT Class 10 Mathematics (10th) Chapter 8: Introduction to Trigonometry solutions NCERT Class 10 Mathematics (10th) Chapter 9: Some Applications of Trigonometry solutions NCERT Class 10 Mathematics (10th) Chapter 9: Some Applications of Trigonometry exercises |Exercise||No. of questions||Pages| |Exercise 9.1||16||203 to 205| NCERT Class 10 Mathematics (10th) Chapter 10: Circles solutions NCERT Class 10 Mathematics (10th) Chapter 11: Constructions solutions NCERT Class 10 Mathematics (10th) Chapter 12: Areas Related to Circles solutions NCERT Class 10 Mathematics (10th) Chapter 13: Surface Areas and Volumes solutions NCERT Class 10 Mathematics (10th) Chapter 14: Statistics solutions NCERT Class 10 Mathematics (10th) Chapter 15: Probability solutions Examinations tend to bring a lot of stress to the students appearing and the stress gets magnified all the more, especially when its the student's first-ever board exam. The added stress of it being a board exam, coupled with the vast portion that needs to be covered, is what contributes towards making the students hate exams all the more. In order to successfully ace the subject, you need to constantly practice, in order to stay in touch with the subject and it begins with getting a hold of trustworthy, reliable and reputed study material. Class 10 Mathematics is usually one of the most challenging and difficult subjects to comprehend, but when you get all the steps, numbers and equations right, it also proves to be the only subject where the student can score cent percent marks in the examination. Class 10 Maths NCERT book also referred to as CBSE class 10 maths is a good resource, Shaalaa has solutions for this book. The solving practice is great for exam preparation. NCERT Solutions for Class 10 Maths Class 10 NCERT solutions answers all the questions given in the NCERT textbooks in a step-by-step process. Our Maths tutors have helped us put together this for our Class 10 Students. The solutions on Shaalaa will help you solve all the NCERT Class 10 Mathematics (10th) questions without any problems. Every chapter has been broken down systematically for the students, which gives fast learning and easy retention. Shaalaa provides free NCERT solutions for Class 10 Maths. Shaalaa has carefully crafted NCERT solutions for Class 10 Mathematics (10th) that can help you understand the concepts and learn how to answer properly in your board exams. You can also share our link for free Class 10 Mathematics (10th) NCERT solutions with your classmates. If you have any doubts while going through our Class 10 Mathematics (10th) NCERT solutions, then you can go through our Video Tutorials for Mathematics (10th). The tutorials should help you better understand the concepts. Frequently asked questions about NCERT Solutions for Class 10 Maths How NCERT Solution for Class 10 Maths can help you score well? Owning the best study and reference material, such as NCERT Solution for Class 10 Maths can help a student gain an edge over the competition, as it provides the student with everything that he/she would need in their arsenal, to crack the challenging examination. With previous question papers, sums, easy explanations, equations, and theorems simplified, it makes this challenging subject a lot easier to understand. Class 10 Maths NCERT Solutions also provide easy, elaborate and simplified explanations to various theorems and methods for both Geometry and algebra, thus ensuring that you do not refer to other books to get a hold of good quality material to practice and study. Which is a reliable website for Class 10 Maths NCERT Solutions? Another preferred way to prepare for your examinations is by referring to various websites for NCERT Class 10 Solutions for Maths, that help you gain a better understanding of the subject and your doubts. When looking for a reliable and trustworthy website, your search can end at Shaalaa.com, where students can gain access to multiple NCERT Solutions of Maths Class 10 and can find solved equations, in order to get a better and in-depth understanding, and unsolved equations, to put whatever they have learnt to the test. With previous years question papers, important tips and tricks that can help you crack your Mathematics Class 10 NCERT Solution, you can be assured that everything that you would need to ace your examination, is right there, on the website, thus avoiding the need to add to the confusion, by visiting multiple websites. How reliable Solutions of NCERT Class 10 Maths can benefit you? At Shaalaa, we have a team of dedicated Mathematicians, professors and teachers experienced in providing Maths NCERT solutions and through their vast experience, can share tips, short and simplified methods, simple explanations, in-dept understandings will help you get a firm grasp over the complicated subject and will ensure that you are successfully able to find solutions to all your challenges while preparing for your Class 10 CBSE exam. What does Mathematics for Class 10 NCERT provide? Unlike other sources that provide NCERT Mathematics 10th Class Solution set, we at Shaalaa have gauged and understood the topics, sums, and equations that students usually find challenging and difficult to comprehend. After carefully analyzing the same, we have focused a lot more on the challenging sums and have tried our best to provide an alternate and easier solution, wherever possible. Our class 10 math chapter wise Solutions help students understand better With years of experience and a dedicated and experienced team of experts, who work tirelessly, to ensure that students get the best study material out there, we at Shaalaa, have been the most reputed and renowned brands for NCERT Solution for Class 10 Maths, with the simple aim of ensuring that students have easy access to the most important and effective notes, equations and other sorts of study material out there. In which way are NCERT Solutions helpful exam preparations? Math is a subject that is easy for many, and extremely difficult for others. Class 10 Maths Solutions NCERT is extremely useful for the student. These Solutions provide an excellent platform for understanding and learning. The Solutions are explained with well-illustrated graphs and solved examples which makes learning easier. Video tutorials are also available. Taking the help of NCERT Solutions for 10 Maths, well ahead of time is a great idea. Is the whole syllabus covered? 10th Math NCERT Solutions contain all Solutions of questions in the NCERT maths textbook. Seeing the solution to the questions helps in clearer understanding and thereby prepares the student for the exam. The professor explains the method of solving the problem, thereby equipping the student to tackle any problem in the exam. Refer to the class 10 Maths Solutions NCERT to ensure clear understanding and great results. In today's day, supplementing academics by using an online platform like Shaalaa.com proves to be useful to the student, as it provides additional knowledge which will help him to be 'one up', over the competitor. Finding the best Class 10 Mathematics (10th) NCERT solutions is very important if you want to fully prepare for the exam. It's crucial to ensure that you are fully prepared for any challenges that can arise, and that's why heavy, professional focus on Maths NCERT Class 10 solutions can be a very good idea. As you learn the solutions, it's a lot easier for you to obtain the results you want and the experience itself can be staggering every time. NCERT Class 10 Mathematics (10th) Guide Book Back Answers We hope that the following CBSE NCERT Class 10 Mathematics (10th) Book Answers Solutions Guide Pdf Free Download in English Medium would be of use to you. Answer material is developed as per the latest exam pattern and is part of NCERT Class 10 Books Solutions. You will not miss any topics or concepts discussed in the book and will get more conceptual knowledge from the study material. If you have any questions about the CBSE New Syllabus Class 10 Class 10 Mathematics (10th) Guide Pdf of Text Book Back Questions and Answers, Notes, Chapter Wise Important Questions, Model Questions, and so on, please contact us. Comprehensive NCERT solutions for Class 10 Maths It's very important to have the NCERT solutions for Class 10 Maths as they can offer a good guideline in regards to what you need to improve. If you want to get better and better, you need to push the boundaries and take things to the next level. That certainly helps a lot and it can bring in front a tremendous array of benefits every time. It pushes the experience to the next level, and the payoff alone can be extraordinary. What you want from the NCERT solution of Mathematics (10th) of Class 10 is a lot of accuracy. Without accurate solutions you'll never have the results and value you want. That's why you want quality, reliability and consistency with something like this. If you have it, things will certainly be amazing and you will get to pursue your dreams. If you acquire the Maths NCERT Class 10 solutions from this page, they are fully formatted and ready to use. This helps make the experience simpler and more convenient, while offering the results and value you need. That's what you want to pursue, a true focus on quality and value, and the payoff can be great thanks to that. All the NCERT Class 10 Maths solutions here cover all 15 chapters. As a result, you will be able to fully prepare for the exam adequately and without having to worry about missing anything. You rarely get such a benefit, and that on its own is what really makes the Class 10 Maths NCERT solutions provided here such an extraordinary advantage that you can always rely on. Just consider giving it a try for yourself and you will find it very comprehensive, professional and convenient at the same time. Our NCERT solutions for Class 10 Maths cover everything from Real Numbers, Polynomials, Pair of Linear Equations in Two Variables, Quadratic Equations, Arithmetic Progressions, Triangles, Coordinate Geometry, Introduction to Trigonometry, Some Applications of Trigonometry, Circles, Constructions, Areas Related to Circles, Surface Areas and Volumes, Statistics, Probability and the other topics. Yes, these are the best NCERT 12 Maths solution options on the market. You get to fully prepare for the exam in a reliable and comprehensive manner. You just have to check it out for yourself and the experience can be really impressive. Don't hesitate and check our Class 10 Maths solutions today if you want to handle this exam with great ease. It will offer an extraordinary experience every time and you will not have to worry about any issues. Just browse our solutions right now and you will find yourself mastering the NCERT exam questions in no time!
<urn:uuid:e002a3a2-3bb1-4737-867d-d8cd050cd73f>
CC-MAIN-2022-33
https://www.shaalaa.com/textbook-solutions/ncert-solutions-class-10-maths_17
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00005.warc.gz
en
0.921086
2,556
3.171875
3
Now a decade old, The Elders, whose founding leader was Nelson Mandela, is a who’s who of senior world leaders, including Kofi Annan, Jimmy Carter, Desmond Tutu, Graca Machel, Mary Robinson, and Ban Ki-moon. Peter Gabriel, who was instrumental in the formation of the group, explained its genesis: “In traditional societies, elders always had a role in conflict resolution, long-term decision-making, and applying wisdom where it was needed; now in our global village, we need our global elders.” Consider the implications of this group: Its mission is to create unified action to help resolve some of the world’s most intractable challenges. Its leaders demonstrate that our longer lives have created unprecedented social capital, which our country and our world desperately need. These leaders offer a model for how to harness this energy to secure the future that we want for our children and grandchildren, and become a critical foundation for successfully aging societies. As The Elders demonstrate, the assets and the critical mass of older adults globally can be the force we need for a better future. Their mission offers a peek into the design opportunity of the 21st century: to create a new societal paradigm built on the assets of our longer lives, and provide the missing piece to building a better future for all. One need only look at world events to see urgent needs. From massive immigration and population shifts to climate change to threats of conflict, violence, and war, the list goes on. Governance systems around the world are anachronistic for the rapid changes and long-term perspectives demanded by our challenges, and leaders are struggling to create enough popular support for the transformations we need. And then, of course, there is the worry that attending to this new, large generation of older people in the world can itself distract or even bankrupt us. When we are confronted with all of these concerns, it seems easy to miss the point of the immense achievement that societies accomplished over the 20th century: We are becoming a world in which life expectancy at birth is 76 years old. By 2050, 20 percent of the world’s population—2 billion people—will be 60 or older. Yet having added more than 30 years to our life expectancy, we don’t have a vision for what to do with those added years. Older adults want to continue to have an impact. It is worth a look at just how we managed to reach this remarkable moment. Decreases in death during childhood and at childbirth from infectious diseases and environmental causes—primarily through public health investments, coupled with education, poverty alleviation, and, more recently, medical care—have led to longer, healthier lives. Now almost every country has gone past what social scientists have called the First Demographic Dividend, which resulted from the transition from the high mortality of an agrarian society to one with predictable declines in child mortality, declining fertility rates, and children living to adulthood. Those grown children then created a large bulge of productive workers, which is the world’s Second Demographic Dividend. Most societies are now at various stages of this Second Demographic Dividend, which can induce accumulation of national wealth and greater individual savings across longer lives. However, its power is dependent on young people succeeding. Too many, though, are undereducated and jobless. In fact, some developing countries worry that they are wasting their demographic dividend by not having enough jobs for their young adults to create economic advancement. Perhaps the greatest opportunity of the 21st century is to envision and create a society that nurtures longer lives not only for the sake of the older generation but also for the benefit of all age groups—what I call a Third Demographic Dividend. To get there requires a collective grand act of imagination to create a vision for the potential of longer lives. With the proper investment, we can harness the untapped opportunities of aging societies. There is growing evidence that generations within a family offer real support to one another and that there is a high return on investment for government programs that include older people in the definition of family. But this will take work. Our current policy metrics are outdated for this new opportunity. For instance, one common measure of how the working age population can support those who are older and dependent is the Old Age Dependency Ratio (OADR). It tells us that we will have decreasing ability to support a growing and presumably dependent older population because the working age population is shrinking. But this ratio biases us against the value of older adults, who are the world’s only increasing natural resource. Relying on this outdated ratio, many policymakers are seeing only a problem—and not a solution. As The Elders demonstrate, the assets and the critical mass of older adults globally can be the force we need for a better future. And already we are starting to appreciate some of the opportunities provided by aging societies. Not least is that the productivity and expertise of older workers are increasingly substantiated and valued, and we see greater interest by older adults in continuing to work for pay after age 60. At the same time, they are a new market for products and services geared to those 60 and older. New products and services can mean more jobs and opportunities for prosperity. But this potential can be realized only if we debunk a number of myths about older people. Contrary to conventional wisdom, the evidence indicates that: - Societies where people live longer are not poorer; they are wealthier. - Being older does not necessarily mean dependency, particularly when people have made investments throughout life in health and education. - Paid work for older adults fuels a stronger economy and creates more jobs for the young. - Older workers bring experience and expertise, providing invaluable knowledge and reliability. - Multigenerational workforces are more productive, not less, especially when the business is innovative. - Investments in the health of older workers, and of all employees, aren’t expenses to be minimized but are enhancements to productivity and bring reductions to health care costs as workers age and continue employment. Indeed, many older people already know this. Challenging the stereotypes of dependency, many older people don’t seem to want to retire, do nothing, and divorce themselves from interactions with their families and the world. Rather, many want to find ways to stay engaged. Whether it is the rural elders throughout the world organizing programs to improve opportunities for young people and lifting up the well-being of the whole community, or the countless older adults providing hours of service through their churches, synagogues, or mosques, or as poll workers, or in service programs, older adults are assuming roles for the betterment of their communities. In studies conducted in Mexico, the United States, Spain, Germany, Lithuania, Japan, Australia, and Kenya, the findings have been the same: Fulfilled generativity—that notion of the pleasure derived from nurturing younger generations—is a key factor in life satisfaction for older adults. We have also learned that older adults actually seek to use their time to have impact and want to improve the future for others. When I started Experience Corps in Baltimore in the mid-1990s with Marc Freedman and Tom Endres, we saw it as a new model for senior service with far-reaching benefits. The program assigned older volunteers to serve in public elementary schools to help children succeed academically. At the same time, the health of the older volunteers improved while schools and communities involved grew stronger. In the early years of the program, I did a lot of the shoe-leather recruiting of volunteers. Our potential recruits’ question was always: Will this matter? Will this program, in which we work together, have more impact than I can have alone? Older adults want to continue to have an impact. One reason is that it’s good for them: There is actually a name sociologists use for those who retire with no daily expectations for themselves—the “roleless role.” And we are learning that days without meaning and purpose deprive people of a key part of successful aging: knowing that you left the world better than you found it. Further, full retirement leads to ill health and depression for many. Data from the U.S. Health and Retirement Study, sponsored by the National Institute on Aging and the Social Security Administration, show that complete retirement leads to a 23 to 29 percent increase in difficulties associated with mobility and daily activities, an 8 percent increase in illnesses, and an 11 percent decline in mental health. Conversely, data from all regions of the world show that paid work and volunteering in older age contribute independently to the maintenance of physical and mental health in aging. It is critical to note that the popular impression—at least in the United States—that older people don’t contribute to society does not hold up under scrutiny. Rather, the unpaid contributions of older people to society have high value, but we don’t have adequate metrics to show this. For example, in the U.S., the hours of in-kind informal caregiving by older adults in 2012 had an economic value of $160 billion, and volunteering was valued at $78 billion. This is equivalent to what the United States pays for long-term care. But the Old Age Dependency Ratio, as I’ve noted earlier, does not capture this value, even as policymakers rely on it as the basis for decision-making. The metric compares the number of 18- to 64-year-olds in the population with the number of people 65 and older, assuming that the younger ones are productive workers and the older are dependent. This misses the fact that older people are neither uniformly dependent nor nonproductive, leaving us without metrics that capture the value of their contributions. If the OADR was modified so that only those who are 65 and dependent are compared with the working age population, the OADR for the U.S. would improve by one-third. Metrics that assume all older adults are dependent indicate that society can’t afford social protections, missing the value of the contributions to society and future generations that older people bring. Finally, beyond debunking these economic opportunities and negative myths, we also now have evidence that the attributes of older age, if nurtured on an individual and societal basis, would allow older adults to greatly strengthen our collective future. For example, this means policymakers need to redefine “family” to include elder members. There is growing evidence that generations within a family offer real support to one another and that there is a high return on investment for government programs that include older people in the definition of family. A South African study found that older grandmothers in townships who received pensions had granddaughters who became taller and healthier and stayed in school longer. This complements one of the explicit intentions of the creation of the Social Security system in the United States: that it was to be a family policy, with income for older adults serving to protect the standard of living of their younger family members who might otherwise have to support them. We are also gaining more knowledge about the unique assets of older adults. Research indicates that older adults have knowledge and expertise in problem solving, experience in handling complex problems, and more optimistic outlooks, and that many have developed their own subjective judgments about what is important in life. These assets could be combined with the generative needs of older adults. We could design new roles for older age, as The Elders have, to capitalize on age-associated abilities and meet goals. Older age can be a pay-it-forward stage of life, in which the needs of older adulthood could be aligned with the world’s needs to protect and create a better future. But most existing jobs in the world were designed when life expectancy was 47, and roles have generally not been designed for the assets of older age. Jobs and volunteer roles don’t make use of the integrative problem-solving and creative capabilities of older age, and they are not designed for high generative impact or taken to scale for benefits to society. The evidence now indicates that if we increased investments in three key areas—education, health care, and social institutions—in every country, we could unlock the untapped opportunities of our longer lives, create meaningful and important roles for the last third of life, meet world needs more effectively, and build successful aged societies. Greater investment in education at every stage of life would prepare all generations for the future, especially in a world increasingly reliant on technology. More investment in health care would unlock the opportunities of longer lives, because we now know that at least half of the chronic health concerns of older age can be prevented. Those who arrive at age 70 healthy are tracked to stay that way, and even the frailty and dementia of older age can be delayed or prevented. Education and health are synergistic, with new evidence showing a 25 percent decline in dementia rates in the U.S. in the past 12 years among those who have high school or greater education and access to health-promoting and disease prevention resources and healthy environments. Finally, with increased support for new social institutions, we can unleash the generative goals and unique assets of older adults at scale while also designing for the health of older adults. The Elders are just one inspiration for this approach. There are others, such as Experience Corps, which has shown that high-intensity 15-hour-per-week service strengthens children’s academic success, older adults’ cognitive and physical health, school climate, and teacher effectiveness. Although there have been any number of examples like these—and many more could be imagined—they have not been taken to scale to have the wide impact necessary. The past decades have given us the evidence and direction to capitalize on this transformational moment. The assets of longer lives and societal investments in health, education, long-term care, and social protections, and in new roles for later life, can help solve our thorniest challenges, build social cohesion, strengthen our communities, and position youth for greater success. Further, creating metrics that can show the value of this Third Demographic Dividend will enable us to better meet the needs, and handle the costs, of aging societies. Time is of the essence; no country is prepared. Over the next 40 years, young people will not just survive—a major accomplishment of human investment—but will become the older adults in an aged society. Their countries need to be ready for them.
<urn:uuid:db84c4da-8a44-457d-a9d0-464c12b0f004>
CC-MAIN-2022-33
https://www.pewtrusts.org/en/trend/archive/winter-2018/getting-more-from-a-longer-life
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00604.warc.gz
en
0.958314
2,978
2.78125
3
How the Economic Machine Works by Ray Dalio How the Economic Machine Works is a video made by Ray Dalio. It explains how the economy works in a capitalist system. I learned that the economy is governed by two cycles: the long-term debt cycle and the short-term debt cycle. These cycles depend on the amount of credit in the economy and the interest rates. Ray Dalio is the founder and co-chairman of Bridgewater Associates, which, over the last forty years, has become the largest and best performing hedge fund in the world. He is the author of #1 New York Times Bestseller and #1 Amazon Business Book of the Year, Principles. Dalio has appeared on the Time 100 list of the most influential people in the world as well as the Bloomberg Markets list of the 50 most influential people. He lives with his family in Connecticut. Summary of How the Economic Machine Works, by Ray Dalio The economy is the sum of all the transactions made. A transaction is made when one provides a good or a service against money. Transactions are made by different actors: people, businesses, banks, and the government. People, businesses, banks, and the government. The government is the biggest spender. It is composed of two parts: - The central bank, which controls the amount of money in the economy and the interest rate of the debt - The central government, which collects taxes and spends them. The government is made out of the central government and the central bank. Money can be obtained from two sources: income (salary) and credit (borrowing money). You get money through a salary, or by borrowing from the bank. Your income depends on your productivity. The more productive you are, the more money you will earn, the more money you will be able to borrow because lenders lend money to those that can pay it back. You can’t borrow money without earning money. The borrower must have an income that will let him repay, or he must possess a collateral that will be sold to repay the debt in case he cannot. If the collateral loses value or if the borrower’s salary decreases, the borrower becomes less creditworthy. It’s important to understand that the way the economy is structured is that one man’s spending is another man’s income. One man’s spending is another man’s income. When you spend to buy a beer, you enable the bartender to make a living. If you increase your productivity, your salary will increase, so you are more likely to spend more at the bar, and the bartender will earn more money, so he will spend more at the butchery and the butcher will earn more money, etc -> the economy grows and produces more. However, it doesn’t matter much in the short term because productivity stays mostly flat and doesn’t really fluctuate (understand: people rarely increase their salary), so it doesn’t influence the economy much. What influences it though, is credit. The Short-Term Debt Cycle Credit allows borrowers to get money now, and repay it later. If you get money now, you will have more to spend. When you spend more at the bar, the bartender increases his salary etc. -> credit enables the economy to grow. Good! But we don’t want too much of it. When the money spent in the economy grows faster than the economy produces goods and services, prices rise and when prices rise, we call this inflation. Eg: if the butcher is selling 10 steaks and there are 11 buyers, he will raise his prices. The central bank does not like inflation. So, it will prevent people from borrowing. To do so, it increases interest rates. Since borrowing becomes more expensive, people borrow less. If they borrow less, they spend less, so the economy contracts a little. But it’s not all. At some point, debt has to be repaid. To do so, borrowers need to decrease the amount of money they spend. No more drinks at the bar! So the bartender will earn less money, which will make the butcher earn less money, etc. The productivity of everyone decreases, which drives the income down. When people spend less, everyone is earning less. People buy less, so prices go down. This is called deflation. Economic activity decreases and we have a recession. If the recession becomes too severe (understand: people are not buying enough) and inflation disappears, the central bank will lower interest rates again to get people to borrow and consume again. When interest rates decrease, borrowers have to repay less debt. Spending increases and the economy expands again. As you can see, spending is constrained only by the capacity of lenders and borrowers to lend and borrow. When credit is easily available, the economy expands. When credit isn’t easily available, the economy shrinks. Notice how this cycle is controlled primarily by the central bank. This short-term debt cycle lasts five to eight years and happens over and over. The short-term debt cycle The level of debt as the cycles go. Notice that at the end of each cycle, we finish with more growth, but also with more debt. Because people love spending (and many of them never repay). They have an inclination to borrow and spend more instead of paying back debt, it’s human nature. Because of this, over long periods of time, debts rise faster than income, creating the long-term debt cycle. The Long-Term Debt Cycle Despite people becoming more indebted, lenders are always happy to extend credit. Why? Because people only take into account short-term data: rising salaries and rising asset values (homes) help borrowers remain creditworthy. Everyone is buying stuff (goods, services, assets) with borrowed money. When people do that, prices reach heights they shouldn’t. We call it a bubble. As long as salaries continue to rise, debt can be repaid, so asset value increases. People borrow ever bigger amounts of money to buy these assets as investments causing their prices to rise even higher. But this obviously cannot continue forever. And it doesn’t. At some point, the need to repay debt grows faster than salaries, forcing people to spend less. Since one man’s spending is another man’s income, incomes decrease. This makes people less creditworthy, causing borrowing to go down. Debt repayments continue to rise, which makes spending drop even further and the cycle reverses. Scrambling to repay debt, borrowers must sell assets. The rush to sell assets floods the market while at the same time, spending falls. The stock market collapses, the real estate market tanks and banks get into trouble because they lent too much money. As asset prices drop, the value of the collateral borrowers can put up drops which makes borrowers even less creditworthy. People feel poor, credit rapidly disappears. Less spending -> less income -> less wealth -> less credit -> less borrowing, and so on. It’s called a deleveraging. In a deleveraging, people cut spending, incomes fall, credit disappears, asset prices drop, banks get squeezed, the stock market crashes, social tensions rise and the whole thing starts to feed on itself the other way. This appears similar to a recession but the difference here is that interest rates can’t be lowered for two reasons: first, they are already low. Second, borrowers don’t want any more debt anyway because the debt burden is too big and they won’t be able to repay. The lenders realize they have to stop lending. The economy has become not creditworthy. So, what do you do about a deleveraging? You must decrease the debt burden and there are four ways to do that: - Businesses and governments cut their spending This is called austerity. While we might expect the debt burden to decrease, the opposite happens. Since everyone stops spending, everyone stops earning. Salaries fall faster than debt repayment, which makes the debt/income ratio worse. When a borrower doesn’t repay the bank, people rush to the bank to withdraw money, banks get squeezed and people, businesses and banks default on their debts. This severe economic contraction is a depression and a big part of a depression is people discovering much of what they’ve thought was their wealth is not there anymore. Debt burden must therefore be lightened, which leads to the second point. - Debts are reduced through defaults and restructuring. Many lenders don’t want their assets to disappear and agree to debt restructuring (changing the terms of the debt. Eg: paying less, paying more slowly, etc). Even though debt disappears, debt restructuring causes income and asset values to disappear faster (because people are refunding their debt slower), so the debt burden continues to get worse. All of this impacts the central government because lower incomes and less employment means the government collects fewer taxes, but it also means it needs to increase spending to care for the unemployed, to conduct daily business, and to create a stimulus plan. Governments’ budget deficits explode. They need to find money somewhere, which leads to the third point. - Wealth redistribution Since governments need more money, they increase taxes on the rich and redistribute the money to the less fortunate. They resent the rich for being rich, while the rich resent the poor for having to give them their money. Social disorder can break out, tensions can arise in and between countries. Since most of what people thought was money was actually credit, when credit disappears, people don’t have enough money and are desperate for it. Since the interest rate is already low, and no one wants to borrow money, we need to go to the last point. - The central bank prints new money. Unlike cut in spending, debt reduction and wealth redistribution, printing money is inflationary and stimulative. Inevitably, the central bank prints new money out of thin air and uses it to buy financial assets and government bonds, which drives asset prices up and makes people (that own assets) more worthy of credit. With that money, governments can pay for social security and launch their stimulus plan. While this increases people’s income and lowers the economy’s total debt burden, it increases the country’s debt. This is very risky (especially for countries that import a lot from abroad). Policymakers must balance the four ways that debt burdens come down. The deflationary ways (austerity) need to balance with the inflationary ways (printing) in order to maintain stability. If balanced correctly, there can be a beautiful deleveraging where debts decline relative to income, real economic growth is positive and inflation isn’t a problem. It is achieved by having the right balance which requires a certain mix of cuts of these four methods. But will printing money not trigger inflation? It won’t if it offsets falling credit (understand: as long as you don’t print more than the level of debt). Remember, spending is what matters. A dollar of spending from a salary is the same as a dollar of spending from a credit card. By printing money, the central bank can make up for the disappearance of credit with an increase in the amount of money. In order to turn things around, the central bank needs to not only pump up income growth but get the rate of income growth higher than the rate of interest on the accumulated debt (income needs to grow faster than debt grows). You need to print enough money to get the rate of income growth above the rate of interest. However, printing money could easily be abused because it’s so easy to do and people prefer it to the alternatives. The key is to avoid printing too much money and causing unacceptably high inflation. If policymakers achieve the right balance, a deleveraging isn’t so dramatic, growth is slow but debt burdens go down. That’s a beautiful deleveraging. When incomes begin to rise, borrowers begin to appear more creditworthy, and when borrowers appear more creditworthy, lenders begin to lend money again. Debt burdens finally begin to fall, people can spend more and the economy begins to grow again, leading to the reflation phase of the long-term debt cycle. Deleveraging takes roughly a decade or more for debt burdens to fall and economic activity to get back to normal, hence the term “lost decade”. So, in summary, there are three rules of thumb. First, don’t have debt rise faster than income because your debt burdens will eventually crush you. Second, don’t have income rise faster than productivity because you’ll eventually become uncompetitive (don’t pay people higher than the value they produce). And third, do all that you can to raise your productivity because in the long run, that’s what matters most.
<urn:uuid:9efacd9d-a7df-43d7-ae2e-157f0b01ae77>
CC-MAIN-2022-33
https://bestbookbits.com/how-the-economic-machine-works-by-ray-dalio/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00604.warc.gz
en
0.944802
2,763
2.859375
3
What We Do—And Don’t—Know About Omicron This story is a part of Science Friday’s coverage on the novel coronavirus, the agent of the disease COVID-19. Listen to experts discuss the spread, outbreak response, and treatment. This week, the Omicron variant was detected in the United States, with the first case identified in California. The announcement joins a rush of news about the latest coronavirus variant: Last week, South African researchers first identified and then sequenced the variant. Since then, scientists all over the world have been working overtime, trying to understand this heavily mutated new strain. Omicron has 32 mutations in the spike protein alone. But more mutations don’t necessarily mean it’s more contagious than the Delta variant, or more likely to evade the vaccine. Scientists still need a little more time to figure out what these genetic changes might mean for the pandemic. Katelyn Jetelina, assistant professor in the University of Texas School of Public Health talks with Ira about how scientists are compiling data on omicron, both inside and outside of the lab. Jetilina is also the author of the newsletter, “Your Local Epidemiologist.” To hear more of Jetilina’s thoughts on the latest updates, read her explainer on what we know and don’t know about Omicron. Invest in quality science journalism by making a donation to Science Friday. Katelyn Jetelina is an adjunct professor in the UTHealth School of Public Health, and author of the Your Local Epidemiologist newsletter. IRA FLATOW: This is Science Friday. I’m Ira Flatow. Later in the hour, a look at the disruptive technology of quantum computing– what it is, where it is now, and where it is going. But first, the Omicron variant has been detected in the US, the first case identified this week in California. Last week, South African researchers identified and then sequenced the variant. And since then, scientists all over the world went into overdrive trying to understand this heavily mutated new strain. And I mean Omicron has 32 mutations in the spike protein alone. More mutations don’t necessarily mean it’s more contagious than the delta variant or more likely to evade the vaccine. We just need to give scientists enough time to figure it out. Joining me now to help us understand how scientists are compiling data on Omicron, both inside and outside of the lab, is Katelyn Jetelina, assistant professor in the University of Texas School of Public Health in Dallas. She’s also the author of the newsletter Your Local Epidemiologist. Thanks for being with us today. Welcome to Science Friday. KATELYN JETELINA: Yeah, thanks for having me. I’m excited to be here. IRA FLATOW: Well, now that we have seen cases in the US, wasn’t it always inevitable that Omicron would arrive here? KATELYN JETELINA: Fortunately, we are fast, but unfortunately, still once we identify a case or a variant, that means it’s probably been circulating under our radar for a little while before. And we’ve seen that cases pop up in Europe before even the cases that were identified in South Africa. So we had a hunch it was in the United States. It was just a matter of time of us finding that needle in a haystack. IRA FLATOW: And what is it about Omicron that has you and other scientists on such high alert? Is it the number of those mutations? KATELYN JETELINA: Well, certainly the number of mutations got our attention because there were a lot. There are a lot compared to, for example, delta, and specifically the mutations on the spike protein. So for example, with delta, we had nine changes on the spike protein. With Omicron, we have 32. And we pay attention to this spike protein specifically because this is the virus’s key into our cells. And if the virus changes this key or even finds a different key for a different door, we need to know about it, and really pay attention to it and figure out if that change on the spike protein, one, increases transmissibility, two, has the ability to escape our vaccine or infection-induced immunity, and/or, three, increase the severity of disease, like hospitalization or death. IRA FLATOW: Does it share any mutations with the delta variant, in terms of giving you a hint of how it might act? KATELYN JETELINA: Yeah, so– and this is what also kind of brought this onto our radar– so Omicron actually has a number of mutations we’ve seen on other variants of concern, like delta, like you said, but also alpha and gamma and beta. In fact, there’s nine mutations out of those 32 that we’ve seen on previous variants of concern. There’s one, in particular. It is called P681R, if anyone wants to know. And it’s a particular mutation called a furin cleavage. And that was on delta, as well, which made it so much more transmissible, this one little change. Unfortunately, with Omicron, it has this furin cleavage, as well as a second furin cleavage. And so we’re trying to figure out what the two together really means. IRA FLATOW: The fact that it was first detected in South Africa doesn’t necessarily mean it first appeared in South Africa, correct? KATELYN JETELINA: Yeah, no, and it was actually first discovered in Botswana on November 11th, and then three days later discovered in South Africa. And we really owe it to the scientists in South Africa for, one, identifying it, two, telling the world so scientists, thousands of scientists could be working on this as quickly as possible, as well as being very transparent about what’s happening on the ground, really walking us through case growth, what they’re seeing at the hospitals, et cetera. IRA FLATOW: Let’s talk about how likely it is that Omicron will evade the vaccine. What’s your take on that? Or do we not know that yet? KATELYN JETELINA: So we don’t know that yet. We certainly have hypotheses. And really, what’s driving those hypotheses is that some of the changes on Omicron reflect the changes we saw in beta. And beta is one of the previous variants of concern that have escaped our vaccine protection the most. Now, I think it’s really important to realize or address that immune escape isn’t a binary event. It’s not yes or no. We’re not going to start from square one. Immune escape is really more like corrosion, like picking away at the sides of our protection. So we hypothesize that this Omicron variant will have a negative impact on the level of protection we have, but not fully. We’ll still have some protection against severe disease and death. And that’s what scientists right now are trying to figure out. IRA FLATOW: And could it be less deadly than the variants we have now? KATELYN JETELINA: It certainly could. The variant changes and mutates randomly, and what all of the virus wants to do is survive. And if a virus is killing off their hosts, it’s not going to survive. And so there’s this balance between severity as well as immune escape. So it can outsmart vaccines, as well as a balance and tradeoff with transmissibility. Again, I feel like I keep saying this, but we don’t know yet the extent in which that will happen. IRA FLATOW: Yeah. We like it when scientists say they don’t know, rather than faking it. Speaking of faking it, tests. The tests we take for discovering whether we have the virus or we had it before, will this new strain be picked up for the tests that are currently in our drugstores? KATELYN JETELINA: So I’ll start with PCR tests. And we got actually some really great news from South Africa on this, that PCR tests can actually tell the lab whether it’s Omicron or not. And this typically isn’t the case. Usually, we would have get this swab of the PCR, that PCR goes to a special lab for genomic sequencing. It can take a few weeks to know which variant caused that infection. With Omicron, though, it has a really special signal. And we actually saw this before with alpha. And it has this special signal on the PCR directly. So when a PCR is positive, it lights up three channels, typically. With Omicron, it lights up two channels, which will indicate it’s Omicron versus delta. And this is really amazing news because it means we can track the virus much easier and much quicker within the United States, and then across the world. And that’s PCR. And so then we also have rapid antigen tests at our corner pharmacies that we can buy over the counter. Those will not tell us what variant it is, but it still can detect Omicron. We got some confirmation from the drug companies that it does still work. And that’s because those rapid antigen tests test for something other than the spike protein that hasn’t changed. And so that’s also great news, as well. IRA FLATOW: OK, now if someone was infected with the delta variant, would that protect them against Omicron? KATELYN JETELINA: Yeah, this is a really good question, and an important one we’re trying to answer, right? So because the United States was hit so hard, and continues to be hit so hard with delta, one great question is what does the infection-induced immunity, how does that protect against Omicron. And unfortunately, a day or two ago, the WHO came out with their briefing and said that they have preliminary evidence showing a high reinfection rate among those with infection-induced immunity. So those that have gotten COVID-19 before, but don’t have the vaccines. And that’s really important information because it will tell us, you know, it’s been almost 90 days since our delta wave, or our main one, and that will tell us and help us predict how high the COVID-19 wave will be this winter once Omicron, or if and when Omicron enters the scene. IRA FLATOW: How do you piece together all of the information to get a complete picture about Omicron, and where it stands with the other variants and the virus itself? KATELYN JETELINA: Yeah, it’s hard for an individual to do. I’m trying to keep track of it. But from a scientific perspective, we really need to marry two sources of data. And these sources of data kind of come from two different angles. One is we are running lab tests right now. We call these lab studies. And what they’re doing is seeing how our antibodies attach, given Omicron’s changes, and if so, how tightly do these antibodies attach. And to answer this, scientists actually have to develop or engineer, it’s called a pseudovirus. And so they take another virus and attach the Omicron spike protein to it, and let it grow in a lab. And this is why we keep hearing we’ll know in two weeks, we’ll know in two weeks, is that because it takes time for that to grow. But they essentially grow a virus that mimics Omicron. And once they have enough of this sample on a Petri dish, people’s blood that had the vaccine, mix it with this pseudovirus, and see how our antibodies respond, really on a micro level. And then so this is more like lab scientists. On the other end, we have to marry– I call it real-world data. And that’s epidemiology of what’s happening on the ground, what are we seeing was spread, how quickly is it spreading, what’s happening at the hospitals, is it severe, is it not, what is the symptomology that people are showing. And that’s really important because lab studies are very different than the real world, right? In the lab, we have it’s temperature-controlled, everything’s sterile, we’re on a Petri dish. That doesn’t necessarily always pan out to what happens in our environment, with our genetics, et cetera. And so having those two pieces really gives us the, quote unquote, true perspective on what’s happening out there. IRA FLATOW: Well, thank you for sharing your true perspective on what’s happening out there. KATELYN JETELINA: Yeah, no, thanks for having me. IRA FLATOW: Katelyn Jetelina, assistant professor in the University of Texas School of Public Health in Dallas. She’s also the author of the newsletter Your Local Epidemiologist.
<urn:uuid:80c11e2d-9670-483d-8862-7c3fc8406819>
CC-MAIN-2022-33
https://www.sciencefriday.com/segments/covid-omicron-variant/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00405.warc.gz
en
0.944245
2,979
3.1875
3
At first you might not think the Sierra Club and Planned Parenthood of New York have much in common. But dig deeper and you can see why the two organizations are grappling with the racism of iconic figures John Muir and Margaret Sanger, amid a national reckoning on race. Both groups have their roots in the American progressive movement of the early 20th century, which was led by pioneering white activists who promoted major reforms but often clung to racist beliefs, including eugenics. Last week the Sierra Club announced it would begin to distance itself from its first president, the conservationist John Muir, whose work is credited with leading to the creation of national parks such as Yosemite, the Grand Canyon, and Redwood. The organization cited “derogatory comments” Muir made about African Americans and Native Americans — at various times he called them dirty and lazy — though it conceded his views evolved later in life. The Sierra Club also cited Muir’s friendships with white supremacists and eugenicists Henry Fairfield Osborn, David Starr Jordan, and Joseph LeConte. Jordan, the founding president of Stanford University and a member of the board of directors while Muir was the Sierra Club president, was a racist and a proponent of eugenics, advocating forced sterilization laws targeting Black, Latinx, and Indigenous communities, as well as the poor, the disabled, and the mentally ill. Richard White, a professor of American history at Stanford, was surprised by the timing of the statement from the Sierra Club, saying, “This kind of stuff has been very well known for a long time.” In regard to Muir and Jordan, he said, “there is nothing extraordinary in the things they said. These are pretty conventional 19th-century (white) attitudes,” attitudes that wouldn’t fly today. White elaborates by explaining Muir’s opinion of Native Americans. Although Muir respected Native Americans for their skills as mountaineers, he simultaneously viewed them as inferior. “There is a sort of admiration of their skills but at the same time he doesn’t admire them at all because of his fairly conventional ideas about 19th-century progress and civilization,” White said. Is Racism Embedded in Conservationism? Most problematic for White is that Muir’s attitudes toward Native Americans appear almost central to his vision of conservation. Muir believed America was a divine and pristine wilderness untouched by humanity, even though the forests were home to Native Americans for thousands of years. Actually, Native Americans were stewards of the land, altering landscapes to benefit themselves and the ecosystem, using fires for wildlife management and fire-prevention, creating the picturesque landscapes Muir romanticized. “Believing that the land is untouched means you have to exclude,” White explained. “When you have native peoples who not only alter it now but have altered it for a long time, they have to be taken out of places where they have lived,” White said. White challenges people to think deeply about the racial constructs that allowed national parks to be created. “What happens when you create a wilderness area and you’ve eliminated people to do so? Why was it people like John Muir thought this was permissible?” he asks. Michael Brune, executive director of the Sierra Club, believes that those protecting the outdoors practiced willful ignorance of the history surrounding Native Americans being forced off their lands. In his statement on Muir, he also points out that often those who today can afford to focus on preserving the wilderness are those who are insulated from systemic racism, who may also call upon the organization to stay in its lane and stop talking about issues of race, equity, and privilege. That view is echoed by Robert Bullard, an environmental justice advocate and professor at Texas Southern University. When Bullard was to receive the John Muir award from the Sierra Club in 2013, he had reservations about accepting. “I knew his (Muir’s) history, views, and ideology on race, and the people he surrounded himself with,” Bullard said. “John Muir was no friend to native indigenous people and Black people.” Bullard said he finally agreed to accept with the provision that the Sierra Club work to undo and erase their legacy of racism, which he asserted has persisted in the issues it has avoided, including environmental racism. White agrees that the issues of privilege go back to the beginning. Nativist tendencies have always existed in conservationist circles, according to White, who explained that the conceptual origins of “wilderness” were a response to a fear of a decline in white masculinity in the 19th century. “The reason or motivation is that wilderness is seen as a way to rejuvenate white manhood,” he said. The decline was in the white middle-class, and “the restoration of their manhood by going back into the wilderness was always associated with the sense that they were losing control of their own country, largely in terms of immigrants,” according to White. “It wasn’t very long ago,” he noted. “when there was a strong anti-immigration emphasis amongst a section of the membership of the Sierra Club which was clearly racially motivated. There has always been a strain of those things.” Eugenics and Conservationism Assuming the conservation movement was intertwined with the eugenics movement, however, is not entirely accurate, according to some historians. Donald Worster, an American history professor at the University of Kansas, explained that the conservation movement was separate from the eugenics movement. “There were many people who were considered progressives in their day who were attracted to the eugenics movement. That was mostly after 1910 and [in the] 1920s. Some of it was a concern on immigration and what was happening to the white Anglo-Saxon gene pool.” White added, “Not all Darwinians are eugenicists and not all conservationists are eugenicists. Sierra Club had eugenicists among members but that doesn’t mean Muir was a eugenicist.” On Muir’s associations with eugenicists, or their presence on the Sierra Club board of directors, Worster said, “It’s important to remember that John Muir didn’t found the Sierra Club, and he did not recruit these people as members. He was recruited to be the president.” Worster questions the Sierra Club’s charge against Muir, calling it “guilt by association.” Margaret Sanger and Eugenics Eugenics was front and center when Planned Parenthood of Greater New York (PPGNY) announced last week that it would remove the name of Margaret Sanger, its founder and a pioneering birth control advocate, from one of its health centers, citing a racist legacy and eugenics advocacy. “The removal of Margaret Sanger’s name from our building is both a necessary and overdue step to reckon with our legacy and acknowledge Planned Parenthood’s contributions to historical reproductive harm within communities of color,” said Karen Seltzer, board chair at PPGNY. “Margaret Sanger’s concerns and advocacy for reproductive health have been clearly documented, but so too has her racist legacy. There is overwhelming evidence for Sanger’s deep belief in eugenic ideology, which runs completely counter to our values.” Despite this narrative, Sanger still has her supporters in academia. Jean H. Baker, a professor of history at Goucher College in Baltimore, is one of them. “In the current climate of mea-culpas, Planned Parenthood of New York fell into a trap,” she said. Baker explained that the Roman Catholic Church and evangelicals have been assailing Sanger’s reputation in order to attack birth control for years. “The way to do that,” according to Baker, “was to call her racist, which is easy to dispute, and a eugenicist,” which has racist roots and is much harder to dismiss. Regarding claims that Sanger was racist, Baker explained that to believe birth control was an effort to destroy African Americans was a false claim. Sanger is often quoted as saying, “We do not want word to go out that we want to exterminate the Negro population, and the minister is the man who can straighten out that idea if it ever occurs to any of their more rebellious members.” Regarding this infamous quote, Baker emphasizes context. “She was alert to the fact that some were claiming birth control as genocidal.” In that context, Sanger was combating that narrative, allying with Black ministers who agreed with her. “The number one priority for Sanger was birth control,” Baker said. In the 1930s, Sanger created a birth control clinic in Harlem because “she wanted Black women to have the same access to what she considered to be the tool for human improvement as white women did.” Peter Engelman, associate editor of the Margaret Sanger Papers Project, added that, “[Sanger] responded to calls from Black women and Black leaders within the Black community particularly in Harlem to help them increase access to birth control.” Baker noted that Sanger was also friends with Black leaders such as W.E.B. Du Bois and E. Franklin Frazier, with whom she discussed opening birth control clinics in the South. Sanger also advocated for desegregation. However, when Sanger began her “lonely battle to change American attitudes towards birth control, she wanted to get the support of eugenicists,” Baker said. “She published some of their articles in the Birth Control Review. She certainly knew what they were after and she never disclaimed what they were doing. Somewhat naively she got caught up in this movement.” At the same time, many eugenicists were against what Sanger was doing, according to Engelman. Eugenicists wanted middle- and upper-class white families to have more children. “Most eugenicists opposed her work, finding it too radical and arguing that birth control mainly reached educated women and resulted in smaller families among the ‘better classes.’” Eugenics was seen as a method to address social problems or manage individuals deemed socially undesirable. Individuals with supposedly inferior genes, which eugenicists said included those of certain races or individuals with mental or physical disabilities, were to be discouraged from reproducing. Thirty-two states had eugenic sterilization laws, and the United States’ eugenics programs predated and are said to have inspired those in Nazi Germany. Many eugenicists feared the United States’ immigration policies would threaten Nordic racial preservation, comparing immigration to the introduction of an invasive species. The legality of eugenics-based laws was reaffirmed in 1927 in Buck v. Bell, a case in which the Supreme Court ruled in an 8-1 decision that compulsory sterilization of the unfit was constitutional. In his majority opinion, Justice Oliver Wendell Holmes infamously wrote, “three generations of imbeciles is enough.” The majority included former President William H. Taft, then chief justice of the Supreme Court. Engelman is critical of Sanger’s opinions on the mentally and physically disabled and notes that her writings on eugenics primarily concern “negative eugenics,” which discourage the “unfit” from procreating. “For Sanger, the unfit included people with physical or mental ‘defects,’ alcoholics and drug addicts, and those too poor to clothe, feed, and shelter a child,” Engelman said. Sanger, however, disagreed with eugenicists who broadened “unfit” to include groups based on race, ethnicity, and religion, Engelman explained, adding, “She never defined fitness for parenthood in racial terms. She wrote in 1934, ‘If “unfit” refers to race or religion, then that is another matter which I frankly deplore.’” Still, Engelman maintained that, “Although she was not a racist and did not at any time pursue racist policies, she did look the other way when others made racist statements. She also did not hesitate to make use of flawed and often racist social science research to make sweeping generalizations about the poor and disabled.” Referring to the sometimes controversial reevaluations of figures of the past, including both Sanger and Muir, Bullard summed it up this way: “There are a lot of people with a lot of baggage in their history. What people are doing today is running these people through the racial justice lens. Some people see that as unfair. I don’t.” Related front page panorama photo credit: Adapted by WhoWhatWhy from Wellcome Library / Wikimedia (CC BY 4.0).
<urn:uuid:5194e7ff-5dea-490e-8212-634cfd963e3b>
CC-MAIN-2022-33
https://whowhatwhy.org/science/environment/judgment-days-for-john-muir-and-margaret-sanger/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00202.warc.gz
en
0.979259
2,735
3.3125
3
My post today has to do with a direct question asked by one of my MA students (to what extent is gender natural?) and with issues raised in the paper proposals of my Victorian Literature students, all about Charles Dickens’ Great Expectations. So, here we go. As you will recall, if you’re familiar with Dickens’ novel, the blacksmith Joe Gargery is constantly abused by his wife, Mrs. Joe, who is also psychologically and physically abusive towards her own youngest brother, Pip, whom she has raised in the absence of their dead parents. In relation to this, one of my students quotes a passage from an article by Judith Johnston which reads: “Mrs. Joe’s given name is never revealed in the text, significantly she takes the patronymic, Mrs. Joe, rather than any female name, because Mrs. Joe is a violent woman, possessing a violence more usually male than female” (1992: 97). So, violent women are not really feminine but masculine, hence her name. To begin with, we learn eventually that this woman is called Georgiana Maria like her mother and I have still known in my time women identified by their husband’s names, for instance in the name cards on mailboxes (Sr. Juan García and Sra. de García). I would say that ‘Mrs. Joe’ is either old 19th century low-class usage or this woman’s way of showing that she owns her husband and not the other way round. I see however no sense in the description of her violence as “more usually male than female” because it sounds like an attempt at exonerating all women from the charge of being violent: Mrs Joe feels masculine, therefore she is violent; if she were really feminine she would not be violent. Sorry but violence is violence and if it is committed more often by men in couples this is because usually the balance of power falls on the husband’s side. In Mrs Joe’s case she has claimed all the power over her abused husband Joe, who not only does not resist the situation but seems, like many other victims, even complicit with it (he does try to excuse Mrs Joe on the same grounds battered wives excuse their husbands). If, as Johnston does, you claim that a woman who abuses her partner is being masculine, then you are saying that victims are always feminine or feminized, thus associating femininity with victimhood. You are also denying women’s capacity to inflict violence on others while being no doubt feminine women. And their victims manly, as Joe is. Let me give you a chilling example of violence committed by women, which left me reeling with shock this week. In Málaga they have judged a young single mother in her early twenties who abandoned her seventeen-month-old baby girl to die of starvation while she lead what has been described as a frantic night life. Obviously, baby Camelia is not only the direct victim of her mother but also of the social values by which this young woman convinced herself that her right to have fun every night went beyond her duty to take care of her daughter. The mother had been offered help by the local authorities but she neglected to claim it. Instead, she got into this routine of abandoning her daughter every day for long hours, until she locked her in a filthy room for good, to die alone. There is no way this type of violence can be coded masculine yet if we code it feminine, which it appears to be in view of the mother’s gender, we are emphasizing that caring for children is a typically feminine ability which this woman is somehow lacking. In fact, the readers’ comments in the newspapers where I have read about this crime always emphasize that poor Camelia’s death is doubly heinous because her mother, who should have cared for her, abandoned her to die. The father, a violent guy banned from seeing his daughter under a restraining order, is never mentioned, though presumably he also had the duty of taking care of the baby. My point is that if caring for others were truly natural in biological women, as growing breasts is, this young mother would have naturally taken care of her baby. Her disinterest, and cruelty, show that there is nothing natural in mothers’ caring for babies, but plenty of socializing since childhood, when we girls are all given dolls to learn the ropes. By the way, the young mother appears to be mentally healthy, she is no psychopath, though we no doubt find her behaviour monstrous. Were am I going with all this? I’m expressing my tiredness with the way we attribute human behaviour (not only violence) to supposedly gendered traits. If a woman in assertive, then she is masculine. If a man is caring, then he is feminine. This persistent binarism is an obstacle for progress because for as long as individuals identify with a gender and that gender is identified with a set of traits there is no way gender can be reconfigured for good. I am beginning to think that Judith Butler’s notion of performativity works fine in theory but very poorly in practice. On a more positive note let me tell you about men and skirts. A few weeks ago a boy somewhere in Northern Spain, the equivalent of a high school senior, decided to wear a skirt to class, just to give it a try. He was taken to the school psychologist who, it can be surmised from the questions, treated him as a possible case of transgenderism, which he is not. Mikel, as the boy is called, was later punished by his parents, which led him to publish a TikTok video narrating that strange day in his life. The reaction was a collective protest by male students like him all over Spain who turned up the following day in school wearing skirts. The idea they supported, by the way, was not that each gender had the right to use other genders’ clothing but that clothing should be genderless. I still think we’re far from seeing young Spanish boys wearing dresses but, since girls wear trousers and nobody thinks today of them as men’s wear that might happen. We need time, and not only here. Look at the hullaballoo caused by ex-One Direction’s Harry Styles and his recent Vogue interview, in which he appears modelling dresses. “Anytime you’re putting barriers up in your life, you’re limiting yourself,” the cover blurb reads. And he’s right. So, why do we limit individuals, telling them that what they do is ‘too feminine’ or ‘too masculine’ if they feel that is part of who they are? And the other way round, why do we limit persons telling them that they must be ‘masculine’ or ‘feminine’ for that is in their nature? I’ll insist again that though bodies are a biological fact (though much more open to interpretation than we assume), our gendered behaviour is a social construction, still too depending on stereotypes attached to gender roles that should have been discarded long ago. At this point, then, perhaps I need to mention Minister Irene Montero’s new law to regulate official gender identity in Spain, also known as the Ley Trans. I must say that this is very similar to the Scottish law that caused J.K. Rowling to make a series of concerned comments after which she was accused of being transphobic. Basically, the two laws grant transgender persons the right to identify themselves in official documentation as individuals of a specific gender regardless of their biological bodies. As you can see, the intention is to make it easier for trans persons to be officially men or women just by stating their preference and without having to completely transform their bodies, if they choose so. Thus, a teen starting transition might immediately choose their new official identity rather than wait for years for a judge to grant that right on an individual basis, as it is done now. The problem is that in areas in which biological sex is still determinant, such as sports, this may have negative effects for a biological male might apply to compete as a woman (by gender, not by sex). Leaving Rowling aside, I must notice that a group of what the press has dubbed as ‘historic Spanish feminists’ (Amelia Valcárcel Bernaldo de Quirós, Ángeles Álvarez Álvarez, Laura Freixas Revuelta, Marina Gilabert Aguilar, Alicia Miyares Fernández, Rosa María Rodríguez Magda, Victoria Sendón de León and Juana Serna Masiá) sent the Minister an open letter opposing the law (see https://blogs.elconfidencial.com/espana/tribuna/2020-11-05/carta-abierta-gobierno-ley-trans-igualdad_2820287/). They worry about the confusion between sex and gender in Montero’s projected legislation and about the new vocabulary erasing the materiality of women’s bodies, which “makes women invisible and erases us with the excuse of inclusivity.” In fact, what I find most interesting about the letter is the call to erase gender rather than to make it even more visible by law. Why not have official documents suppress all reference to gender? Having said that, it would be interesting to see what would happen if suddenly millions of women in Spain declared they want to be men officially, a point my feminist colleagues have not contemplated in their writing but that in principle the new law might sanction. My rambling post, in short, wants to remind you of the fact that the more we think about gender, the less we seem to agree or even understand what is going on. I am currently working on quite a complex novel by Kim Stanley Robinson, 2312, in which most human beings are free to choose how to modify their bodies and in which the protagonists are a female-identifying gynandromorph and a male-identifying androgyn. This is 300 years in the future but to be honest I can’t even imagine how people will feel about gender in 3 years’ time. When this novel was published, in 2012, less than ten years ago, talk of non-binary persons was non-existent, whereas now it is all the rage (leaving by the way, Montero’s binary law quite obsolete). What is natural and what is biological in gender matter is harder and harder to decide. My hope is that one day we will stop being masculine or feminine in binary fashion, and even non-binary, to be just persons. That sex and gender, in short, could be factors as small in our lives as whether we like apples or pears. That would be a relief. I publish a post once a week (follow @SaraMartinUAB). Comments are very welcome! Download the yearly volumes from https://ddd.uab.cat/record/116328. Visit my website https://gent.uab.cat/saramartinalegre/
<urn:uuid:fb791fa9-eb3c-4b41-a813-9b151d814eed>
CC-MAIN-2022-33
https://blogs.uab.cat/saramartinalegre/es/2020/11/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00004.warc.gz
en
0.973048
2,320
2.640625
3
“Everything Different, Nothing Changes” chronicles the multiyear effort to redefine the kilogram. Expert interviews and brilliant onsite footage provide an inside look at both the thinking and technology that made it possible to prove the constancy of the new mass standard. 1 kg redefinition - revised definition of the SI base unit The unit of mass, the kilogram, is the last SI measurement unit defined by a physical artefact, rather than a mathematical constant. In 1889, the 1st General Conference of Weights and Measures (GCPM) adopted the International Prototype Kilogram (IPK) as the definition for the unit, which has remained unchanged until now. In the past, this meant that measuring mass relied entirely on mass accuracy of a physical object, which, even in spite of advanced security measures, has been prone to uncontrollable changes with time. Therefore, a new definition of the kilogram was necessary, in order to ensure the measurement unit is independent from a physical object, and hence fully stable, accurate and accessible, independent of time and location. Scientists worldwide have been involved in this groundbreaking research project to redefine the 1 kilogram. The 1 kg redefinition is part of the biggest overhaul of the International System of Units (SI) since its inception in 1960. This White Paper explains the background of the 1 kg redefinition and the effect this change will have on the weighing world. Download the document and learn what steps have been taken so far and how the change will be implemented, together with its consequences. Read the below FAQs and find out, for example, when is the redefinition going to take place, what will happen to the "old" kilogram and what are the consequences for the laboratory or industrial weighing, due to the 1 kg redefinition. 1. Why do we use the word "redefinition"? Each base unit of the SI has an unambiguous definition. The definition of the unit kilogram valid until 2018 is based upon the mass of the International Prototype Kilogram, IPK. Because an artifact is unstable by its nature, work is underway to replace the current definition with something more stable, hence the term “redefinition“. 2. Why is the redefinition of the kilogram necessary? The redefinition of the kilogram is necessary for a number of reasons. The most practical ones are: - The mass of the IPK stored in Paris is not stable and it is impossible to quantify this instability. - The primary standard is only available at the BIPM lab in Paris. - To base a global measurement unit on just one artifact is a big risk (damage, loss). - Unknown changes in the mass unit also influence the ampere, the mole and candela, which so far depend on the kilogram. The new definition is designed to overcome all these problems. 3. What changes are expected for weighing results? The value of the Planck constant, to which the new kilogram definition will relate, has been chosen so no change in the mass unit will be seen at the time of the redefinition, and weighing results will not be affected at all. 4. Do I have to re-calibrate all my balances to comply with the new kilogram definition? Since the new definition of the kilogram will not change the value of the kilogram unit, there is no need to re-calibrate weighing instruments such as balances. 5. Do I have to re-calibrate all my weights to comply with the new kilogram definition? Since the new definition will not change the value of the kilogram unit, there is no need to re-calibrate weighing instruments such as weights. 6. Will the calibration costs increase? The new definition of the kilogram will not have any effect on commercially available calibrations. 7. Since there is no international prototype, will the kilogram still be the same everywhere? The Consultative Committee for Mass (CCM) who are overseeing the redefinition ensure that the unit of mass is equivalent worldwide by a series of key comparisons among national standards laboratories. 8. What are the benefits of redefining the kilogram? A redefinition in terms of a fundamental constant has two major benefits: - The SI unit of mass will be perfectly stable following the redefinition of the kilogram and changes in primary (artefact-based) mass standards (including the IPK) can be monitored against the redefined kilogram (via the Watt Balance or Avogadro experiments). - Traceability need no longer be taken from the IPK and therefore NMIs can (theoretically) realise their own mass scales from Kibble Balance (=Watt Balance) or Avogadro experiments 9. How can one explain the new kilogram definition? It is true that the new kilogram definition is far more abstract than just using a prototype kilogram as a definition. One way of explaining it is: When the Planck constant is fixed to exactly 6.626 070 15×10−34 s−1·m2·kg and "s" and "m" are already fixed, then by doing so, "kg" is also fixed. So by using the mentioned value for the Planck constant, the kilogram is defined. 10. What will happen to the IPK? Will it be retired or are there ongoing reference checks between these three methods going forward? As soon as the definition of the kilogram is based on an invariant of nature instead of a material artefact, it will theoretically be possible to realize the SI unit of mass at any place, at any time and by anyone. Thus, the IPK will be functionally retired as definition, but physically still be used in experiments as check standard. 11. When is the redefinition of the kilogram going to take place? In November 2018, the CGPM (General Conference on Weights and Measures) is expected to formally adopt the new definition of the kilogram and it will be practically implemented from May 20, 2019. 12. How is the Planck constant linked to a weight piece in practice? There are two physical laboratory experiments to realize the kilogram with reference to the Planck constant; the XRCD (Avogadro) sphere experiment and the Watt Balance (Kibble Balance) experiment. When the fixed value of the Planck constant is used in the calculations, with the help of these experiments, the mass of a physical body can be determined. 13. Is there any change expected in industrial or laboratory weighing due to the re-definition of the kilogram? Do we need to adapt our SOPs? The re-definition of the kilogram affects only the realisation of the unit kilogram which is the very beginning of the traceability chain. All other calibration procedures remain unaffected, such as the calibration of weight pieces or the calibration of weighing instruments like balances. 14. Will calibration uncertainties be the same after the re-definition of the kilogram? When designing the new definition of the kilogram and acceptance criteria for its implementation, special care has been taken that no significant increase of uncertainty happens along the calibration chain. While there is some increased uncertainty at the beginning of the traceability chain, this will be taken into account by national measurement institutes and the uncertainties on calibration certificates for weight pieces and weighing instruments will not be affected by the redefinition. 15. Are there any drawbacks of redefining the kilogram? At present, there are several unresolved issues with the potential redefinition of the kilogram. The uncertainty with which the mass scale can be realised will increase from zero (the current "uncertainty" in the IPK) to 2E08 (the target uncertainty for the redefinition experiments). This increase in uncertainty is equivalent to 20 µg on a kilogram mass standard. A further issue is that both the XRCD and Kibble Balance realisation experiments work in a vacuum, whereas the present mass scale is realised and disseminated in air. This vacuum/air step will add a further uncertainty component to the dissemination of the unit as it is known that vacuum/air transfer of mass standards changes their mass value. The challenge for NMIs is to characterise and minimise these and other uncertainty components to ensure the best measurement capability available to their calibration customers is affected as little as possible (Adapted from EURAMET). 16. Which one is the better realisation; the Silicon Sphere or the Watt Balance? Both experiments are suitable. In fact, it was a condition for the re-definition that two types of experiments deliver consistent results. Both experiments are considered valid ways of implementing the new kilogram definition. 17. I use balances in "legal for trade" applications. Should I expect any change by the re-definition of the kilogram? Since the new definition of the kilogram is not designed to change the kilogram unit, there is no need for any action. 18. If the realisations of the kilogram are performed independently in many laboratories worldwide, how can we be sure that a kilogram is the same everywhere? This question is not specific to the kilogram: National Metrology Institutes regularly participate in intercomparisons to ensure that all measurement units are globally consistent. Special care has been taken in the case of the kilogram to ensure consistency in the starting phase of the new definition and its implementation. 19. Are there only two methods for realizing the kilogram? The condition for a method to realize the kilogram according to the new definition is that it uses the fixed values of the natural constants of the SI. At the moment two methods are known to fulfil this requirement, these are the Kibble (Watt) Balance and the XRCD (Avogadro Sphere) method. In the future, other methods might be developed, but they are not known today. 20. How does the Kibble Balance work? The Kibble Balance equates mechanical and electrical power experimentally (hence the alternative name "Watt Balance"). It is operated in vacuum and links the mass of a weight piece to the Planck constant. 21. How does the XRCD experiment work? Basis for the XRCD (Xray Crystal Density) is a monocrystalline and monoisotopic silicon sphere. Its mass is determined by calculating the number of atoms in that sphere and determining the mass of the sphere via fixed values of Planck- and Avogadro constant and the electron mass. 22. Will only a limited number of labs maintain these methods in their labs or is it envisioned that many W&M bodies use them? Both the Watt/Kibble balance and the Avogadro/XRCD experiment require a significant amount of resources in the labs. It cannot be pre-determined, how many laboratories will decide to maintain their own experiments and at which level of quality in the future.
<urn:uuid:258ce8d9-c3f6-4810-8a78-2eaa36408ca2>
CC-MAIN-2022-33
https://www.mt.com/us/en/home/library/white-papers/laboratory-weighing/1-kilogram-redefinition-of-base-si-unit.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00004.warc.gz
en
0.915873
2,271
3.5625
4
Good morning Year 6. We look forward to seeing you all on Zoom at 9:05am. Warm up activity (15 minutes) Complete this mixed times tables grid. Why not challenge yourself by seeing how many you can get correct in 15 minutes? Reading (30 minutes) Have another read of the text from yesterday: The Hunting Ground It was a dark, blustery afternoon in spring, and the city of London was chasing a small mining town across the dried-out bed of the North Sea. In happier times, London would never have bothered with such feeble prey. The great Traction City had once spent its days hunting far bigger towns than this, ranging north as far as the edges of the Ice Waste and south to the shores of the Mediterranean. But lately prey of any kind had started to grow scarce, and some of the larger cities had begun to look hungrily at London. For ten years now it had been hiding from them, skulking in a damp, mountainous, western district which the Guild of Historians said had once been the island of Britain. For ten years it had eaten nothing but tiny farming towns and static settlements in those wet hills. Now, at last, the Lord Mayor had decided that the time was right to take his city back over the land-bridge into the Great Hunting Ground. It was barely halfway across when the look-outs on the high watch-towers spied the mining town, gnawing at the salt-flats twenty miles ahead. To the people of London it seemed like a sign from the gods, and even the Lord Mayor (who didn’t believe in gods or signs) thought it was a good beginning to the journey east, and issued the order to give chase. The mining town saw the danger and turned tail, but already the huge caterpillar tracks under London were starting to roll faster and faster. Soon the city was lumbering in hot pursuit, a moving mountain of metal which rose in seven tiers like the layers of a wedding cake, the lower levels wreathed in engine-smoke, the villas of the rich gleaming white on the higher decks, and above it all the cross on top of St Paul’s Cathedral glinting gold, two thousand feet above the ruined earth. Now answer the following questions: - What season is the story set in? How do you know? - What is the weather like? - ‘In happier times’ what does this suggest about what life is like now? - How do you know London is a powerful city? - Why has London been hiding? - Is a lack of prey a recent problem? How do you know? - What sort of town has London found? - What impression do you get of the text? Why? Writing (1 hour) Start by having a look at the following vocabulary: Auxiliary – equipped with an extra engine. Toupee – a small artificial hairpiece worn to cover a bald spot. Gyrating – move rapidly in a circle. Indignation – anger or annoyance at unfair treatment. Guild – a group of people. Meekly – in a quiet and gentle mannar. Now read through the next part of the text: Tom was cleaning the exhibits in the London Museum’s Natural History section when it started. He felt the tell-tale tremor in the metal floor, and looked up to find the model whales and dolphins that hung from the gallery roof swinging on their cables with soft creaking sounds. He wasn’t alarmed. He had lived in London for all of his fifteen years, and he was used to its movements. He knew that the city was changing course and putting on speed. A prickle of excitement ran through him, the ancient thrill of the hunt that all Londoners shared. There must be prey in sight! Dropping his brushes and dusters he pressed his hand to the wall, sensing the vibrations that came rippling up from the huge engine-rooms down in the Gut. Yes, there it was – the deep throb of the auxiliary motors cutting in, boom, boom, boom, like a big drum beating inside his bones. The door at the far end of the galley slammed open and Chudleigh Pomeroy came storming in, his toupee askew and his round face red with indignation. “What in the name of Quirke …?” he blustered, gawping at the gyrating whales, and the stuffed birds jigging and twitching in their cases as if they were shaking off their long captivity and getting ready to take wing again. “Apprentice Natsworthy! What’s going on here?” “It’s a chase, sir,” said Tom, wondering how the Deputy Head of the Guild of Historians had managed to live aboard London for so long and still not recognise its heartbeat. “It must be a good thing,” he explained. “They’ve brought all the auxiliaries on line. That hasn’t happened for ages. Maybe London’s luck has turned!” “Pah!” snorted Pomeroy, wincing as the glass in the display cases started to whine and shiver in sympathy with the beat of the engines. Above his head the biggest of the models – a thing called a blue whale that had become extinct thousands of years ago – was jerking back and forth on its hawsers like a plank-swing. “That’s as may be, Natsworthy,” he said. “I just wish the Guild of Engineers would fit some decent shock-absorbers in this building. Some of these specimens are very delicate. It won’t do. It won’t do at all.” He tugged a spotted handkerchief out of the folds of his long black robes and dabbed his face with it. “Please, sir,” asked Tom, “could I run down to the observation platforms and watch the chase, just for half an hour? It’s been years since there was a really good one …” Pomeroy looked shocked. “Certainly not, Apprentice! Look at all the dust that this wretched chase is shaking down! All the exhibits will have to be cleaned again and checked for damage.” “Oh, but that’s not fair!” cried Tom. “I’ve just dusted this whole gallery!” He knew at once that he had made a mistake. Old Chudleigh Pomeroy wasn’t bad as Guildsmen went, but he didn’t like being answered back by a mere Third Class Apprentice. He drew himself up to his full height (which was only slightly more than his full width) and frowned so sternly that his Guild-mark almost vanished between his bushy eyebrows. “Life isn’t fair, Natsworthy,” he boomed. “Any more cheek from you and you’ll be on Gut-duty as soon as this chase is over!” Of all the horrible chores a Third Class Apprentice had to perform, Gut-duty was the one Tom hated the most. He quickly shut up, staring meekly down at the beautifully buffed toes of the Chief Curator’s boots. “You were told to work in this department until seven o’clock, and you will work until seven o’clock,” Pomeroy went on. “Meanwhile, I shall consult the other curators about this dreadful, dreadful shaking …” What impression do you get of Tom? Why? What impression do you get of Chudleigh Pomeroy? Why? The thing that stuck out to me in this text was the part where it talked about a blue whale becoming extinct. The blue whale is currently on the endangered list but isn’t extinct. Read the information at the link below to learn more about the blue whale: What does this part of the text suggest about the story? Write a explanation and description of what you think life might have been like for the people of London at this time. Maths (1 hour) Here are today’s five in five questions (although today there are 6!): 1) 7 x 9 = 2) 653 ÷ 100 = 3) 693 ÷ 18 = 4) 2/5 x 1/3 = 6) 87.32 + 13.78 = Today we are going to recap on how to multiply whole numbers and decimals. We will also look at long multiplication again. Task 1: Multiplying whole numbers. Start by watching the video where I will remind you how to do this using the column method. Now you try: 1) 16 x 9 = 2) 48 x 8 = 3) 96 x 6 = 4) 124 x 5 = 5) 215 x 7 = 6) 304 x 9 = 7) 285 x 7 = 8) 1236 x 6 = 9) 2015 x 7 = 10) 3658 x 8 = Task 2: Multiplying decimal numbers. Begin by watching this video where I will recap the steps that you need to take. Now you try: 1) 26.35 x 7 = 2) 63.54 x 6 = 3) 152.04 x 9 = 4) 205.13 x 8 = 5) 632.52 x 7 = 6) 852.25 x 4 = 7) 960.51 x 8 = 8) 1245.36 x 9 = 9) 2635.89 x 7 = 10) 6532.89 x 3 = Task 3: Long multiplication Remember that long multiplication is when we multiply a number by 2 digits or more e.g. 123 x 12 Watch this video to see a reminder of how to do this. Now you try: 1) 253 x 15 = 2) 366 x 16 = 3) 412 x 21 = 4) 317 x 23 = 5) 386 x 24 = 6) 475 x 26 = 7) 652 x 31 = 8) 701 x 37 = 9) 769 x 41 = 10) 1263 x 24 = Spelling (15 minutes) Here are some sentences. The circled words are spelt incorrectly – can you correct them? RE (1 hour) This half term, we will be learning all about Sikhism. What do you know about Sikhism? Today’s question is: Why is community important? How did the Sikh community begin? What do you know about the word community? What does the word community mean? Community – a group of people who worked together for a common goal or interest. Lings Primary School is an example of a community because we all worked together. What different communities can you think of? Why do you think communities are important? Which communities are you a part of? Take one example – how does it make you feel being part of that community? Look at today’s vocabulary: Emblem – an image to represent a concept of identity. Sikh – someone who follows the religion of Sikhism. Khanda – an emblem of the Sikh community. Guru – a wise teacher. Nishan Sahib – the Sikh flag (Nishan means flag and sahib is a term of respect). Read the following text which explains how Sikhism began: How Sikhism began Even as a child there was something different about Nanak. Strange, mysterious things seemed to happen all around him. One day he fell asleep in the shadows under a tree. This could be quite dangerous in a hot country like India. If he didn’t wake up, the sun would burn him as it moved round but a strange thing happened. As the sun moved round, all the shadows under the trees also moved round, except the shadow protecting Nanak which stayed exactly where it was. Strange things like that kept on happening, even when Nanak became a man. Nanak used to get up before dawn and go to the river to bathe and say his prayers but one morning he disappeared. All that remained were his clothes lying on the bank. All the people in the village looked everywhere for him and when they couldn’t find him they thought that he had drowned. However, three days later, Nanak suddenly reappeared! Everyone wanted to know where he had been. He said that he had been with God and that he had been told to go and teach the people about how they too could get closer to God. Nanak’s vision changed his life and from then on, he travelled the world teaching God’s message. The followers who gathered to listen to him became known as Sikhs, a word meaning learner, and he became known as Guru Nanak meaning God’s teacher. Watch the video and read the information at the link below to learn more: Have a look below at Guru Nanak’s teaching: - There is only one God. (There is an important symbol that teaches Sikhs about God. It reminds Sikhs that they believe in only one God and it is called Ik Onka. Guru Nanak taught that God is ‘neither a man nor a woman’. Sikhs usually use the name Waheguru for God.) - Different religions are different paths to the same one God. - Work hard and earn an honest living. - Lead a good life and help others. - We are all equal. Men and women have the same rights/responsibilities. - Be kind to people and animals. - Always speak the truth. Sikhs believe that religions are different pathways that lead to the same God and so anyone who wants to worship can join in. Guru Nanak was born a Hindu and his desire to bring together Hindus and Muslims led to his seeking a new religion. Are there any similarities between the teachings of Guru Nanak and other religions that we have looked at? Now let’s look at the Khanda – an important emblem of the Sikh community. Watch this clip to learn more about the Khanda. Let’s go through each part of the Khanda. At the centre is a double edged sword This symbolises that Sikhs believe in one God. Across the sword is a circle called the Chakkar. This is like the Kara which is a steel band that Sikhs wear. The Chakkar reminds Sikhs: - that God has no beginning or end - to stay within the rules. Finally, there are two crossed Kirpans (swords) This represents strength, spirituality and power. Write an explanation about what you have learnt today. Make sure you include the following in your explanation: - How did the religion of Sikhism begin? - What is the Khanda and why is it important? PHSE (45 minutes) This half term, we will be looking at celebrating our differences. What is similar about all of us? What is different about all of us? Today’s question is: Am I normal? Finish this sentence with your definition of normal: Being normal is …… Have a look at the statements below and for each one decide if they are normal or not normal. Make sure you explain why you have chosen normal or not normal. - To be frightened of the dark. - To wear glasses. - To be worried about going to secondary school. - To love chocolate. - To want to have friends. - For girls to play football. - To walk to school. - To have a computer or games console in your bedroom. - To eat dinner with your family around the table. - To have two legs. The definition of normal is: usual, typical or standard. To me, what is normal to one person might not be normal to another and therefore everyone is normal. It is perfectly normal and typical of me to go home and feed my pet turtles; for others, turtle would seem like an strange pet to have and wouldn’t be considered normal. I wear glasses so it is normal and usual to see me in them; some people don’t wear glasses so it wouldn’t be normal to see them in glasses. Have a look at your definition of normal – are there any changes you would like to make? Over the next week’s we are going to look at different people that have a different normal to others. This week, we will be learning about Theo’s normal. Watch Theo’s story at the link below: Now answer the following questions: - What do you think about Theo? Why? - What strengths does Theo have? - How would Theo like to be treated? - How does Theo feel about his disability? - How is Theo similar to you? - If you could ask Theo 3 questions, what would they be? Make sure you log in and take part in this week’s competition. Well done Year 6 for all your hard work. We hope you have a lovely evening and we look forward to eeing you in the morning. Miss Kinsella and Mrs. Maruzza
<urn:uuid:a35403ff-03b4-46cf-a3c2-43460b414dc7>
CC-MAIN-2022-33
http://lingsprimaryblogs.net/2021/02/23/tuesday-23rd-february-2021/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00403.warc.gz
en
0.963744
3,796
3.03125
3
Each day, the rapid advancement of technology is growing. Yet, it does not fail to entertain us, whether playing games on mobile phones in the real world with AR (augmented reality) or AI chatbots talking to us and having a real conversation. Due to the rapid evolution and advancement of technology, ML (machine learning) is now no longer a strange thing to us. Machine learning app development is gaining much popularity and momentum recently because of user needs and greater efficiency. Artificial Intelligence and Machine learning apps are not new in the mobile app industry but it still attracts and engages users through the easy usability that it enables and their smart results, which improve performance. If the concept of (ML) machine learning development is new and advanced for you, this blog will be really helpful for you; I’ll discuss the complete guide for Machine Learning app development, through which you can make a robust and secure app without making any mistakes. First, let’s understand what machine learning is. Market Scenario of Machine Learning - Machine learning is a digital transformation, and by the end of 2021, is estimated to have received USD 58 billion in cumulative investment. - The (machine learning) ML industry growth is predicted to reach around USD 9 billion in the latter part of 2022 at a compound annual growth rate (CAGR) of approximately 42%. - According to MarketsAndMarkets, the Artificial Neural Network Market size grew from $117 million in 2019 to $296 million by 2024, at a CAGR (Compound Annual Growth Rate) of 20.5%. - By 2024, the neural network market is anticipated to be worth over USD 23 billion approximately. What is Machine Learning? When people think about machine learning (ML), they think of logistics, forums, calculus figures in the air, lots of numbers, and almost every important, relevant thing. Well, it is mandatory to simplify the meaning of the concept. It is the science or the process where computers are programmed to learn and adapt things like humans to deliver some result. Generally, Machine Learning is the science of getting computers trained and understanding and acting as humans do. This can be done by autonomously improving their learning by feeding them data and information in observations and real-world interactions. The Machine learning algorithms used in machine learning app development could be divided into three ways: 1. Supervised Machine Learning The software learns the data based on the input and output of a particular instance in supervised learning. Then, keeping that as a reference, it retains the counter results. Thus, it is a type of ML (machine learning) in which machines are educated and trained using well-labeled training data and information. Based on that given data, machines predict the output. The main aim of supervised learning is to find a mapping function to map the input variable(x) with the output variable(y). 2. Unsupervised Machine Learning In unsupervised learning, the machine learns the answers and results from the untagged data and uses unlabeled data algorithms. Thus, it helps in finding results to hidden patterns without any interference of the human. Moreover, it uses machine learning and artificial intelligence algorithms to analyze and cluster unlabeled datasets. 3. Reinforcement Machine Learning Reinforcement learning is done when intelligent agents learn how to behave in a particular environment based on reward and award patterns. The machine decides for a specific situation and receives an award or punishment according to the case. Thus, it is a behavioral learning model where the algorithm provides data analysis feedback, directing the user to the best result. Reinforcement learning differs from supervised learning. The training data has the answer key in supervised learning, so the model is trained with the correct answer itself. On the other hand, there is no answer in reinforcement learning, but the reinforcement agents are bound to learn by trial and error because of the absence of training datasets. Also, they have to decide what to do to perform the given task. Approaches for Machine Learning App Development Machine learning and Artificial Intelligence App Development are very strategic and smart software techniques that must be integrated into your app very smartly. Here, I’ve discussed significant models that can be introduced while doing machine learning app development. Let’s have a look at each one by one. 1. Use Pre-Built Models Using pre-built models is a shortcut way of building machine learning apps. There are already many pre-built models available in the market; you only need to replicate them and then introduce them in your mobile app. Through this process of machine learning app development, you can save ample time by skipping finding data and information, training the machines, and doing accuracy testing as it is already done. Furthermore, always keep in mind that you go for the models that are rich in data and have good results and stunning response rates. As you can not set the foundation of your machine learning app on a weaker model because it would collapse. ML Kit by Firebase, Cloud AI by Google, Core ML by Apple are the following best models you can rely on for your machine learning app development. However, it is recommended that you hire machine learning app developers even in the pre-built modes also. The reason is that they know what and how to fix and optimize everything to provide you with good functionality and the best results. 2. Conversion Between Model Formats You might hire developers to do machine learning app development for the android platform. But if they do not know how to do it over iOS. Therefore, it is of no extensive use unless you plan to launch your app on android only. So, it is mandatory to hire skilled developers who have knowledge of every platform to transfer different learning models on multiple platforms to perform the best results. Many different tools are available like Caff and Keras that don’t export models directly. So, in machine learning app development. Always adopt a step-by-step approach where each model used in the ML (machine learning) module is converted from one format to another. To show similar results on multiple platforms, keep checking out suitable converters that enable the model conversion. It is a tip that will become handy in your development process. 3. Focus on Native Development While cross-platform apps seem appealing and attractive initially, they’re more likely to cause issues later on, especially when developing performance-driven apps. Machine learning and Artificial Intelligence development technology provide efficient and proficient services based on its search from the data set. However, the cross-platform transfer may weaken your machine learning process. But, if you want to develop an app that should be known for good user experience, robustness, flexibility, and accurate results, I suggest developing the app from scratch. Native applications are rapid, responsive, and offer a significant user experience. Moreover, these apps can also access APIs and unique elements optimized for various devices. As a result, they run efficiently and seamlessly. 1. Selection and Formulation of Problem Statement The most crucial step to any machine learning or data science project is to make sure you have one problem statement in your mind, and you research continuously regarding the same. Always select your problem statement that you feel is a small step above your skill level. For example, if you are just a beginner starting your machine learning app development journey, pick a slightly complex beginner-level project. However, let us say something like a simple linear regression project should also satisfy. First, understand your skills and keep working on improving them. If you have completed some basic beginner-level projects, aim to shoot a bit higher for some intermediate-level projects. Ensure you have done extensive, deep, and thorough research on the project you choose to take up and persevere until you finish your machine learning or data science projects. 2. Developing and Strategizing Plan Now that we have a transparent image of the project ideas to implement, the next step is to formulate the strategy and plan accordingly for the efficient mobile app development process. It will help if you read more via google searches, research papers, especially on Google Scholar, or by watching YouTube videos online. Always have detailed knowledge regarding your project before moving towards the following steps and starting the actual implementation of your development process. Before starting development, always estimate the cost for each of the tasks and applications to perform. Then, after evaluating cost, move towards the number of resources and time required for the computation process. Moreover, this estimation does not need to be 100% accurate. 3. Gathering Data After analyzing your plan it is important to gather data before starting implementing your data science or machine learning project. Data collection is the vital process of gathering and measuring information on targeted variables in an established system. Enabling one to answer relevant questions and evaluate outcomes. Google searching is the best and most common way to look for new resources. Sometimes you can find fascinating datasets on GitHub as well. In addition, Kaggle offers some of the best data and datasets options for each of the particular competitions that it holds. If you are looking to do NLP (natural language processing) projects. You can use Wikipedia or other similar sites to extract data via web scraping. Once you gathered all the information and data together. You need to filter it out and store the valuable database for machines to adapt, learn, and perform the desired results. 4. Preparing and Analyzing DataSets Only collecting the relevant data & information and then filtering it out is not enough. You have to ask the mobile app developers to convert it into the language in which machines can understand and learn. By developing a data pipeline on machine learning needs, it is possible. Visualization is a notable aspect of any data science project. For example, if we talk about the subject of Statistics, exploratory data analysis is an approach that analyzes data sets to summarize their main characteristics, usually with visual methods. Analyzing data in machine learning projects is essential to get a detailed understanding of the data at hand. 5. Pre-processing Datasets Pre-processing of the datasets is an essential part of data science. After gathering data and analyzing datasets, it is not necessary that the data available to us is always clean. Don’t misunderstand the word “clean.” In this reference, the meaning of clean is the selective data that is of use to the task. There are many redundancies in the naturally available data that must be removed to have an overall clean dataset to work with. In the data mining process, Data pre-processing is an essential step. The phrase “garbage in and garbage out” is especially applicable to machine learning projects and data mining. 6. Constructing Structure After the pre-processing step, the next step is to construct the structure for the model you plan to develop. This step can stand for several things, like if you are working on a machine learning problem, you want to complete computing of all the necessary parameters as other requirements. Don’t wonder what the other requirements are? Feature scaling, encoding the variables, choosing the hyperparameters, tuning the model, splitting the data into train, test, or validation accordingly are the other requirements. While constructing the structure, don’t wait for the next phases. First, decide the entire structure and the process that will be used in the overall implementation. Then move towards the design of your modeling approach and build a final pipeline to start developing your models. 7. Developing Machine Learning Model This step is the most interesting part of the process of machine learning app development. Designing the appropriate model for the excellent performance of your task is the most vital aspect of machine learning. Therefore, it is imperative to choose the suitable algorithm for a particular task and design a concise architecture to solve the problem. By selecting the right algorithm, you can prove to be a best-fit approach. You can construct an architecture by sequential, functional, or custom methods to develop your custom model from scratch in machine learning. Also, you can utilize many transfer learning models available to simplify your task. The development of the models is the most crucial step because after developing the model. It will be trained, tested, and deployed. 8. Train The Machine Learning Model Training the model ensures that we find an almost perfect fit with high accuracy and low losses. It is also making sure that there is no overfitting or underfitting. Overfitting is a situation where your model fits so well that it is even considering the outliers, noise points, and causing inaccuracies in the prediction task. On the other hand, Underfitting means that the model developed is underperforming, and it does not classify things accordingly and then solve the problem as required. Training a model means learning and determining good values for all the weights and the bias from labeled examples. 9. Test The Created Model For testing the model, you can use graphs to validate these tests and make sure the model is performing as desired. You can make your custom graphs with the help of the matplotlib library offered by python for machine learning projects. These graphs should be able to provide a detailed and descriptive approach to how the models developed will perform. You can also do further analysis by using the methods of AB testing before the deployment of your models. 10. Deployment of The Model The deployment step is the final step of any model constructed. If you have completed developing your model, this is an optional step if you want to keep it with yourself only or deploy it to target a wider audience. The deployment methods vary from deploying it as an application that can be transferred across by using the AWS cloud platform provided, or by using an embedded system, or by amazon for deployment. |Check this in-depth 7 Real Life Use Cases of Object Detection Using Machine Learning| In this blog, I’ve covered the step-by-step guide for machine learning app development. Each step is significant in developing the perfect architecture of a successful machine learning project. Also, it is essential to follow each of the mentioned steps in the same order as presented above. I hope now it’s clear to you how to develop a machine learning app efficiently. Machine Learning is becoming the future of the advancement of mobile app development. But still, if there are any doubts, you can contact us. We, at NimbleAppgenie, have Mobile app development teams that are sound with ML technologies. As a result, it has become our standard practice to build ML products faster and efficiently. We are an extremely professional Machine learning App Development company that provides ML development services to innovative companies around the globe. Divya is an outstanding writer at Nimble AppGenie. She is very innovative with her creative ideas. She is very passionate with technology implementation in several industry verticals and always keen to learn new opportunities that brings business efficiency and profitability. Whereas, Nimble AppGenie is an expert in developing solutions for Healthcare, FinTech, and EdTech. Nimble AppGenie is helping small-large scale enterprises by providing innovative solutions that excel in the market.
<urn:uuid:bba5971b-fd6b-4c72-8d3b-721fe71f0587>
CC-MAIN-2022-33
https://www.nimbleappgenie.com/blogs/machine-learning-app-development/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00202.warc.gz
en
0.931851
3,092
2.515625
3
How can Schools Increase School Shooting Security to Prevent Mass Shootings? Since the horrific murders of 12 students in 1999 at Columbine High School in Jefferson County, Colorado, schools have changed their approach in dealing with threats and safety and improving school security. While many of us grew up with fire drills, tornado drills, or “duck-and-cover” drills in case of a bomb attack, today’s students train on lockdowns in case of active shooters. Jump to ways to prevent school shootings VIGIL FOR PARKLAND HS SHOOTING VICTIMS (Fabrice Florin from Mill Valley, USA [CC BY-SA 2.0 Since officials started keeping public record of school shootings, 2018 will sadly be known as the worst year in history for gun violence in schools. The US Naval Postgraduate School in Monterey, California has been tracking incidents since 1970. In 2018, there were a record 97 such gun violence incidents in schools. That is a 60 percent increase over the previous record of 59 shootings recorded in 2006. All this clearly indicates a need for increased security in schools to prevent shootings. 56 people were killed in school gun violence in 2018 compared with the closest record of 40 people in 1992. Current statistics can be accessed here. Students And Parents Tell Their Stories A 15-year old student opened fire at Marshall County High School in Benton, Kentucky on January 23, 2018. Two students were killed and 17 more were injured. Bryson Conkwright was right there when the gunman opened fire. “By the time he pulled the trigger, it hit me that this kid … he’s shooting at us,” Conkwright told ABC’s GMA. “He’s shooting at us and I was just sitting there in shock and watching my friends and people that I’ve known forever … just dropped. It was unbelievable.” It was already the 11th shooting incident of the new year. Later that year, another mass shooting took place at a Florida school just 10 minutes before the dismissal bell. This time it was at Marjory Stoneman Douglas High School in Parkland, Florida. A former student entered the building wearing a gas mask, carrying smoke grenades, and equipped with an AR-15-style assault weapon and multiple magazines. students and teachers were murdered and dozens more were injured. 14-year old Alyssa Alhadeff was one of the victims. “How do we allow a gunman to come into our children’s school?” asked Alyssa’s mom, Lori, during an interview on CNN. The pain and anguish in her voice was evident as tears streamed down her face. “How do they get through security? What security is there?” she questioned. “The gunman – a crazy person – just walks right into the schools, knocks down the window of my child’s door and starts shooting, shooting her (Alyssa) and killing her!” Broward County Sheriff Scott Israel visits Parkland shooting survivor Anthony Borges in the hospital (Broward County Sheriff’s Office [Public domain]) The victims of school shootings extend beyond those that were shot or killed. 17-year old Aalayah Eastmond was inside a classroom at Marjory Stoneman Douglas High School when the shooting happened. “It sounded like extremely loud pops … we all paused… and it was immediate eye contact with everybody in the classroom. And we just froze. And then we heard it again,” Eastmond told NBC’s Today Show. “We were supposed to have a birthday party for my sister,” said 2016 Marjory Stoneman Douglas graduate Matt Deitsch to NPR. Some of her friends didn’t make it out of the school. And the reality is that in that moment, I felt absolutely helpless. And my sister was sad, my brother was angry, and I didn’t know what to do.” Ideas To Make Schools Safer From Shootings It is impossible to guarantee the full prevention of another incident in the future. History has taught us that all too well. However, there are ways to make schools more safe when it comes to shootings. Schools can implement safety measures to be better prepared to deal with threats and minimize the risk. How can we improve safety in our schools? Here’s what some schools are doing. Lockdown drills and active shooter exercises More than 40 states already require schools to provide advanced safety training to staff and students. It was this training that spurred Physical Education teacher Angela McQueen to run at a student with a gun at an Illinois High School in September 2017. As the student was pulling the trigger, she forced his arm upwards. Although two students suffered non-life-threatening injuries, a mass shooting incident was prevented. Increased Communication And Awareness After an exhaustive review of the incident at Columbine High School in 1999, the FBI recommended threat assessments should include an effort to formally monitor student’s mental health. By simply identifying students that show warning signs, a well-trained staff member may help prevent a potentially devastating incident. In Parkland, Florida, the alleged shooter was a troubled student with a history of violence and had been expelled from school for disciplinary reasons. He also reportedly had social media accounts with pictures of weapons and may have signaled his intent with his comments. Increased Police And Security Presence Many school districts and universities employ uniformed security officers, often with federal grant money. The number of educational facilities with School Resource Officers (SRO’s) grew from just 13% of schools in 1994 to more than half of all schools (57%) in 2018. SRO’s work closely with school administrators to promote safety. Visible Security Cameras In addition to SRO’s and enhanced police presence, highly visible surveillance cameras can also act as a deterrent. Additionally, they can help detect and track intruders during an incident. When incidents occur, there tends to be a public outcry for metal detectors at schools. Typically limited to inner city schools in major metropolitan districts, metal detectors have not been widely adopted at schools and universities nationwide. They are an extremely expensive solution that takes both hardware and staffing, and more studies are needed to prove whether they could prevent incidents. Controlled Access Points and Security Guard Booths Guardian Booth helps secure schools In addition to a security presence, schools have added additional control measures. Doors at many schools remain locked during school hours, and visitors are required to be buzzed in, signed in, and issued badges. Forcing all visitors through limited access points, including a security booth, provides a central control point and can help prevent unauthorized visitors. Controlled access and an immediate lockdown are credited with preventing what could have been another mass school shooting in November 2017. A gunman in northern California had already killed four people and injured 10 more in a rampage at multiple locations when he got to the Rancho Tehama Elementary School. Fortunately, he was unable to get into the main part of the school due to its controlled access. As the school went into lockdown, the shooter got frustrated and fired off 20-30 rounds at the school. While one student was hurt, a mass incident was prevented. What Can I Do To Make My School Safer? If you are a student thinking about how to prevent school shootings and make schools safer and how to protect your school from intruders to help prevent these types of attacks, you’re not alone. A 2019 poll done by Education Week reported that just 27% of those surveyed expressed confidence in their school’s preparedness in stopping a shooting incident. There are, however, proactive steps you can take. - Review your school’s safety policies and make sure they are being enforced - Point out vulnerable entry points you spot at your school - Examine your classroom to see if it could lock from the inside to prevent intruders - Report visitors that haven’t followed your school’s check-in procedures - Report bullying incidents, and mental health concerns which have been tied to school violence Don’t be afraid to start the conversation. - Research what other school districts are doing and share the information - Talk to fellow students, teachers, and school administrators about your ideas of ways to prevent gun violence in schools - Involve your parents and your school’s PTA - Encourage school administrators and school boards to take proactive school shooting prevention action, such as lockdown drills, active shooter training, controlled access points, security officers and security guard booths - Learn about physical security industry trends The Guardian Booth School Safety Fund In light of the recent mass shootings at schools, there is a call for increased security measures so that such devastating incidents become a thing of the past. Throughout the years, we at Guardian Booth have provided guard booths to several schools and universities around the country and are proud to play a small role in helping increase security at educational facilities nationwide. Our hearts and prayers go out to the families, staff, and students that are suffering in the aftermath of these horrible incidents. After the shooting at Marjory Stoneman Douglas High School in February 2018, we established the Guardian Booth School Safety Fund to make our Guardian Booth guard shacks, guard booths, and security enclosures available to schools, colleges, universities, and other educational facilities nationwide at a deeply discounted rate in an effort to help in preventing gun violence in schools. With an initial commitment of $30,000 by our company, we kick-started the campaign and donated several booths to different schools around the country. A Note For Students If you are writing an essay on school security, we encourage you to use any of the information in this article. This is an important topic and we are happy to share the information that will hopefully make a difference. We ask that you please give credit to Guardian Booth and encourage you to share your writing when it’s completed by sending us an email with a copy of your school shootings essay. How to choose portable ticket booths: rent, buy or build? You’re looking for portable ticket booths to rent because you have an attraction tha…
<urn:uuid:254f206e-9757-4668-b20c-66ace537fd9c>
CC-MAIN-2022-33
https://www.guardianbooth.com/safety-and-prevention-for-school-shootings/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00202.warc.gz
en
0.969034
2,168
3.015625
3
The Bone Trail: generating enthusiasm for earth sciences in the classroom Teach article Emm Barnes from the British Society for the History of Science describes an initiative to develop exciting interdisciplinary activities. And gives the recipe for a delicious edible geology project! ‘The Bone Trail’ is an exciting schools project funded jointly by the British Society for the History of Science, Bolton Local Authority Secondary Strategy, and the Manchester Museum, UK. A team of three educators – one academic historian of science (the author), and two science teachers (Peter Fowler and Alison Henning) – designed two full days of activities for Year 9 students (ages 13-14) on the history of comparative anatomy, geology and palaeontology. The emphasis was on teaching thinking skills, inspiring enthusiasm in earth sciences in particular and in learning in general. Students from Westhoughton High School and the Frances Bardsley School for Girls tested the activities in May 2006, and we are most grateful to the teachers in these schools for their ongoing commitment to the project. Most primary schools in England teach and integrate history and geography, science and art, literacy and numeracy, using themes such as “where we live” or “life in the 1930s”. In contrast, children in secondary schools are taught these subjects separately, and many children appear to decide at this stage that they do not like or are not good at science or the humanities, or indeed that they do not belong in school at all. We wanted to combat this tendency by reuniting science with history, mathematics, literature, art and food technology. Interdisciplinary activities encourage children to reflect on their process skills, and offer scope for teachers to cater to the full range of learning preferences. We have tried to produce materials that are as enriching and fun as those that are sometimes made available to children identified as gifted and talented. We intended our materials, however, to be used with all children, as we believe that every child can benefit, intellectually and socially, from the extra attention and from making connections between different subject areas. During the pilot of ‘The Bone Trail’, it was obvious that those activities which avoided worksheets were the most popular, stimulating discussion over lunch breaks and on follow-up weblog sites set up to evaluate the activities. One of the simplest activities was to present children with two different solid geology maps of England, one a replica of William Smith’s 1815 map – the first to represent the whole country – and the other a modern survey. We set the children three tasks to work on in small groups: to list the similarities and differences between the two maps, to suggest when each had been drawn, and to come up with their own questions about the maps. This last task was crucial, as it encouraged the students to decide what the most interesting questions about the maps were, and allowed their teachers to assess more accurately the level at which individual children were working. We found that children were stunned to discover that the older map had been produced almost two centuries ago, from the work of one surveyor, especially given how similar the two maps were. To explore how we know how extinct animals looked and moved, we set each child the task of compiling a one-page poster about the history of theories about dinosaurs, using Internet searches. We recommended several sites with reproductions of artists’ reconstructions from the 19th and 20th centuries, and showed the children how to use image search engines, so that they could discover for themselves how theories about the animals’ anatomy and physiology had evolved over time. The children showed great sophistication in presenting their findings to their peers. The final activity was for teams to design and build a life-size model of an iguanadon leg from galvanised wire, newspaper, and gauze impregnated with plaster of Paris. Children started by dissecting cooked chicken legs to determine how the muscles on a present-day descendent of the dinosaurs attach to the bones. We then set them a simple mathematics problem: to scale up from a chicken to an iguanadon, remembering that volume increases on the cube rule. In one session, we were fortunate enough to have a fossilised iguanadon femur to help the children to calculate the size of the model leg required. The resulting models were, frankly, stunning. Some of those children who were often disruptive in the classroom proved themselves to be great engineers and team leaders in this exercise, and we could see their self-esteem grow as the models took shape. The full range of resources are available to download from the outreach page of the British Society for the History of Sciencew1. We welcome suggestions on how to improve the resources, as well as stories of how you have used them in classrooms and museums. To give you a taster, here is part of the ‘edible geology’ activity. Making edible models helps children learn how sedimentary rocks are made, and the theory of superposition. Sculpting with food also increases interest and engagement in class discussion of the different purposes of and relations between various ways of representing strata – 2D representations such cross-sections and surface views of solid geology, and 3D models such a relief maps. In the full set of resources, children are given two ways to make 3D models of the solid geology in their local area: firstly with bread and butter, and secondly with three colours of chocolate. Below is the recipe for the second and sweeter option. Want to get involved? For further information on the project, or to register an interest in taking part in the second year of the pilot (2006-2007), please email email@example.com. In 1859, Punch jokingly suggested that a good way to teach the public about geology would be through the sale of layered cakes: “Let cakes be made to illustrate the science of geology – composed of strata resembling those of the earth except in their relation to the sense of taste. Children might thus be crammed at once with cake and geological science, and acquire a knowledge of the crust of the earth in eating the model of it” (Anon, 1859). n this recipe, children sandwich a cherry-studded layer in between two other strata of chocolate “rock”. After it has set, they create a fault line to reveal the cherry seam. - 100 g white chocolate - 100 g milk chocolate - 100 g dark chocolate - 3 pieces of butter, each weighing 20 g - 25 g rice crispies - 120 g glacé cherries, cut into halves (if not available, use sultanas or raisins) - 75 g digestive biscuits, broken into crumbs You also need a round cake tin 15-17 cm in diameter. (Small disposable foil baking trays also work and can simply be ripped open when it is time to cut, mine and eat the cake, which removes the need to line the cake tins.) - If using a cake tin, prepare it by lining with baking parchment. - Melt the white chocolate with one of the 20 g pieces of butter, in a microwave on medium power (set it for 30 s and then stir, and repeat until it is melted; it will take about 2 min in total), or in a heatproof bowl placed over a saucepan of simmering water. Add the rice crispies. Pour the mixture into the cake tin, level it off and press down. (Here you are compressing ‘sediments’ to help them become densely packed rock.) Place somewhere cold to help it set a little while you prepare the next layer. - Melt the milk chocolate with 20 g of the butter, as above. Add the cherries. Pour on top of the white chocolate layer, level it, then press down. - Melt the dark chocolate with the remaining 20 g of butter. Add the biscuit crumbs. Pour onto the top of the other two layers, level it and then press firmly. - Place the cake tin in a refrigerator and leave to set for about 8 h. Once the cake has set, remove it from the tin by lifting it out onto the baking parchment. Carefully remove the paper. Leave to warm for 15 min or so before attempting to ‘fault’ the ‘rock’. - Take a sharp knife and make a cut through the middle of the cake, preferably at a slight angle rather than straight down. This is your fault line. - Now move one of the pieces so that the top of the dark chocolate layer on one half is level with the middle of top of the milk chocolate layer on the other, exposing the cherry seam. If you like, you could use toothpicks to carefully mine out the cherries. Try not to disturb the other layers of rock – you don’t want to cause a rock fall! - w1 – The full range of ‘Bone Trail’ resources can be downloaded from the outreach page of the British Society for the History of Science. This article is very interesting and enjoyable, and the project addressed is even more engaging. The particularly strong points of The Bone Trail are the link between academic research and school teaching; the interdisciplinary approach, stressing the unity of culture and the multiple connections between science and humanities; the integration of traditional teaching with hands-on and e-learning activities; the use of models built with common household or kitchen materials; and the transferability to other teaching contexts. I recommend this article to secondary school teachers (for students aged 10-15) willing to develop a multidisciplinary curriculum and to foster students’ interest in the history of science. The practical activities like building the anatomical model of a dinosaur’s leg and preparing the “geological cake” (with geological faults!) are simply fantastic to arouse enthusiasm and motivation among the pupils. Creative teachers may also be inspired to extend and adapt the proposed materials with the help of the quoted website. Giulia Realdon, Italy
<urn:uuid:a4586824-ef1c-458e-85ac-2524118c17ae>
CC-MAIN-2022-33
https://scienceinschool.org/article/2006/bonetrail/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00403.warc.gz
en
0.94824
2,091
3.5
4
Note – please also see our article that explains the different types of classical music. The term “classical music” awkwardly covers a huge variety of different styles and genres, a bit like how the term “The American People” covers a huge range of different types of people, lifestyles, etc. It is an open secret that these days, classical music is not nearly as popular as it once was. This is clearly true, but at the same time, unnecessary and regrettable. Back in the 1800s, when most of what we now term “classical music” was written, composers did not deliberately set out to create “high brow” and unapproachable/unpopular music. Sure, some composers did write some advanced stuff, but most of what most composers wrote was designed to be enjoyed by as many people as possible. If the composers had no audiences, they’d make no money; they needed to write music that people liked. Back then, they weren’t seen as writing “classical” music, they were seen as writing ordinary and normal contemporary and popular music. How to Listen to Classical Music People listen to music differently today and so have evolved their expectations of what music should be. It is only in the last hundred years that music has become ubiquitous. Prior to then, you couldn’t just turn on the radio, or listen through the internet. You couldn’t play a recording on a CD. The only way to hear music was via live performance. Sure, lots of people would perform music in their homes, but if you wanted to hear a symphony, or see an opera or ballet, that unavoidably meant going to a local theater, and of course, only seeing/listening to whatever it was they were choosing to perform. As a result, hearing music was a special event rather than an everyday everywhere experience. When people attended a performance, they’d (mostly) sit quietly and eagerly listen to it and be focused on the music and the experience, the same way we do now when we attend a movie in a picture theater. They’d not also be getting ready for work, driving in the car, doing homework, cooking, texting, or any of the other activities where we often have music playing in the background now. This is key. Today, much of the time, music is “in the background” and we ignore it as much as we focus on it. What was the tune they played not just before the one playing now, but the one before that? Chances are you mightn’t even remember. A lot of modern music is written with that understanding and expectation, and so it is easy to listen to – or perhaps better to say, easy to not listen to. And now you probably guess the big difference between classical music and most modern music. In general, most classical music is best appreciated, enjoyed, and understood if you focus on it and concentrate on it. Some music requires more concentration than others, and we’re trying to introduce you to some of the more approachable and more easily enjoyed pieces. That is not to say that much classical music can not be enjoyed as “background music” too. Some definitely can’t, but much/most can. Perhaps a distinguishing feature is that with classical music, the more “effort” or focus you put in to listening to a piece of music, the more reward/pleasure you’ll get in return. Classical music has a depth to it which much modern music does not have. There’s another thing as well. Think of attending a university lecture. Of course you need to concentrate to understand what the professor is telling you. That’s the same as what we’ve been saying so far about the need to concentrate to best appreciate, understand, and enjoy classical music. It is also true that if you are already familiar with the subject – maybe you’re a third year student sitting in on a first year class – then you don’t need to concentrate so much and you’ll readily understand and appreciate what is being taught, even if you only tune in and listen to every other sentence. One more analogy. If you’re driving to a new address in a new city for the first time, you need a map or GPS so you know how to get there. The second or third time, you don’t need the map/GPS as much, and after a dozen times, perhaps you can do it from memory. Both these analogies apply to classical music. Once you become familiar with a piece, you can more readily “fill in the gaps” when you’re hearing it again in the future, and so it is possible to understand and enjoy a piece, and not get “lost” in it, without concentrating so much in the future. Now for the second point. Coming back to the example of attending a lecture, assume now that the professor is speaking a foreign language! You need to learn the foreign language before you can understand what the professor is saying. No amount of concentration will help if you don’t know the language. Which brings us to : Learning the “Language” of Classical Music There is no one “language” for classical music. Our page about the different types of classical music explains how very broad the concept of classical music is. This is important, because if you like a particular piece of music, that doesn’t automatically mean that you’ll of course like all classical music. Perhaps more to the point, for a newcomer to classical music, just because you don’t like a particular piece of music also does not mean that you don’t like all classical music. An open mind, and always extending your boundaries is important. Sure, it is lovely to return to familiar favorites, but from time to time, try new pieces too. If you like one piece of music by one composer, try listening to some of that composer’s other works, or listen to works by his contemporaries who wrote in a similar style, or listen to other music of that type in general. Different styles of music have their own “languages”. Some parts of some styles share some components with other parts of other styles, just like languages sometimes share some words and grammatical concepts. Other parts are different. Once you understand the style of music you’re listening to, you’ll come to build up a set of expectations and understandings as to what the music should be, what it will do, and how it will evolve and “tell a story” in music. You’ll get to say to yourself “Ah ha, I know what the composer is doing here” and you’ll learn to hear the difference between an introduction and a main theme, you’ll recognize transitions and bridges, repeats, codas, second subjects, and all sorts of other building blocks that go into making a piece of classical music. This begs another question, perhaps. Let’s ask and answer it : Do You Need to Learn Music Theory and Notation? Some of the pieces of music on YouTube show the score, synchronized to the music. Some of the commentaries about music talk about music theory – keys and chords, minors and majors, allegros and arpeggios, diminished and augmented notes/chords, and so on. It can all seem a bit overwhelming – perhaps all you want to do is to just enjoy listening to “nice” music that sounds good. In that case, there’s no need to get bogged down in any of this esoteric strange detail. The music is the music, after all, and it quite literally speaks for itself. But if you find yourself becoming more and more interested in classical music, you might find yourself wondering why music sounds good (or bad), and what the “secrets” are of composing and playing music, and generally wanting to better understand the topic that is proving to give you such pleasure. In that case, you’ll quite likely enjoy learning more about the music, about the theory of music, about the history of music’s evolution, life-stories of composers, the different instruments and how they make the sounds they do, and so on. You’ll also find that the more background you give yourself, the better and more effortlessly you’ll get to enjoy classical music, and the easier it will be to appreciate new pieces for the first time. I experienced something similar when I first started to sell computers. I went out with an experienced salesman, and we visited a customer. The salesman was asked some questions about their present computer, and he showed the people how to do certain things with it. I was impressed (they were too). Afterwards I asked him how long he had studied that specific program. He said he’d never seen it before, but all the computer programs on our computers followed certain conventions, so he knew what to look for, and could guess at what to do. It is the same with music. When you know what to listen for, and understand what it is you’re hearing, it is easier to “put it all together”. Reading a score is also tremendously interesting – it helps you understand how the sounds are made, which instruments are playing, and lets you see parts of the music you might have otherwise overlooked. But be careful – it is possible to get so buried in technical elements of following a score that you lose the musicality of the experience. For example, I tried to learn more about one of music’s most profound pieces – Beethoven’s final piano sonata – by studying the score, trying to differentiate between Beethoven’s concept and the interpreted versions performed by pianists. But the score was just a collection of notes on paper – they had no life, and they looked mechanistic (and very complex in parts, but disarmingly simple in others). The music was something more abstract, a totally different level to the mere notes in the score. Appreciation Requires Repetition Many popular modern songs have a simple theme, maybe a related second theme or chorus, and that is all. The theme is repeated several times with different words (different verses) and the related second theme alternates in some way with the main theme. You can hear it once, and remember the theme – indeed, you can hear the first half and already be able to guess how the rest of it goes. It might take a while to remember the words, but you’ve grasped its main tune straight away. But a piece of classical music might have many different thematic elements within it, and one of the distinctive things is, when hearing a piece of music for the first time, you really can’t guess what is coming next. But each time you hear it, you get to understand more of its main “musical journey”. At some point, you’ll understand and remember the main progression of the main tune. But maybe then you’ll hear a different version/recording of the piece, and all of a sudden, because of the different relative volumes and prominences of the different instruments, you hear parts of the music you’d not even realized were present with the other version, and you get to discover an entire new perspective on the piece – maybe you normally focus on the blazing trumpets and the richness of the trombones layered on top of shimmering violins and violas, and then suddenly one day you realize there’s a much longer/slower melody line being played “underneath” the brass and all the other orchestral sound, in glorious harmonization, by the cellos and double basses. And then after a few more playings, you’ll notice the occasional trills in the wood-wind punctuating the rest of the sound, and there’s still more that you’ll uncover in subsequent listenings too. One of the great things about classical music is that you can listen to a piece a thousand times, and still hear something new and appreciate it in a different way each and every time. You’ll welcome the familiar parts and be delighted at hearing again your “familiar friends”, and also be delighted to pick up on subtle extra parts of the overall fabric of the music. The point here is not to judge a piece of music based only on your first impression. You can probably do this for popular music, but you should not for classical music. Some of the most favorite pieces of music I now treasure the most were pieces of music that bored me silly when I first heard them. It seems there’s even some sort of yin and yang balance in this – the more effort you put into learning a piece of music and the longer it takes to appreciate it, the more pleasure you eventually get. What if You Don’t Like Part of a Piece of Music? You’re not alone. When I was new to classical music, I’d find that I really liked the “good bits” of a piece of music, but other parts would bore me silly. For example, many symphonies typically have four movements – a fairly lively movement, a slow movement, a rhythmical movement then another lively movement. I often found the slow movement, or maybe even two or three of the movements, to be unappealing, but felt that I was “failing” or “cheating” by not enduring the bad with the good. There is no law that requires you to listen to any piece of music in its entirety. If you only like part of a piece of music, then congratulations. It is great you’ve now found a new piece to enjoy, whether it be one minute in the middle of a piece or one hour of a lengthy piece in its entirety. It is very common not to like an entire piece of music. I’ll wager that the vast majority of all the people who claim that Beethoven’s Ninth Symphony is their absolute favorite piece of music have never even heard the first three movements of that symphony, and certainly wouldn’t like at least one of them if they ever did! Don’t feel bad about not liking it all. Be happy you like some of it. And perhaps, from time to time, listen to some more of the piece as well; you might be surprised how, over time, you gradually come to like more and more of it. Or maybe not. I can think of some cases in my own “musical journey” where I started off only liking a very short part of a longer piece of music, but now, years (decades!) later, I find myself closely connected to every note in every bar of the piece. But there are other pieces which I still find unapproachably boring (much of Mozart, for example – so many people feel obliged to pretend to like Mozart, but I’m quite happy to tell the truth and say I find much of his music about as interesting and enjoyable as watching paint dry). There are also pieces of music in a “between” category – projects that I’ve set myself; pieces of music that I don’t know well at present, and get little enjoyment from, but which I feel I should take the trouble to learn better, because I sense there’s a lot of rich reward waiting for me to unlock and find within the music. For More Reading I have very little regard for Edward Heath as a politician and former British Prime Minister, but he wrote an enjoyable and approachable book on music appreciation, “Music – A Joy for Life“, which I happily recommend as an interesting mix of music appreciation, personal autobiography, and general pot pourri of miscellanea.
<urn:uuid:b5a79562-97ea-4242-a8dc-0b593ef2bb24>
CC-MAIN-2022-33
https://blog.thetravelinsider.info/other-content/classical-music/how-to-appreciate-and-enjoy-classical-music
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00406.warc.gz
en
0.968407
3,349
2.640625
3
Eggs are definitely one of the breakfast favorites! And rightfully so because not only is it easy to prepare and budget-friendly, it’s also packed with protein, healthy fats, vitamins, and minerals – it’s basically a nutritional powerhouse! Add the fact that it’s delicious of course even on its own with just a little seasoning. And when it comes to seasoning eggs, it can be as simple as salt and pepper or as playful as paprika and thyme – depends really on how experimental you are. Eggs have surely gotten a bad reputation in the past but people are now more embracing of eggs and their health benefits. Cholesterol is of course the first thing that concerns people about eggs. Yes, eggs contain cholesterol, one large egg actually has 200mg cholesterol. But there have been studies that show no adverse changes in cardiometabolic markers between high-egg (12 or more than 12 eggs/week) weight loss diet and low-egg (2 or less than 2 eggs/week) weight loss diet among adults with prediabetes or with type 2 diabetes. Now, this is not to say that you should eat scrambled eggs every day for breakfast. It just shows that if you have a pretty balanced diet, eating eggs will not be an issue. If, however, you were advised by your doctor to watch your cholesterol levels, make sure you cut down on other foods with saturated fat if you want to keep eggs in your diet. (It makes more sense to cut down on those foods first considering eggs have the nutrition that your body actually needs.) Eggs are a staple among high-protein dieters. But protein is not just what eggs are for. Eggs contain iron which prevents anemia, vitamin A to maintain healthy skin and eyes, vitamin D to strengthen teeth and bones, vitamin E to boost the immune system, vitamin B12 to keep nerves and blood cells healthy, folate to help maintain new cells, selenium to act as antioxidants, lutein and zeaxanthin for good vision, and choline for brain development and function. Like what we said, a nutritional powerhouse! Fun fact, 2/3 of the fat found in eggs is unsaturated, which is the healthy kind! Omega-3 fats are important for our brain and nervous system, yet another reason why fat in eggs is not as bad as previously thought of – well of course sans that 1/3 part. The fat content of eggs is found in the yolk that’s why some people choose to ditch the yolk when eating eggs. But the thing about that is you’re also missing the other vitamins and antioxidants found in the yolk itself. The key really is a balanced diet. Eggs should be eaten along with other healthy foods to balance everything out. That way, its cholesterol content won’t be an issue and you can freely enjoy eggs to your heart’s delight. Eggs are good for you, that we can now agree to be a fact. Serving them for breakfast is a healthy and hassle-free way of starting your day. You can try boiling, poaching, frying, or scrambling it. Whichever way you want to cook your eggs, remember that it’ll only take a jiffy to get your breakfast ready! There are so many classic and creative ways for you to serve eggs but to nail that, don’t forget that seasoning eggs are also an important key. Choosing the right spices for eggs is no rocket science but it will help if you already have an idea of how a particular spice goes with eggs. Having said that, here is a list of spices (and recipes) that you can try the next time you feel like whipping up an egg dish. Spices for Eggs Basil is a member of the mint family and is native to Africa and Asia. It can be used both as fresh or dried in cooking. This flavorful and leafy green herb is great for sauces, stews, soups, or teas. It has a somewhat sweet and savory taste with hints of anise, mint, and pepper flavor. Basil contains vitamins K and A, iron, calcium, and manganese. It also has antioxidants, antimicrobial and anti-inflammatory properties. Basil aids our body to reduce oxidative stress, lower high blood sugar, boost mental health, and support liver health. The basil works to balance the richness and creaminess of this creamy cheesy scrambled eggs recipe by adding a hint of freshness with its peppery and minty taste. Chervil is an herb that is closely related to parsley. It is sometimes called French parsley or garden chervil. And although it may not be as common or know worldwide, it’s one of the principal herbs used in French cuisine. It has a very light and delicate taste, with hints of anise or licorice taste. It is a good source of vitamin C, carotene, iron, and magnesium. Chervil also contains bioflavonoids that aids in vitamin C absorption. It is also good for cough, digestion problems, and high blood pressure. Here’s a classic French herb omelet recipe with a generous serving of Italian herbs including chervil. This omelet is a great idea to start your day. Chili powder is the ground form of one or a variety of dried chili peppers. The chili powder blends or chili seasoning mixes purchased commercially usually contain a blend of chili powder and other spices. Chili powder tastes mild to moderately spicey which basically depends on how much cayenne pepper is used in the mix. The addition of other aromatic and savory spices in the blend gives it that Tex-Mex flavor. Chili powder contains vitamins A, B3, B6, C, and E. It also has fiber, calcium, magnesium, and phosphorus. Chili powder helps in reducing food cravings, increasing metabolism, aiding digestion, helping your nervous system to function properly, and keeping your brain functioning properly. Check out this Mexican-inspired scrambled egg with a seasoning combo that included chili powder along with cumin, cinnamon, pepper, and onion powder. Chives is another herb that produces edible flowers and leaves and a close relative of onions, garlic, shallots, scallion, and leeks. Its stalks are usually diced and used in omelets, soups, and other dishes while the edible flowers are a great addition to salads. Its flavor is similar to the onion with a hint of garlicky taste. Chives are a good source of vitamin K, folate, lutein, and zeaxanthin. It helps with bone health and blood clotting, prevents age-related macular degeneration, and improves memory. Try this Chinese Chives & Eggs stir fry for a refreshing and healthy breakfast. You can adjust the chives if you think it’s too much to your liking but I suggest that you try the recipe first as is. Curry powder is a spice blend that mainly consists of turmeric, cayenne, ginger, cumin, and garlic. It originated and is mainly used in Indian cuisine. It has a deep, earthy flavor with a slightly sweet taste. The flavor may vary depending on the spices used. It’s rich in anti-inflammatory properties and powerful antioxidants. And because it’s a blend of different spices, its health benefits also range from reducing inflammation, battling bacteria, aiding digestion, to fighting cancer. These curry-spiced scrambled eggs are not just delicious to look at but equally tasty as well. It’ll give your eggs some exotic spin with the addition of the curry powder and punch with the addition of red onion and chilis. Dill is an herb that belongs to the celery family. Its leaves and seeds can be used in cooking. It’s a commonly used herb in North African and Middle Eastern cuisine. It has a grassy taste with hints of anise-like licorice flavor. Dill contains vitamins A and C, iron, folate, and manganese. It is also rich in antioxidants that help lower blood sugar levels, reduce inflammation, and prevent rheumatoid arthritis, heart disease, and certain types of cancer. Add freshness to your scrambled eggs by adding a tablespoon full of dill like in this Swedish scrambled eggs recipe. Make sure you don’t run out of fresh dill, you can easily restock by ordering online. Garam Masala is another spice blend that originated in India. The blend usually contains cloves, fennel seeds, bay leaves, and black and white peppercorns. Although usually mistaken for curry powder, take note that garam masala has a deeper color and is also spicier and sweeter in taste. And because it’s a mix of different spices, it’s also packed with antioxidants and anti-inflammatory properties. It aids in digestion, enhances nutrient absorption, regulates blood pressure, and reduces inflammation. Here’s an Indian-inspired scrambled egg spiced with masala along with cumin and ground turmeric. See for yourself how you can level up your chapatis (or sourdough bread) with this egg dish. Italian seasoning is a mix of different dried herbs that usually contains oregano, basil, marjoram, thyme, and rosemary. The flavor varies depending on the herb combination and its amount in the blend. When it’s oregano and thyme-dominant, the seasoning can taste earthy and piney. Italian seasoning contains fiber, vitamins, minerals, and antioxidants. Its health benefits range from gas relief to bacteria protection to cancer prevention. These Italian cloud eggs will surely show you how Italian seasoning can level up your baked eggs game. It simply works with parmesan cheese and sun-dried tomatoes. Marjoram is also an aromatic herb that is used in Greek and Mediterranean cuisine. It is closely related and is usually mistaken for oregano. They actually have similar flavors, but marjoram is slightly sweeter and milder with hints of citrus, floral, and woody notes. It is a good source of magnesium and potassium. It also contains folate and vitamins A and K. Marjoram has antimicrobial as well as anxiety-reducing properties. Marjoram is used with thyme in this velvet scrambled eggs recipe. The herbs definitely help in balancing the richness of milk and butter. Paprika is derived from the dried sweeter varieties of peppers which are ground into powder. It is majorly sourced from Hungary but is also produced in other places including some regions of the United States. Its flavor may vary depending on the type of pepper used. It can be mild, sweet, and sometimes even spicy. Paprika is rich in beneficial compounds like niacin and carotenoid antioxidants. It also contains a good amount of Vitamin E and antibacterial properties. Paprika helps in healing wounds, improving immunity, relieving gas, and reducing the risk of heart disease and cancer. Spice up your breakfast (or even dinner) with this easy Shakshuka recipe. It’s perfectly seasoned with paprika, cumin, cayenne, and black pepper. Can be served with any rustic bread or pita bread for dipping. Run out of fresh bread? No problem, now you can simply order fresh bread online with just a few clicks. Tarragon is a perennial herb in the sunflower family and is one of the main herbs used in French cooking. Aside from cooking it’s also used to flavor carbonated drinks in countries like Armenia, Georgia, and Russia. It has a slightly sweet and bitter flavor with hints of licorice-like taste. It contains nutrients like manganese, iron, and potassium. It also has antibacterial properties. Tarragon helps lower blood sugar, improve sleep, regulate sleep patterns, and reduce pain associated with conditions like osteoarthritis. Reserve this tarragon shallot egg salad sandwiches for special mornings to treat yourself. The recipe may be a lot for one person but hey, you can always refrigerate it for the next day! Thyme is also an herb that is closely related to oregano and a part of the mint family. It is used for dietary, medicinal, and ornamental purposes. In cooking, it can be used both fresh or dried. It has an earthy, minty, and sharp flavor with a slightly sweet and peppery taste. Thyme is a good source of vitamins A and C, copper, fiber, iron, and manganese. It helps in lowering blood pressure, stopping cough, boosting mood, and supporting the immune system. Here is another baked egg recipe, baked egg with ricotta, thyme & cheese. It’s great for breakfast along with your freshly toasted bread.
<urn:uuid:c8d9780d-ca6c-4d54-910e-d4fdd5685cb5>
CC-MAIN-2022-33
https://foodfornet.com/spices-eggs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00403.warc.gz
en
0.94675
2,731
2.546875
3
Colonial policies and practices have introduced significant health challenges for Indigenous populations in commonwealth countries. Health systems and models of care were shaped for dominant society, and were not contextualised for Indigenous communities nor with provision of Indigenous cultural approaches to maintain health and wellness. Shifts to support Indigenous health outcomes have been challenged by debate on identifying which system and service components are to be included, implementation approaches, the lack of contextualised evaluation of implemented models to justify financial investments, but most importantly lack of effort in ensuring equity and participation by affected communities to uphold Indigenous rights to health. Prioritising the involvement, collaboration and empowerment of Indigenous communities and leadership are critical to successful transformation of healthcare in Indigenous communities. Locally determined priorities and solutions can be enacted to meet community and individual needs, and advance health attainment. In this paper, existing successful and sustainable models that demonstrate the empowerment of Indigenous peoples and communities in advocating for, designing, delivering and leading health and wellness supports are shared. - health services research - health systems - health policy - public health This is an open access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited, appropriate credit is given, any changes made indicated, and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/. Statistics from Altmetric.com If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. Current health system structures and approaches are insufficient to resolve health inequities experienced by Indigenous populations. Indigenous rights to health and regaining self-determination over all aspects of decision-making and service delivery are overarching needs in health system and service transformation. Indigenous leadership, community and individual empowerment is a priority for ensuring there is culturally relevant development, implementation and evaluation of health system structures and service delivery. While refraining from imposing a definition, the United Nations recognises Indigenous peoples as those who self-identify and are accepted by their community as their member, with this community having historical continuity to precolonial and/or presettler societies, with distinct cultural practices and social, economic and political systems.1 Health systems in communities prior to contact were robust.2–4 Regardless of global location, oral history supports a thriving population with longevity and a wholistic view of health. Communities were upheld with traditional roles to support health and strong principles of care and responsibility for each member prevailed. These health systems were dismantled through colonial and imperial governmental action.5 In commonwealth countries such as Canada, the USA, Australia and New Zealand, Indigenous peoples were subjected to systems and models of care shaped for dominant society, which were not contextualised for remote communities and with the exclusion of Indigenous cultural approaches. The existing healthcare systems are heavily oriented to servicing acute illness, leaving management of chronic conditions to be addressed once established or when complications occur,6 and with minimal focus on broader concepts of preventive services and health maintenance. Compensation models for facilities and providers in health systems do not support quality care, complex care provision or services beyond a biomedical approach, which are necessary to address inequities in social determinants of health. Health institutions may strive to provide culturally safe care environments which are free of racism and stereotyping and which respect Indigenous patient identity,7 but for the most part fail to resource the needed initiatives in processes and staff to do so effectively.8 Several examples of discrimination and racism have been compiled, with severe consequences of harm and death to Indigenous patients.9 The right to resolve these inequities through Indigenous self-determination, development and administration of health programmes, and maintaining the right to access mainstream social and health services without discrimination was declared by the United Nations.10 Upholding these rights requires significant transformation of health systems, services and individual providers, which will only be accomplished by demonstrating allyship with Indigenous leaders, communities and individuals. Prioritising the involvement, collaboration and empowerment of Indigenous communities and leadership are critical to successful transformation of healthcare in Indigenous communities. Locally determined priorities and solutions can be enacted to meet community and individual needs, and advance health attainment. This Practice contribution will introduce community engagement principles, and then relate examples of health system, health service and promotion programmes, and provider approaches that have successfully embodied these principles to work in partnership with and empower Indigenous communities to attain health and wellness. Community engagement principles supporting empowerment Frameworks from the public engagement literature conceptualise a spectrum of community engagement. Approaches of ‘Inform’ and ‘Consult’ perpetuate tokenistic and insincere interactions, with those dominant retaining power and decision-making over the processes and directions enacted. In contrast, actions of ‘Involve’ and ‘Collaborate’ represent increasing meaningful community engagement by committing to the inclusion of those affected by the decision and initiative, whereby ‘Empower’ secures community ownership of the process and ensures power for setting direction and leading initiatives.11 This framework is aligned with typology proposed by Pretty12 and Wagemakers et al13 and adapted by Snijder et al for application to studies evaluating Australian Indigenous community development projects.14 Here, higher order activities of interactive participation (reflecting partnership and increased community control over implementation) and self-mobilisation (community generated in its entirety and with community-driven decision-making around involvement of outsiders) reflect the desired levels of engagement between Indigenous leadership, communities and individuals when interacting and working with health systems leadership, services and providers. To demonstrate structural, systemic and provider-level interactions privileging community engagement at its highest forms,15 examples from Canada, the USA, Australia and New Zealand are summarised here. These demonstrations were selected opportunistically based on availability of information in peer-reviewed publications, inclusions in reports or organisational websites, and limited to a few examples at each of health systems, services and provider levels. While the stories are undoubtedly best shared by those involved in the creation of these innovations, and their outcomes by those who engage in the initiatives, publicly available descriptions were used and interpreted from the lens of a health systems researcher and clinician of Indigenous descent. Leadership and community empowerment in a self-determined health system The First Nations Health Authority in British Columbia was officially launched in 2013 following the signing of the ‘British Columbia Tripartite Framework Agreement on First Nation Health Governance’ in 2011.15 This Health Authority was born from the ‘Tripartite First Nations Health Plan’16 developed between the First Nations Leadership Council (representing the British Columbia Assembly of First Nations, the First Nations Summit and the Union of British Columbia Indian Chiefs), the Government of Canada and the Government of British Columbia. As shared in these documents, First Nations leadership advocated for decades to government representatives that fundamental change was required to improve the health status of First Nations people. Propelled by critical court rulings and agreements, ultimately negotiations to transition and transfer health programme and service responsibilities to the First Nations Health Authority were completed, leading to a health system governed by First Nations individuals and communities that interdigitates with the provincial and regional services available in that province. The Authority is also transforming programmes and services, whereby they are reoriented to local community needs. The directions are provided by communities leading the discussions at community engagement hubs, regional caucus sessions and annual forums.17 Health services that meet Indigenous approaches to health and wellness Indigenous peoples conceptualise health from the perspective of a balance between physical, mental, emotional and spiritual wellness, and with extensions beyond the individual person to also reflect family and community wellness. Colonial structures reinforce silos of ministries and services that do not connect or interact despite the need for these to align to resolve or mitigate gaps in health outcomes. Khoury’s description of the formation and development of Aboriginal Community-Controlled Health Services in Australia exemplifies a health service that approaches health from a wholistic perspective, and that is Indigenous community driven.18 The Indigenous community in the Redfern suburb of Sydney established their system to provide a social approach to health. Born of volunteer health service provision, this service from the beginning led advocacy and education of non-Indigenous persons and agencies, provided cultural supports, worked across health and social services sectors, provided health education and promotion activities and responded to emerging health crises in community. All aspects of physical, mental, emotional and spiritual health are attended to with empowerment and affirmation of Indigenous identity and leadership. A second example of this is the Kõkua Kalihi Valley Comprehensive Family Services which serves Native Hawaiians. Kõkua Kalihi Valley began as a health centre initiated to promote healing and reconciliation through medical and dental services. Under community direction and a cultural approach to health, the Pilinahā Framework for Health, which relates the connections vital for health, has been employed throughout the entire organisation,19 and Kõkua Kalihi Valley expanded to being a full primary healthcare service which provides social supports and innovative environmental and physical activity promotion initiatives.20 Community values embedded in health promotion and intervention programmes The He Pikinga Waiora (Enhancing Wellbeing) Implementation Framework was developed for chronic disease interventions with Māori populations in New Zealand.21 The theoretical basis of the framework, Kaupapa Māori,22 reflects Indigenous knowledge, cultural protocol, methods and philosophy. The interventions are then centred on self-determination and local context priorities, with overlap of western concepts of implementation science associated with positive implementation outcomes. The Public Health Agency of Canada undertook an activity, called the ‘Canadian Best Practices Initiative’, to compile promising health promotion and chronic disease interventions throughout the nation.23 The Agency supported gathering Indigenous expert opinion to inform the creation of a measurement framework, ‘Ways Tried and True’, that incorporates Indigenous values in interventions. Six criteria were identified, reflecting the extent to which the intervention was (1) community based, reflecting the degree to which Indigenous community members, service providers, community leaders and elders were involved in the planning, design, delivery, adaptation and evaluation of the intervention; (2) wholistic, with this approach considering wellness, implementation environments, the recipients of the intervention and the involvement of cross-sector departments; (3) involving Indigenous cultural knowledge, incorporating values, culture, shared experiences and the principles of the community/group in which the intervention would operate; (4) building on community strengths and needs, identifying available resources in the implementation environment and building in mechanisms to leverage strengths and fill gaps; (5) partnering and collaborating with external organisations and institutions, and allies; (6) effective at meeting its goals. With this in mind, the report highlights several preventive and health maintenance interventions, including the Kahnawake Schools Diabetes Prevention Project, the Kainai Ever Active Schools and the Little Salmon Carmacks First Nation Greenhouse & Farm as programmes that best reflect these criteria. More recently, the experience of care delivery in the Niiwin Wendaanimak Four Winds Wellness Program for homeless and at-risk Indigenous populations in Toronto has been described.24 Cultural safety has been achieved through Indigenous leadership, with access to activities that promote wellness and community building, inclusivity and harm reduction in a non-judgmental space with respect for dignity, autonomy and kinship. Health service provision approaches with individuals, families and communities Changing physician approaches to communication and care provision is a fundamental need to attain empowerment of Indigenous patients. As exemplified in diabetes25 and arthritis,26 Indigenous patients have long experienced insufficient physician preparation in understanding the social and cultural contexts of patients’ existence. In the ‘Educating for Equity’ continuing medical education intervention which was developed by an Indigenous-led team,27 healthcare providers are taught how to recentre relationship building with their patients, and engage in cultural aspects to support care engagement.28 This session goes beyond cultural awareness and competency training, which provide basic instruction on culture and respectful interactions, by providing strategies to clinicians on how to be advocates and address structural barriers to care. Historically, paternalistic therapeutic approaches in medicine removed decision-making power from patients, and negated their preferences for treatment as well as values. In shared decision-making strategies, providers and patients collaborate to decide on the way forward using communication and decision-making supports. Shared decision-making yields better concordance with patient values, and informational needs can be met. The Minwaashin Lodge partnered with non-Indigenous researchers to adapt the Ottawa Personalized Decision Guide with Indigenous patients, and use it with decision coaching. The adaptation resulted in a tool that better met decision-making needs, supported health literacy, allowed for incorporation of experiences and that could be used as a talking guide when working with a decision coach.29 Further work is underway to field test this approach in cancer decision-making.30 There is a need for welcoming and supporting the incorporation of traditional practices in healthcare plans. Ongoing privileging of western evidence base in medicine, either through provider hesitancy of accepting the benefit of Indigenous healing practices in maintaining health,31 or through not funding Indigenous practices, does not align with critical statements by the United Nations,10 nor the Truth and Reconciliation Commission of Canada.32 There are increasing opportunities provided within mainstream health services to access traditional practices. The manuscript by Redvers et al provides a summary of traditional practice offerings funded in Ontario hospitals, including access to traditional ceremonies, elders and healers.33 The Indian Health Service in the USA provides a list of cultural and traditional healing activities supported through the organisation.34 It is critical that healthcare providers equally privilege these activities as part of healthcare plans. Imposition of colonial healthcare delivery on Indigenous peoples is largely perpetuated in the present-day system and it is increasingly recognised that ‘more of the same’ will not result in substantive improvements in Indigenous health status. The examples shared here are demonstrations of where Indigenous community-empowered actions have made substantive changes in health structures (the First Nations Health Authority), health services (Aboriginal Community-Controlled Health Services and Kõkua Kalihi Valley) and health promotion programmes (He Pikinga Waiora and Ways Tried and True) to support health and wellness in communities and Indigenous peoples. We also highlight health organisations that have embraced incorporation of traditional healing, and strategies through education and clinical tools where providers have actualised a new way of healthcare delivery, with accountability to those who seek its services. The examples provided here can provide ideas and guidance on what is required to achieve a healthcare delivery reset. In the spirit of cultural humility, readers are encouraged to engage in reading the original references, and undertake a reflective exercise to consider how these initiatives and changes have come about, and how they can contribute within their roles and privileges. Common elements to the examples are Indigenous-driven leadership to advocate for the changes; creation of culturally aligned structures, services and programmes; and responding to health needs in the local context. As colonial health structures remain in place, mainstream healthcare providers and organisations accepted an allyship role in empowering Indigenous community ownership and delivery of these services. Allyship should not be approached as simply ‘improving’ or ‘helping’ others; as expressed by Mitchell et al, allyship implies respectful relationship building and addressing power imbalances.35 What is empowering of others is supporting but not leading, verifying the potential impact of actions before taking them, demonstrating humility and reflexiveness and promoting decolonisation processes internally and externally in longitudinal fashion. Aligned with antiracism activities, colonial health system leadership and providers have a clear role in resetting health service and healthcare delivery, while ceasing to be complicit in the injustices and inequities in healthcare systems and perpetuating health inequities. Handling editor Stephanie M Topp Contributors CB designed the manuscript, assembled relevant references and drafted and finalised the manuscript. Funding This study was funded by the Institute of Aboriginal Peoples Health (grant number: FDN 143284). Competing interests None declared. Patient consent for publication Not required. Provenance and peer review Not commissioned; externally peer reviewed. Data availability statement There are no data in this work.
<urn:uuid:1c056aa1-43ec-48fa-a9a2-5980a51d934e>
CC-MAIN-2022-33
https://gh.bmj.com/content/6/2/e004052.full
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00005.warc.gz
en
0.93559
3,402
2.875
3
Where will lightning strike? On August 20, 1975, he and Sean hiked to the top of Moro Rock together with their sister Mary and her friend Margie. This granite dome resides in California’s Sequoia National Park. As dark clouds gathered overhead, a light rain started to fall. Another hiker noticed Mary’s long hair standing on end. Michael snapped his sister’s picture. Laughing, Mary told him that his hair, too, was standing on end. So was Sean’s. Michael passed the camera to Mary, who took a photo of her smiling brothers. Then the temperature fell, bringing hail, Michael recalls. So their team headed down. They didn’t realize they were in danger. Immediate danger. Within minutes, lightning would injure Sean — and kill another hiker nearby. Being struck by lightning is very unlikely but very dangerous. Lightning heats the air to nearly 28,000° Celsius (50,000° Fahrenheit). That’s energetic enough to break the molecules in the air into individual atoms. No wonder lightning can be fatal. Around the world, lightning occurs about 100 times every second of every day. Most of those strikes don’t touch anyone. But lightning does injure about 240,000 people and kill 24,000 each year, according to a 2003 study. In 2012, 28 people died from lightning in the United States. Overall, that means that on average, lightning strikes about one in every 700,000 people there each year. Although dangerous, lightning also is one of nature’s most dazzling displays. For centuries, scientists have been trying to understand what triggers lightning. More importantly, they want to know where — or who — lightning is likely to hit. Researchers have looked for common threads in the stories of lightning’s victims. They’ve tracked flashes using sensors on the ground and in space, including one on the International Space Station. And they have created lightning in the laboratory. However, scientists are still struggling to understand exactly how a spark starts and how to predict where it might connect with the ground. Some researchers even suspect lightning could be used as a tool to better understand the global climate — if they only knew how to wield it. Thousands of years ago, people associated lightning’s sparks with angry gods. In ancient Norse mythology, the hammer-wielding god Thor hurled lightning bolts at his enemies. In the myths of ancient Greece, Zeus threw lightning from atop Mount Olympus. The early Hindus believed the god Indra controlled lightning. But over time, people began associating lightning less with supernatural forces and more with nature. Scientists now know that the visible, bright bolt and roaring thunder are just a small part of a much bigger sequence of natural events that unfolds in the clouds. It begins when heat from the sun warms Earth’s surface. Water vapor evaporates from lakes, seas and plants. That warm moist air is lighter than cooler dry air, so it rises to form giant cumulonimbus clouds. These clouds often give birth to storms. “Thunderstorms are like huge vacuum cleaners that suck up water vapor,” says Colin Price. He’s an atmospheric scientist at Tel Aviv University in Israel. “Some gets vented out the top of storms,” he says of the water vapor. But most of it in the upper atmosphere comes from Earth’s surface. Scientists suspect that turbulence within a cloud — strong vertical winds — causes the cloud’s water droplets, snow, hail and ice particles to smash into each other. These collisions can pry particles called electrons from the water drops and ice as they rise to the top of the cloud. Electrons are responsible for electricity. When an uncharged object loses an electron, it is left with an overall positive charge. And when it gains an electron, it gains a negative charge. Water droplets, ice and hail come in a range of sizes. Large ones sink to the bottom of the cloud. Small ice crystals rise to the top. Those tiny ice crystals at the top tend to become positively charged. At the same time, the large hail and water droplets at the cloud’s bottom tend to become negatively charged. As such, Price likens a storm cloud to a battery standing on end. Those charges in the clouds can cause changes on the ground. When the lower part of the cloud becomes negatively charged, objects in the air and on the ground below become positively charged. On that day back in 1975, positive charges climbed through the hikers’ hair, standing it on end. (To safely see something similar to this firsthand, rub your head with a balloon to transfer electrons from your hair to the balloon. Then lift the balloon.) The hikers’ hair-raising experience might have looked funny — but it also was a warning sign that conditions were right for a lightning strike. As they were coming down from Moro Rock, the hikers saw lightning’s fury up close. Too close. “My entire vision was nothing but bright white light,” McQuilken says of the strike. “Margie, who was about 10 feet behind me, says she saw tentacles or ribbons of lighting.” The bolt knocked McQuilken to the ground. Time, he recalls, appeared to slow down. “The entire experience occurred in a matter of milliseconds, but that feeling of floating and moving my feet in the air seemed to last five or ten seconds.” The lightning missed Michael, Mary and Margie, but not eight-year-old Sean. McQuilken found his brother on his knees with smoke “pouring from his back.” Sean’s clothes and skin were badly burned. But he was alive and would survive. McQuilken carried his brother down from the granite dome to get him help. Another hiker nearby was not so lucky. Lightning killed him. Air between the ground and a cloud usually separates their charges. The air acts like an insulator, which means electricity — such as lightning’s giant spark — can’t travel through it. But when enough charge accumulates in the cloud, it finds a way to get to the ground, and lightning strikes. This electrical discharge zips from one place to another to even out the imbalance in charge between the ground and the top of the cloud. The discharge may move from cloud to cloud, or it may zap the ground. That’s no mystery. But what causes lightning to start its spark is “one of the great unanswered questions in lightning physics,” explains Phillip Bitzer. He’s an atmospheric scientist who studies lightning at the University of Alabama in Huntsville. Looking for the spark Scientists think lightning sparks in one of two ways. According to one idea, the charged hail, rain and ice inside a storm cloud magnifies the electric field within the cloud. (An electric field is the region where the charges can do work.) That added boost gives the charges enough oomph to spark lightning. The other idea is that lightning is sparked when cosmic rays, powerful bursts of energy from space, deliver particles with enough energy to launch a strike. To better understand how lightning starts, Bitzer helped design a new sensor. It looks like a large, upside-down salad bowl. And it’s one of several scattered in and around Huntsville (including atop a university building). Together, these sensors make up the Huntsville Alabama Marx Meter Array, or HAMMA. When a storm passes by and a bolt of lightning flashes, HAMMA can determine where the strike happened. It also measures the electric field produced by the strike. Its sensors can peer inside a cloud during that critical split-second before lightning develops. Bitzer described HAMMA’s first successful tests in Journal of Geophysical Research: Atmospheres on April 25, 2013. HAMMA also measures lightning’s return stroke. This is the second — and more energetic — part of a strike. Lightning begins with a leader. This stream of negative charge leaves the cloud and searches for a path through the air to the ground. (In rare cases, leaders start on the ground and move upward.) Though every strike is different, a leader may travel about 89,000 meters (290,000 feet) per second. It often looks branched. It tends to produce dim light that can only be caught by high-speed cameras. The leader’s path can conduct electricity through the cloud. The return stroke, which comes from the ground, follows the path laid out by the leader like electricity on a wire. It moves in the opposite direction. And it’s more intense: The return produces the blinding flash that can be seen day or night. That’s the part you’re most likely to notice. Compared to the leader, the return stroke is a speed demon. It can travel 90 million meters (295 million feet) per second — or more. By tracking this return stroke, HAMMA can help scientists better track the total energy unleashed during a strike. Such energy data, from HAMMA and other networks, could help scientists determine how lightning strikes start. Besides his work on HAMMA, Bitzer helps make devices that detect lightning from space. When the GOES-R weather satellite heads into orbit in 2015, it will carry the Geostationary Lightning Mapper. That device, partly developed at the University of Alabama in Huntsville, will track lightning flashes from above. It’s not the first device to watch lightning from space, but it will improve on previous efforts. “At the present time, we don’t have good global coverage of lightning,” says Price, at Tel Aviv University. “However, in the next few years, satellites with optical sensors will look at Earth continuously.” That will let scientists connect lightning strikes to other weather phenomena, such as hurricanes and tornadoes. These data also may show whether climate change has been altering lightning patterns. The pulse of the storm Price says lightning strikes are like the pulse of a storm. By tracking how often lightning sparks, scientists can learn something about a storm’s behavior. Price worked on a study of hurricanes published in 2009. It found a connection between lightning strikes and the intensity of those storms. Price and his colleagues studied data from 58 hurricanes and compared them to records of lightning strikes. The intensity of lightning peaked about 30 hours before the hurricane winds reached their maximum. That connection could help scientists predict when the worst part of a hurricane is coming — and warn people to prepare or evacuate before it’s too late. Price also has investigated lightning behavior during big, non-hurricane storms. Lightning seems to “ramp up” before a tornado touches down, he’s found — even though there’s little lightning when the tornado is on the ground. In addition, lightning activity changes by day and night, and from season to season, Price and his colleagues showed. For instance, lightning activity increases during times of warmer temperatures — during the day and in seasons when the Earth gets more heat from the sun. One example: El Niño events when the Earth is slightly warmer. It even appears that lightning can change its behavior, Price finds. He has been studying connections between lightning and climate change. In a 2013 paper, he showed how rising temperatures due to global warming can boost lightning activity. He published his findings in the journal Surveys in Geophysics. How not to get struck Of the people killed by lightning in the United States between 2006 and 2012, most were enjoying outdoor activities. That’s the finding of a 2013 study by the National Weather Service (NWS). “Being outside is dangerous any time there’s a thunderstorm in the area,” says John Jensenius. The NWS meteorologist in Silver Spring, Md., tracks lightning deaths and studies lightning safety. He also worked on the 2013 study. People fishing in small boats — mostly on lakes and streams — or standing near the shore accounted for most of those deaths. In second place: people participating in outdoor sports. Here, soccer led the pack in terms of lightning fatalities. And though golfers have a reputation for being particularly susceptible to lightning, golf, Jensensius says, is “down the list quite a ways.” (Lightning killed seven times as many anglers as golfers.) On average, lightning also kills about four times as many men as women. Jensenius has some ideas about why. “It’s probably a combination of things,” he says. “Men may be outside doing more vulnerable activities than women. Or men may be more reluctant to go inside if they hear thunder.” Lightning even can send jolts through electrical or water lines into a house, injuring the people inside. That’s why, Jensensius says, it’s a bad idea to bathe, wash dishes or use appliances during a storm. Thunder is the key to safety, he points out. Most lightning strikes occur within a thunderstorm, but a small percentage can reach miles from the storm center. So going inside only when it starts to rain won’t keep a person safe. Indeed, Jensenius warns, if you can hear thunder, you are probably within reach of a lightning strike. Certainly, he advises: “When thunder roars, go indoors.” Michael McQuilken has taken that advice to heart. He’s still an avid hiker and mountaineer (as well as a professional drummer). If a storm is brewing and “I see clouds beginning to form around a summit, I call it a day,” he says. “Some people think I’m being overcautious. But I don’t want to experience a lightning strike ever again.”
<urn:uuid:d5598cd7-40df-4192-9320-7b2b3e64e847>
CC-MAIN-2022-33
https://youthwavebd.com/2014/10/where-will-lightning-strike/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00005.warc.gz
en
0.950338
2,903
3.6875
4
The History of the Ten "Lost" Tribes/Part 2/Chapter 2 THE CONDITION OF THINGS AT THE TIME OF CHRIST. To summarise the state of things in connection with the Hebrew race at the time of Christ, it was briefly this:— I. For some six centuries before, ever since the partial restoration in the days of Cyrus and his successors, the descendants of Abraham were no longer known as divided into tribes, but as one people, although up to the time of the destruction of the second Temple, tribal and family genealogies were for the most part preserved, especially among those who were settled in the land. II. Part of the nation was in Palestine, but by far the larger number were scattered far and wide, and formed innumerable communities in many different lands, north and south, east and west. But wherever dispersed and to whatever tribe they may have belonged, they all looked to Palestine and Jerusalem as their national centre, and, with the exception of those (and they were no doubt many) who had ceased to cherish "the hope of Israel" and were gradually assimilating with their Gentile neighbours, were all one in heart with their brethren in the Holy Land. "They felt they were of the same stock, stood on the same ground, cherished the same memories, grew up under the same institutions, and anticipated the same future. They had one common centre of worship in Jerusalem, which they upheld by their offerings; and they made pilgrimages thither annually in great numbers at the high festivals." Thus Philo could represent to the Roman Emperor Caligula that "Jerusalem ought not to be considered only as the metropolis of Judea, but as the centre of a nation dispersed in infinite places, who were able to supply him with potent succours for his defence. He reckoned among the places that were still stored with Jews, the isles of Cyprus and Candia, Egypt, Macedonia, and Bithynia, to which he added the empire of the Persians, and all the cities of the East, except that of Babylon, from whence they were then expelled." There is ample confirmation on this point in the New Testament. Thus, for instance, we are incidentally told in the second chapter of the Acts of the Apostles, that among the representatives from the Diaspora who were found in Jerusalem at that memorable feast of Pentecost—who were doubtless there also during the previous Passover, when the crucifixion took place—were "Parthians and Medes and Elamites, and dwellers in Mesopotamia, in Judea and Cappadocia, in Pontus and Asia, in Phyrgia and Pamphylia, in Egypt and parts of Libya and Cyrene, and sojourners from Rome, Cretans and Arabians": all of them either Jews or proselytes miraculously hearing in their own tongues the mighty works of God. Here it is to be noted that, at the commencement of the Christian era, we find in this motley and cosmopolitan Jewish crowd representatives from Israelitish settlements in the very parts where they were carried by the Assyrians and Babylonians some seven centuries before, but who are all called "Jews," and all alike regarded Jerusalem as their national metropolis. III. The name of "Jew" and "Israelite" became synonymous terms from about the time of the Captivity. It is one of the absurd fallacies of Anglo-Israelism to presuppose that the term "Jew" stands for a bodily descendant of "Judah." It stands for all those from among the sons of Jacob who acknowledged themselves, or were considered, subjects of the theocratic kingdom of Judah, which they expected to be established by the promised "Son of David"—the Lion of the tribe of Judah—whose reign is to extend not only over "all the tribes of the land," but also "from sea to sea, and from the river unto the ends of the earth." "That the name 'Jew,'" writes a Continental Bible scholar, "became general for all Israelites who were anxious to preserve their theocratic nationality, was the more natural, since the political independence of the Ten Tribes was destroyed." Yes, and without any hope of a restoration to a separate national existence. What hopes and promises they had were, as we have seen, linked with the Kingdom of Judah and the House of David. Anglo-Israelism teaches that members of the Ten Tribes are never called "Jews," and that "Jews" are not "Israelites"; but both assertions are false. Who were they that came back to the land after the "Babylonian" exile? Anglo-Israelites say they were only the exiles from the southern kingdom of Judah, and call them "Jews." I have already shown this to be a fallacy, but I might add the significant fact that in the Book of Ezra this remnant is only called eight times by the name "Jews," and no less than forty times by the name "Israel." In the Book of Nehemiah they are called "Jews" eleven times, and "Israel" twenty-two times. As to those who remained behind in the one hundred and twenty-seven provinces of the Persian Empire, which included all the territories of ancient Assyria, Anglo-Israelites would say they were of the kingdom of "Israel"; but in the Book of Esther, where we get a vivid glimpse of them at a period subsequent to the partial restoration under Zerubbabel and Joshua, they are called forty-five times by the name "Jews," and not once by the name "Israel"! In the New Testament the same people who are called "Jews" one hundred and seventy-four times are also called "Israel" no fewer than seventy-five times. Anglo-Israelism asserts that a "Jew" is only a descendant of Judah, and is not an "Israelite"; but Paul says more than once: "I am a man which am a Jew." Yet he says: "For I also am an Israelite." "Are they Israelites? so am I" (Acts xxi. 39; xxii. 3; Rom. xi. 1; 2 Cor. xi. 22; Phil. iii. 5). Our Lord was of the House of David, and of the tribe of Judah after the flesh—"a Jew"; yet it says that it is of "Israel" that He came, who is "over all, God blessed for ever" (Rom. ix. 4, 5). Devout Anna was a "Jewess" in Jerusalem, yet she was "of the tribe of Aser." But enough on this point. IV. From the time of the return of the first remnant after the Babylonian exile, sacred historians, prophets, apostles, and the Lord Himself, regarded the "Jews," whether in the land or in "Dispersion," asof "all Israel," and the only people in the line of the covenants and the promises which God made with the fathers. At the dedication of the Temple, which was at last finished "on the third day of the month Adar, which was in the sixth year in the reign of Darius the king," they offered "for a sin-offering for all Israel, twelve he-goats according to the number of the tribes of Israel" (Ezra vi. 17). Similarly, on the arrival of Ezra with the new caravan of immigrants, they "offered burnt-offerings unto the God of Israel, twelve bullocks for all Israel, . . . and twelve he-goats for sin-offering" (Ezra viii. 35), showing that the returned exiles regarded themselves as the nucleus and representatives of the whole nation. In the post-Exilic prophets we have no longer two kingdoms, but one people—one in interests and destiny, although they had formerly for a time been divided. To show that the revived nation was made up of members of the Northern as well as the Southern kingdoms, the prophet Zechariah calls them by the comprehensive name of "Judah, Israel, and Jerusalem" (Zech. i. 19); or, "the house of Judah and the house of Joseph" (Zech. x. 6). In the prophecy occasioned by the question addressed by the deputation from Bethel, in reference to the continuation of the observance of the fasts, he says: "And it shall come to pass that as ye were a curse among the nations, O house of Judah and house of Israel, so will I save you, and ye shall be a blessing; fear not, and let your hands be strong" (Zech. viii. 13).Here the formerly two houses are included; together they are for a time among the nations "a curse," and together they shall be saved, and be "a blessing." Malachi, nearly a century later, when the people in the land had become a prosperous nation, and when, in consequence, the majority was rapidly falling into a state of religious formality and godlessness, addresses them as "Israel" or "Jacob," which surely includes all his descendants, in contrast to Esau and his descendants (Mal. i. 1–3). - Thus Strabo (quoted by Josephus in "Ant." xiv. 7, 2) could already say in his day that "these Jews had already gotten into all cities; and it is hard to find a place in the habitable earth that hath not admitted this race and is not mastered by it." - "Everywhere we have distinct notices of these wanderers," says Dr. Edersheim, "and everywhere they appear as in closest connection with the Rabbinical hierarchy of Palestine. Thus the Mishnah, in an extremely curious section, tells how on Sabbaths the Jewesses of Arabia might wear their long veils, and those of India the kerchiefs round their head, customary in those countries, without incurring the guilt of desecrating the holy day by needlessly carrying what, in the eyes of the law, would be a burden; while in a rubric for the Day of Atonement we have it noted that the dress which the High Priest wore 'between the evenings' of the great feast—that is, as afternoon darkened into evening—was of most costly Indian stuff." - Some have supposed that the 14th verse of Zechariah xi.—"And I cut asunder mine other (or 'second') staff, even Bands (or 'Binders'), to destroy the brotherhood between Judah and between Israel"—foreshadowed another division between the Ten Tribes and the Two Tribes subsequent to the partial restoration from Babylon, and after the coalescence of the people before and in the Exile—as a punishment for their rejection of their true Shepherd the Messiah, which is symbolically set forth in that chapter. But this is a mistake. The אַחֲוָה (achavah), "Brotherhood," which was to be destroyed "between Judah and between Israel," is not to be understood in the sense "that the unity of the nation would be broken up again in a manner similar to that in the days of Rehoboam, and that two hostile nations would be formed out of one people," although the disruption of national unity which took place in the days of Jeroboam may be referred to as an illustration of that which would occur again in a more serious form. "The schism of Jeroboam had a weakening and disintegrating effect on the nation of the Twelve Tribes, and the dissolution of the brotherhood here spoken of was to result in still greater evil and ruin; for Israel, deprived of the Good Shepherd, was to fall into the power of the 'foolish,' or 'evil,' shepherd, who is depicted at the close of the prophecy." The preposition בֵּין (bain), which is twice repeated, has the meaning not only of "between," but also of "among," and the formula, House of Judah and House of Israel, or simply, "Judah and Israel," is, as we have had again and again to notice, this prophet's inclusive designation of the whole ideally (and to a large extent already actually) reunited one people. I think, therefore, that we may rightly render the sentence "to destroy the brotherhood among Judah and among Israel"—that is to say, among the entire nation. The consequence of it would be the fulfilment of the threat in the 9th verse: "Let them which are left eat every one the flesh of another"—solemn and awful words, which had their first literal fulfilment in the party feuds and mutualy destructive strife, and in the terrible "dissolution of every bond of brotherhood and of our common nature, which made the siege of Jerusalem by the Romans a proverb for horror, and precipitated its destruction."
<urn:uuid:c2cf1dd5-3030-4e97-b2b6-ff110af9a011>
CC-MAIN-2019-22
https://en.m.wikisource.org/wiki/The_History_of_the_Ten_%22Lost%22_Tribes/Part_2/Chapter_2
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258862.99/warc/CC-MAIN-20190526065059-20190526091059-00422.warc.gz
en
0.979054
2,677
3.15625
3
…And behold, the thorn bush was burning with fire, but the thorn bush was not being consumed.” (Ex. 3:2) Every theologian worth his salt along with many philosophers, from Plato and Aristotle to Descartes and Kant, attempted to prove the existence of God. Tomas Aquinas, for instance, offered not just one but five “proofs”! Others, such as Hume and Nietzsche, tried proving the opposite. Little did they understand that proving the existence (or nonexistence) of God is a fool’s errand. Here are at least ten reasons why God’s existence cannot be proven (or disproven): - The existence of God cannot be proven because… God doesn’t “exist,” not in the ordinary sense of existence anyway. One can say that something exists only so long as it may exist or may not. By stating that something exists, we specify one of these two possibilities. Similarly, a person can be alive or, God forbid, not alive. By stating that a person is alive we specify that he is not dead. Such existence is a contingent existence. In this sense, to say that God exists is meaningless, because God cannot not exist! Nonexistence is not an option. Thus, the Maimonides (Rabbi Moshe ben Maimon, a.k.a. Rambam) writes that God’s existence is “necessary.” Therefore a statement such as “God exists” contains no information, it is a logical tautology. - Furthermore, God is absolute and infinite Bing and nothing can limit Him. His “existence” is also absolute and is not limited by non-existence. Therefore, to speak of God’s existence is just as meaningless as to speak of His non-existence. - God is a self-referential construct. In the words of Maimonides, He knows all by knowing Himself. Self-referential statements cause many problems in logic. Think of the Liar’s Paradox: Epimenides said, “All Cretans are liars and I am a Cretan.” If this statement is true, it is false; and, if it is false, it is true. Or take Bertrand Russell’s paradox: if you consider a set of all sets that do not contain themselves, does this set contain itself? If it does, then it doesn’t; and, if it doesn’t, then it does. Or, simply, consider the statement, “This statement is false.” If it’s true, it is false; and, if it’s false, it is true. It is really impossible to make any logical statement about God, because He is a self-referential construct. - God is also a self-contradictory construct. Infinite God possesses the power of bli gvul (infinitude) and gvul (finitude); hence, the paradox: Can God create a stone that He cannot lift? This inherent contradiction is symbolized by the burning bush: “…and behold, the thorn bush was burning with fire, but the thorn bush was not being consumed.” (Ex. 3:2) - A self-contradictory construct does not lend itself to formalization as an axiomatic theory, because in such a theory for every statement A, one can also prove not A. Therefore, every statement is both true and not true. - As Gödel proved, one cannot prove the consistency of a formal theory by means of this theory. Trying to prove God’s existence in the context of any formal theory would violate Gödel theorem, because there is nothing outside of God—ain od milvado. - Proving the truth of any statement in logic requires precisely defined terms. Furthermore, defining an object entails limiting this object from a larger set of objects. For example, if you want to define “triangle,” you define it to be a subset of two-dimensional geometrical objects that have certain properties—namely, three lines connected to each other. Or if you wanted to define “circle,” you would define it as a subset of points on a plane equidistant from a given point (called the center of the circle). The definition is always a limitation. We cannot limit infinite God (Ein Sof) in any way. Therefore, we cannot define Him. - God is above logic. Logic operates on the level of intellect. In the sephirotic scheme, logic exists on the level of Chochma. However, the sephirah of Chochma is not the first. It is preceded by Keter, which in turn is preceded by Adam Kadmon (“Primordial Man”), not to mention that all of these levels are found in the universe of Tikun, which is preceded by the universe of Tohu all of which are all after the Tzimzum (the primordial contraction). God utterly transcends all these levels and our logic and it is silly to attempt to logically define Him, let alone prove His existence. - We (creations) don’t define God (the Creator); rather, God defines (creates) us. Put another way, transcendent God transcends all definitions. This is why classical theism holds that God cannot be defined. - For a human being to try to define God is a subtle form of idolatry, as the Izhbitzer Rebbe explained in his commentary on the Ten Commandments (see The Theological Uncertainty Principle, and Thou Shall Not Collapse God’s Wavefunction.) In an axiomatic theory, we start with undefined terms and the relationships between them. For instance, in Euclidian geometry, the undefined terms are point, line, and plane. Then, axioms are formulated and theorems are proved with respect to these undefined terms, as well as further terms defined through them. Thus the only hope we have to make any statement about God is to say that God is an undefined term. This is, essentially, what Kabbalists said long ago by describing God as Ein Sof. This is exactly what God tells Moses when Moses asks God His name: And Moses said to God, “Behold I come to the children of Israel, and I say to them, ‘The God of your fathers has sent me to you,’ and they say to me, ‘What is His name?’ what shall I say to them?” (Ex. 3:13) In other words, Moshe is asking God for His name—i.e., for His definition, as it were. God’s answer is truly baffling: I am who I am” (Ex. I3:14) This tautological statement, “I am who I am” (alternatively translated as “I will be what I will be”), contains a powerful message: Don’t try to define Me for I am undefinable, ineffable God. It is as if God was saying, “I am who I am, and it is not for you to know who I am.” …and He said, “So shall you say to the children of Israel, ‘Eh-yeh (I am) has sent me to you.'” (Ex. 3:14) God tells Moses to explain to his Jewish brethren that the only thing they can know about God is that He is, i.e., that his existence is necessary and absolute, as explained by Maimonides. However, the very next verse seems to contradict this, as God introduces Himself by His proper name, Havayah (YHWH): And God said further to Moses, “So shall you say to the children of Israel, ‘Havayah (YHWH), God of your forefathers, the God of Abraham, the God of Isaac, and the God of Jacob, has sent me to you.’ This is My name forever, and this is how I should be mentioned in every generation. (Ex. 3:15) Didn’t God just reveal His proper name as Havayah (YHWH)? However, this is not a contradiction. The Tetragrammaton (YHWH), usually translated as “Lord,” actually means Eternal. Our sages teach that YHWH is an amalgam of hayah (is), hoveh (was) and yihyeh (will be), i.e. the Eternal. This is a variation on the earlier theme, in which God introduces Himself simply as “I am.” Unlike God, who is the creator of time and exists outside of time, we exist in the temporal dimension. To us past, present and future define the flow of time— indeed, our very existence. If for timeless God it is enough to say, “I am,” for us, temporal creatures, this ontological construct has to be unpacked and spelled out as “I was, I am, and I will be.” Therefore, there is no contradiction between the verses. In this verse, God further elaborates for us that His existence is eternal, unlimited in time or by “non-existence”— i.e., His existence is necessary and absolute and therefore, belies any definition. We are epistemologically limited in our ability to know God. That is why God stopped Moses when he came towards the burning bush to “investigate this wondrous phenomenon,” saying: “Do not draw near here.” We are limited in our knowledge of the Creator by what He chooses to reveal to us about Himself, as He did to Moshe from the burning bush. That is why it is equally impossible to logically prove or disprove the existence of God. Belief in God always requires a quantum leap of faith.
<urn:uuid:ebb3d8a0-99b4-45ea-8d7b-7d81c02cbbd7>
CC-MAIN-2019-22
http://www.quantumtorah.com/i-am-who-i-am-3/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00062.warc.gz
en
0.948548
2,114
3.015625
3
What do you do when ideas come so fast they gum up the works, and the engine of your creativity grinds to a halt? Write Your Novel Step By Step – Introduction to Plot Follow this series of story development steps drawn from our StoryWeaver Step By Step writing software to build your novel one dramatic concept at a time. Introduction to Plot In the Plot section of this Inspiration stage we’re going to draw some story threads from your initial concept. To do this, you’ll begin by writing a one-sentence description of what your story is about, called a Log Line. Next, you’ll pull some loose threads from your log line by asking questions about what’s not in it. Then you’ll let your Muse run free and come up with a variety of answers for these questions, each of which will become a new story thread. Whether you already have a lot of concepts or not many (or any) at all, by the end of Plot Inspiration you’ll have developed a detailed one-page synopsis of your story’s plot. A Word About Plot For the purposes of this section, let’s define plot as a description of all the events that happen in your story and the order in which they occur. This isn’t necessarily the order in which you reveal the events to your readers or audience, however. For example, you might start your story with a teaser in which some major event occurs. Then, you jump back to how it all started with a heading such as, “Three years earlier…” In this example, the plot order is quite different from the storytelling order. For the steps in this section, develop your story’s plot as your characters experience it, not in the order you will relate it. That will come later in the Storytelling Stage. Reminders: Use the Notes button on any card to jot down new ideas. Use the Story button to add to or revise a draft of your story. And don’t forget to click the Save button before leaving a story card or closing a window where you entered text. Next step: What’s the Big Idea? Follow along to write your novel step by step or work at your own pace with our StoryWeaver software. It’s just $29.95 but followers of Creative Writing Tips get 25% off with coupon code CWT at Storymind.com Maybe the problem isn’t where you are writing, but when… Here are some ideas to help you get the ideas flowing… Inspiration can be hard to find. Here are a couple of tips for freeing up frozen creative gears and busting mental log jams. Here’s a technique for making your Muse think that being productive is her idea… Every story has a personality that is greater than the sum of its parts. Learn how to ensure all its facets are working together. Here’s one way to sneak around writer’s block when it isn’t looking… How to supercharge the power of your storytelling by tapping into the seething cauldron of creativity just below the surface of your civilized veneer. Here are four tips to help you develop your novel and improve the power of your storytelling. Genre isn’t a list of requirements nor a box that limits your creative options. Find out how to create a story that honors your genre yet is uniquely its own style. Just starting out? This list of practical tips will help you get your novel written. No one reads a book because it has a great structure. So how do you find the right balance between structure and passion? This article will show you the way… Remember blowing bubbles with that solution in the little bottles and the plastic wand? The craft of writing is a bit like blowing bubbles, and this article will show you how to apply that perspective to help create the moments that comprise your story. This article will show you how to make your story more personal by putting your readers into your characters’ shoes.’ Before you write your first chapter, ponder your opening sentence, or jot down a single word, there’s one step you should always do first, no matter your genre or style. It is the Eternal Struggle for writers: how to freely express one’s passions within the constraints of story structure. Here are a few tips for gaining the upper hand… Genre isn’t a box you write in nor a list of stylistic requirements for your story. It is the personality of your story, and in this article you’ll learn how to grow your genre act by act. Character have two jobs: First, they should fulfill a dramatic function in your story. Second, they need to have real personalities so your readers or audience can connect to them at a passionate level. So how can you create such creatures? Here’s one way… Whether your characters change through a leap of faith or overcome all pressures to hold onto their beliefs, their path to that moment of choice isn’t a straight one… Building characters that are intriguing, unusual, and memorable is a difficult task. Here are a few of my best tricks for creating characters from scratch and for developing characters you’ve already created. If you are a plot-oriented writer, here is a nifty technique from shaking a whole cast of characters out of the events that drive your story. Perhaps your hero isn’t the right guy for the job. Find out how to hold job interviews with your other characters to see if they should take over the position. Even when a story has memorable characters, a riveting plot and a fully developed genre, it may still be coming apart at the themes. In this article, we’ll find out how to recognize this problem, and what to do about it. Eisenhower said, “Planning is vital; plans are useless.” Seeing the structure of your story as a military campaign can help you ensure that all the moving parts work together toward a common goal. Writers tend to create characters the same age as themselves and also have characters of other ages behave as if they were that same age. Here’s how to write characters who truly act their age… Why do characters make excuses, and how can you write them so they come off as real people when they do? Rather than looking at what your story needs, turn it around to discover what you need to write that story. When you do, all manner of barriers to your creativity are removed. Read the article for complete details of this technique. Creating a log line centers your story, provides it with an identity, and ensures that all your story development work will be guided by this beacon so your story becomes sharply focused and every element is clearly connected to the hub. In this article you’ll discover a technique for drawing characters out of a one-sentence description of your story called a log line. As your story draws to a conclusion, your reader have become heavily invested in your characters. So you’ll need to help them disentangle from those relationships before your story ends. One of the most powerful opportunities of the novel format is the ability to describe what a character is thinking. Learn how to transport your readers inside a character’s mind. A story must conform to the conventions of story structure, but a novel does not need to be so rigid… This technique will help you stand in your characters’ shoes and see the world through their eyes. Stories can be written about characters who change or about characters who don’t. That’s the first part of your message. The second part is what happens to the character in the end as a result of their choice to change or not. It is often assumed that a protagonist is the hero of a story. Nothing could be further from the truth. Are characters people or pawns? They are both, in fact, and your job as an author is to ensure your characters fulfill each of their roles. Your antagonist opposes the goals of your protagonist. But who opposes the beliefs of your main character? It is an easy trap to create tired character types that follow societal expectations. How can you break out of that mold? Here’s a sure-fire technique for busting up stereotypes to create truly fresh and fascinating characters. Choosing names for your characters can be perfunctory or can provide your readers or audience with insight into your characters’ natures, add humor or surprise, or even at the very least break out of ordinary monikers into the realm of the unusual. Apply this technique and you will expand your story quickly and easily into some fascinating new material. There are four throughlines that must be explored in every story for it to feel to readers or audience that the underlying issues have been fully examined and the message completely supported. Archetypes represent human qualities we all share, such as Reason, Emotion, Faith, Skepticism, Conscience, and Temptation. Stereotypes represent the different kinds of personalities we encounter in life. Plot isn’t the order in which events are presented in a story, but the order in which they happened to the characters. How do you keep both in sync? How many times have you thought of a story, “Nobody would do that!” or “C’mon, that doesn’t even make sense.” What engenders those comments is our innate sense of story structure. But what is it? As writers, we all know that characters need drive or their actions will come across as unmotivated. But what is drive, and where does it come from? Archetypal characters have a bad name. Many writers think such characters are two-dimensional stick figures that come off more like plot robots than real people. But the truth is that archetypes represent essential human qualities that need to be explored in every story. Many writers focus on a Hero and a Villain as the primary characters in any story. And there’s nothing wrong with that. But as we are about to discover, there are so many other options for creative character construction. What a character likes and dislikes takes the curse of its larger than life stature. To humanize your characters and bring them down to size, give them preferences rather than just points of view. For characters to be both compelling and functional each must do two completely different jobs. In this article, you’ll help your characters learn the ropes. Every writer knows a story needs a protagonist and an antagonist who battle over the goal, but equally important are the main and influence characters who battle over the message. Your thematic argument is an emotional one, not one of reason. You need to sway your reader/audience to adopt your moral view as an author rather than telling them to adopt it. To come off as real people, Characters must share the same conundrums we all do. And chief among these is determining what’s really going on so that we are able to make sound decisions. Success and Failure don’t have to be binary choices; they can be matters of degree. But a story without a clear indication of success or failure is a failure with your readers or audience. Writer-Actors prefer to stand in the shoes of their characters and play the roles as they write. Writer-Directors stand outside the story and manipulate their characters to the best effect. In this article you’ll learn how to use each approach to the best advantage. Do stories have a structure? And even if they do, is there really any way to figure out what it is? Based solely on the number of competing theories, one might suspect that either stories don’t have structures or that even those who spend their entire lives trying to figure it out, can’t! Drudge people. You see them every day. On the news. In your town. Outside your window. Perhaps, even in your own home… Many writers are held back because they feel constrained by perceived limitations as to how they can express their story. In this article, you’ll learn how to break those bonds and unshackle your Muse! In storytelling, we can add surprise to a story by leading the reader or audience to perceive something one way, than shift the context to show that it is really quite different. Most arguments are not caused by conflicting points of view but by misinterpretation of the other person’s point of view. When creating your Protagonist, don’t let him or her get bogged down with all kinds of additional dramatic jobs that may not be necessary for your particular story. The Antagonist and the Influence Character do two different essential things, but both of those jobs can be given to the same person in your story if you play it right. There may be a place waiting for the story you have to tell. Perhaps the most fundamental error made by authors, whether novice or experienced, is that their characters, both male and female, tend to reflect the gender of the author. First impressions have a tremendous impact that you can use either to establish or mislead your reader/audience as to the true nature of each character. Your characters aren’t going to be thinking about the plot the way you do. They can’t even see that there is a plot. Rather, they see their situation and have attitudes and feelings about it – some modest and some passionate. How can you go about making your thematic point to your readers or audience without moralizing? You’re only as good as your own talent. Get over it! A tale is a statement; a story is an argument. Learn how to make the best case for your story’s message without missing any beats. Interesting notions and moments happen every day, but are easily forgotten. By keeping a log of these as they happen, you can pepper them into your story to amp up its energy. Apply this technique and you will expand that area of your story quickly and easily into some fascinating new material. This technique will help you stand in your characters’ shoes and see the world through their eyes. If you know how to tap into it, your subconscious mind can infuse your story with more depth and meaning than you are consciously aware. An overview of the technique I personally use to put my head in a good place as I develop my own stories. Yes, writing is work. Although sometimes in the thrill of inspiration the process can be an amusement park of experiences, more often it is frustration, drudgery and stress. But what to do…. Why psychotherapy takes twenty years for us to arrive at the point a Main Character can reach in a two-hour movie or a two hundred-page book. Sometimes the characters in your story are not after the same goal, but the same kind of goal. From each piece, your story’s world can grow. Use this technique to add breadth, depth, and richness to your story. How to pull individual dramatic threads into the tapestry of your story. We’ve all heard of the hero’s journey that focuses on what stories need to be complete. But consider that it is equally important to explore what authors need to complete stories. While a protagonist is essential as the driver of the quest for your goal, the passion and message of your story revolves around your main character. In the real world of story development, perfect structure is a myth. Trying to make a story structure perfect will drain the life out of it. It starts with a single compromise to oneself – doing a job you hate in order to achieve something you want or putting your own art on hold to pay the bills. Find out how to rediscover your creative self. There are four fundamental kinds of story cores, though each has endless variations.
<urn:uuid:5a0088ad-c570-4d20-b12e-03172aa2e060>
CC-MAIN-2022-33
https://storymind.com/blog/memes-about-writing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00005.warc.gz
en
0.948129
3,329
2.953125
3
Anxiety is becoming more common. This is happening because our world is constantly evolving and life becomes harder and harder. Anxiety may seem like just another burden you have to bear, but it does not need to be that way. Read on to learn how to bring those anxious feelings under control. One way to deal with anxiety is with music. When you start to feel anxious, play your favorite song. Try to pay attention to each note. Quite soon, your anxiety will be long forgotten. Having something to keep your mind occupied can really alleviate the anxiety you are feeling. When people are anxious, they often crave salt. This is your body’s way of informing you that it requires more sodium. You should use unprocessed raw salt; this is the best kind to use and helps your body get what it needs. Exercise is a great way to calm your anxious feelings. Endorphins, which are produced from physical activity, will keep your mind off of your stress and relax you. Additionally, the physical activity is good for your overall health. Stay busy; stay active. These are keys to success with anxiety. If you sit around all day, not doing anything, your mind usually wanders and it might being focussing on your anxiety. Simple things, like washing your car or cleaning up around the house, can be of great help. Begin your day with a healthy dose of positive affirmation, said aloud in the mirror. Tell yourself you’re going to have a good day and remind yourself that everything is going to be alright. Then your goal for the day is to stick to that plan. Focus on the positive emotions that build from success. Learn to embrace the uncertain. Worrying about the things that could go wrong won’t make your life better or more predictable. In fact, it will just keep you from enjoying all of the good things that are happening now. Accept uncertainty and become patient with your problems in life. Create daily goals for yourself. By having a goal toward which you strive every day, it is easier to keep yourself focused. This will keep your mind occupied and prevent you from thinking negatively and causing anxiety. Have someone you can rely on to talk about your problems. A support system could be vital to people who are suffering from anxiety. When you talk about yourself you to others that are there for you you feel more at ease and can get on with your daily activities. Keep a diary. There are people who have pent up stress in their minds and cannot release it. When everything can be “unloaded” into something like a journal or diary, your brain can start thinking about the present instead of dwelling on past or future things. Find someone that you can talk to about your anxieties. Talking about negative thought you may have, will help to lessen them, just as long as your mind is clear and you are seeking ways to get rid of your anxiety. What is even better is if you can find someone trustworthy who has also been through what you are going through because he or she can give you advice on how to deal with anxiety. Do not spend an excessive amount of time sitting down. If you sit at a desk all day, take a walk when you have your break, and even do a little exercise. Try to stand up every so often. When you are home, take a walk, and reduce the time you are watching TV or sitting around. It is good to rest, but a large quantity of it can make you feel more anxious. Don’t spend time around folks that stress you out. An example of this would be if you have someone you hang out with who is negative. Try to avoid that person as much as you can. People like this will build your stress, and create a more anxious feeling. There are some hot and cold beverages that can help quiet anxiety. Chamomile tea is an excellent stress reducer, and may help with anxiety issues. Try boiling a pot and see if helps to calm your nervous symptoms. Watch a favorite comedy or read an amusing book if you feel stress coming on. By watching one of your favorite comedy movies, you’ll have the chance to laugh and have a more positive outlook toward things. You’ll be less apt to worry or be anxious about something that was bothering you earlier. Give yourself some downtime when you are feeling stressed and anxious. Overworking is a main cause of anxiety and stress in general. All you need is one hour a day to read a book, watch tv or even take a nap. Cut down on how much nicotine and alcohol you take in. Despite the fact that many believe that these substances can relax you, they will not. In truth, they can worsen anxiety to levels higher than before their use. Try things that are better for you like eating right, effective relaxation methods and enjoyable social interaction. Put a name to each anxiety trigger. This will help you better understand the triggers, so you can make a plan about dealing with them before they happen. The most effective method of controlling anxiety is to determine what has caused it. Where and when do you most often experience anxiety? If so, maybe there are steps you can take to lower your stress level, such as asking your supervisor if there is an opportunity for you to change to a different team or project. After determining what causes you to experience anxiety, you can take steps to reduce or eliminate it from your life. While a lot of people are anxious due to external factors, a lot of people have a genetic disposition to it. If you feel that this is a possibility in your situation, then you may want to talk to a professional to see if there is any medication that can help with your situation. Try learning about different beverages that may help in offsetting your anxiety. Chamomile tea is an excellent stress reducer, and may help with anxiety issues. Try chamomile yourself in a soft and stress-free environment to help lower your level of stress. Stay away from those who might make you nervous, if anxiety is an issue for you. Although this could be obvious, many people still associate with those who cause stress, not wanting to hurt someone’s feelings. Associating with these people will cause you stress and anxiety. Take some time for yourself if you suffer from anxiety. One main cause of anxiety and stress is when you work too hard and don’t get enough time to relax. Just spend at least an hour every day doing nothing but relaxing. You could try reading or watching TV, for example. People that are introverts tend to battle social anxiety. Make efforts to find common-ground activities with friends or family. Playing games or physical activities are great options for making this time enjoyable. When you need company, you will have an activity that is both fulfilling and socially bonding. Take the time to learn what triggers your anxiety, and give it a name. This will help you better understand the triggers, so you can make a plan about dealing with them before they happen. Do not watch television news. If you feel anxious as a result of hearing about robberies, car wrecks, murders and shootings, avoid exposing yourself to the news. News reporters love to focus on fear-based or negative stories, because they grab a lot of attention. Rarely does a news report focus on positive events that occur each day. Make it a point to smile and laugh. Frequent laughing can induce feelings of happiness which, in turn, can help ease or ward off anxiety. Watch TV comedies, or hang around funny friends. You will have less anxiety if you find reasons to laugh all the time. Try spending half a minute rubbing your hands against each other, then put them over your eyelids and relax. Many people use these techniques every day to calm themselves. Give it a try the next time you start to feel anxious. If you are an anxiety sufferer, avoid being around those who bring stress into your life. It may seem obvious, but a lot of people that have anxiety don’t want to make people angry so they keep them around. People can be a source of anxiety too, so choose your company carefully. Take the time to deal with the things that are stressing you and learn to release the things that you can’t do anything about. By just focusing on them on a particular time each day, you will not get as stressed when you are thinking of them. Anxiety is a part of life. However, it becomes a problem when it takes over your life. It is important to learn how to differentiate between motivating anxiety and harmful anxiety so that you know when to harness the power of the emotion or when to cut it out of your life. Try small amounts of snacks that have high carbohydrate levels; carbs contain high levels of serotonin and might make you feel less anxious. Do not eat them too often, just when you need to get control of anxiety. It works for some. Find methods you can use to distract yourself away from your anxious feelings. Mental exercise, such as doing a crossword puzzle or looking at a book, can do a lot to reduce your anxiety. The best techniques for overcoming anxiety involve occupying your mind with other activities so you are not dwelling too long on the problems at hand. Sometimes anxiety attacks and heart attacks feel similar. The main distinction is the fact that anxiety attacks are fleeting, while heart attacks are not. You should not, however, attempt to diagnose yourself, because the consequences of an incorrect diagnosis could be fatal. Call for medical help right away if you feel that you are actually experiencing a heart attack. Try to rub your hands for about 20 seconds and then placing them on your eyes to help you relax. This serves as a fast, easy way to regain a sense of calm when anxiety rears its head. Give it a try the next time you start to feel anxious. Let yourself get distracted at appropriate times to reduce anxiety. Avoid self-help books in favor of a movie or a crossword puzzle. Keep people around you as often as possible. Distraction is an effective method for dealing with the worst of anxiety. Try some high carbohydrate snacks. Carbohydrates contain a large amount of seratonin and will make you feel better when you eat them. It is best to talk to your doctor before making these supplements a necessary part of your life. It really does work for a few people. Ensure you are drinking enough water to keep yourself hydrated daily. You also want your body to have the proper nutrients. If you do not meet your body’s nutritional needs in this way, you will be prone to anxiety attacks. Eat full meals and drink a lot of water. Having a good exercise routine will greatly help in lowering your anxiety. Yet, some people are not sure what kinds of exercise to utilize to help. If you’re not sure where to begin, the easiest ways to start exercising are with a simple walk or jog since they do not require any equipment. Positive thinking can make a real difference when you’re dealing with anxiety. This means that when you begin having negative feelings, your aim is to concentrate on good things. The simple act of smiling can help to boost moods very quickly. Work on thinking about happy things in order to distract yourself from the stress that surrounds you. All that you have learned today should hopefully set you on the right track towards living anxiety free. Make sure that you apply the knowledge you have gained and consider sharing your new knowledge with a friend who is suffering from anxiety. The information here can help many people. If you are someone who suffers from chronic anxiety like millions of other people, you may find a talk with friends and family to be helpful. You can get attention, which is a basic human need, and expel negative energy through self-expression.
<urn:uuid:1f267bf2-a6d3-4256-be29-d240819986ff>
CC-MAIN-2019-22
https://www.samtaleterapeut.net/the-best-ways-to-deal-with-anxiety-5
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256887.36/warc/CC-MAIN-20190522163302-20190522185302-00502.warc.gz
en
0.966075
2,434
2.625
3
School of Dental Medicine, Departments of Respiratory Therapy, Occupational Therapy, College of Nursing, Georgia Regents University, Georgia, USA Received date: 17/08/2015 Accepted date: 03/11/2015 Published date: 10/11/2015 Visit for more related articles at Research & Reviews: Journal of Nursing and Health Sciences Background: The goal of Georgia Regents University’s Annual Costa Layman Health Fair is to provide meaningful supervised community outreach training opportunities for student nurses, allied health and dental students to engage a workforce of predominantly Hispanic farmworkers in health care awareness, and health promotion/disease prevention. Aim: This study sought to identify the health screening results and Obstructive Sleep Apnea (OSA) prevalence among approximately 400 farmworkers found during health screenings at a large commercial horticultural farm in the southeastern USA. Method: This is a five year retrospective analysis of the annual student nurse’s recordings/power point presentations of screening results at worksite health fairs in which a customized health screening tool, the Stop-Bang Questionnaire, and the standard pulmonary function test graphics were utilized to identify the health issues and referral rates of farm-workers. Using standard methods based on binomial distributions, true referral rates were constructed at the 95% confidence intervals. Findings: An aggregate of approximately 1200 total health screenings were performed. The percentage of employees recommended for referral care was highest for hypertension, elevated glucose, elevated lipids, and dental care. Sleep apnea rates were surprisingly low. Conclusion: Valuable information and a better appreciation for the farmworker’s health were gained by students. Increased awareness of health risks, improved ability to navigate the USA healthcare delivery system, and exposure to concepts of health promotion/prevention among the farmworkers was realized. Multi-professional disciplines, Nursing student health fair, Hispanic farmworkers health issues, Sleep apnea, Referral rates. With current estimates of 50 million Hispanics and a projected rising population explosion to 119 million by 2060 – the Hispanic population will be the third fastest growing population in the USA As such, the burden and cost of untreated chronic illnesses requiring publically funded health services is certain to increase expenditures for federal and state healthcare budgets [1,2]. Strategically planned Community Outreach Programs that focus on prevention, regular monitoring, and educational initiatives are key in promotion of improved core quality of living healthcare measures outlined in the 2012 National Health Disparities Report of 2013 . According to the United States Office of Planning Research and Evaluation’s National Agriculture Workers Survey, (OPRE # 2012-13), Hispanic farm-workers are often unfamiliar with their healthcare needs and options . Influencing factors include not being born in the USA, having multiple jobs (which limits the potential for employee paid health insurance), language differences and a lack of formal education. The majority of Hispanic farm-workers were born outside the USA and Puerto Rico. Many, (97.81%), were born in Mexico, while 2% were natives of Central America; 0.1% from South America; and 0.09% from the Caribbean. The average foreign-born Hispanic has been in the USA about twelve years and those earning the highest incomes have been in the USA for an average of 15 years. Hispanic farm workers report at least one job while 33% report multiple employers – many of which have no health care benefits. Additionally, the majorities do not speak (48%) or read (60%) English. Spanish is their preferred form of communication. Most Hispanic workers have six years or less of education and only 9% have completed high school. The NAWS (2012) reported barriers to health care that include prohibitive costs, and a lack of awareness of benefits and services . Fifty percent of adult farm-workers are covered by Medicaid, while 94% of their children’s health care is government funded. Of those with insurance, about 50% are provided through their employer. Workers compensation insurance or employer paid health care for job related injuries or sickness is commonly provided by employers, but 25-30% of the workers were not aware of this benefit, and may not be aware of locations to receive health services (4%). The most frequent reported health problems are hypertension (6%), and asthma (4%). Very little is known regarding sleep apnea in the Hispanic population. According to the Wisconsin Sleep Cohort Study, 17% of the general population, (24% of men and 9% of women) experience sleep apnea [5,6]. Latest research reports that Hispanics receive lower quality care, worse outcomes and higher chronic illness rates, which are attributed to a lack of health insurance coverage/access, differences in insurance coverage among Latina subgroups, and varied experiences in accessing preventive health services Of note, childhood obesity rates among Latinas are the highest in the country (39%) and the incidence of type 2 diabetes among obese Hispanic children is 50% [7-9]. The risk of pregnancy associated complications/death is twice the rate of Caucasians rates for HIV/AIDS are three times higher than Caucasians breast cancer is the leading cause of cancer deaths among Hispanic women a 20% higher incidence than among Caucasians and tuberculosis reported cases (29%) exceeds all racial/ethnic groups With improvements in USA healthcare disparities since passage of the 2010 Accountable Care Act, it is the Hispanics that have the least gains of all ethnic groups and continue to face high unemployment rates, least levels of education attainment, and lowest college completion rates [7,10-14]. Going forward, it is important to remember that health care is now more than ever available for Hispanics through Medicaid, the Children’s Health Insurance Program (CHIP), or low-cost state and federal market place premiums, with millions taking advantage of this opportunity. Those with private insurance are eligible for no-cost preventive care services (no deductible, co-pay, or co-insurance requirements) to include blood pressure, cholesterol, colorectal, Type 2 DM tests, nutrition counseling, immunization vaccines, and obesity screenings. Additionally, improved health care quality and treatment of chronic illnesses common in the Hispanic community, is mandated with no annual or lifetime limits, eliminating fears of insurance companies stopping coverage for medical expenses. Even so, estimates indicate that one in four (25%) of all Hispanics remain uninsured . Within this context, health issues and barriers negatively impacting Hispanic farm-workers are important to identify, ameliorate and understand. Purpose : The purpose of the Annual Costa Layman Health Fair is to provide meaningful supervised community outreach training opportunities for inter-professional student groups, and to engage Hispanic farm-workers in health care self-awareness and health promotion/disease prevention services. Aim : This study sought to identify the health screening results and Obstructive Sleep Apnea (OSA) prevalence (from 2010- 2012) among approximately 400 predominantly Hispanic farm-workers at annual inter-professional health fairs conducted for a large commercial horticultural farm in southeastern USA. Annual free health screenings at a one day work site health fair were available to all workers, which included a large sub-set of Hispanic farm-workers. Multidisciplinary screening booths included the following: BP, Visual Acuity, Dermatology, Dental, Respiratory Therapy (for Pulmonary Function Testing (PFT) and Sleep Apnea), as well as Laboratory testing (Lipids, Glucose, and HIV). A five year series of multi-professional faculty-directed worksite health fairs led and coordinated by graduate nursing students as an annual outreach program were offered to farm workers, allowing workers convenient access to a variety of health screening booths. Basic health screenings were performed and individuals with abnormal results were referred to a physician. With each successive year, additional volunteer screenings services were added. Assigned faculty and students at each screening booth were required to perform screening services, record results as normal or abnormal, note yes or no if a follow-up referral was made, collect and document aggregate tally results from each screening booth, and present the overall findings to their classmates as a community project report. Descriptive analyses of aggregate data from the dichotomous health screening tool and the as described in the nursing students' “Executive Reports” and “Project PowerPoint Presentations” of farm-workers employed during 2008- 2012 were used to determine the health issues and sleep apnea prevalence of these farm-workers. Instrument #1: “Health Fair Screening Form”. Developed by students, this form consisted of four columns. Column 1=Categories of health screening indicators (blood pressure, visual acuity, lipids, glucose, HIV, dermatology, dental, respiratory). Column 2=Expected Normal Ranges for Screenings. Column 3=Personal Results. Column 4=Follow up Referral Recommended Check Box (yes/no). Instrument #2: Standard PFT Graphic Recordings Instrument #3: The STOP- BANG Questionnaire was used for scoring risk of Obstructive Sleep Apnea (OSA). The acronym describes the assessment of Snoring, Tiredness, Observed apnea, blood Pressure, Body mass index>35 kg/m2, Age ≥ 50, Neck circumference greater than 40, and Gender. Up to one point may be scored in each category with a total score of ≤ 2 being no risk, ≥ 3 at risk, and ≥ 7 at risk for severe OSA. Standard methods based on the binomial distribution were used to construct 95% confidence intervals for the true referral rate for each year for which referral data were available for the following: blood pressure, vision, lipids, dental, and respiratory. Because of the limited nature of the data, no formal statistical comparisons could be made of the referral rates from one year to the next. However, an informal method, the method of non-overlapping confidence intervals was applied as follows: if the 95% confidence intervals for the true referral rate for the two years being compared did not overlap, then the referral rates for the two years were declared to be significantly different at the 0.05 level of significance. If the 95% confidence intervals did overlap, then the comparison of the two years was declared to be inconclusive. Year One: 210 farm workers were screened (82.4% of the total workforce of the horticulture farm). Blood pressure, visual acuity, fasting lipids and blood glucose screenings, as well as PFT's, screenings were performed. Sixty-five referrals (30%) were made for further evaluation and treatment of abnormal blood pressure findings (>140/90). Also, 55 out of 197 (28%) of the workers were referred to ophthalmology for visual acuity deficits (>20/40). Data for PFT referrals were not available. Year Two: In addition to the basic health screenings, dermatology and HIV screenings were added options for workers. Daily sun exposure of farmworkers and the increased risk for skin cancer and was an identified screening need for this population. In addition, by 2010, a growing concern of HIV as the sixth leading cause of death among Hispanics (age 25-34) in the USA prompted the addition of oral swab HIV screenings (CDC, November 2013). Of 226 employees who participated in this health fair, 257 had serum laboratory screening reports (fasting lipid and blood glucose levels - drawn one week prior at the local hospital), and lab report discussions the day of the health fair. Screenings detected a significant number (45 out of 210, or 21%) of workers with blood pressure readings greater than 140/90. In addition, fasting serum glucose, as well as lipid panels, outside the normal ranges (Blood glucose>110 fasting or >150 non-fasting) and Total Cholesterol>200, Triglycerides>150, HDL<40 (men) or <50 (female), and LDL>100), were identified and appropriate primary care referrals were made. Of 257 participants, 105 (41%) were referred for abnormal laboratory screening results. Year Three: Along with the basic health screenings, oral examinations were added in response to the perceived need and employees’ lack of access to dental services. Total farmworker attendance was 229. Dental screenings (136 out of 201 participants, (68%), and lipid screenings (56 out of 140 participants, (40%) required the greatest number of referrals for care. Visible caries, severe gum disease, abscesses, broken teeth, and/or dental pain were issues identified during oral examinations. Brief explanations, as well as toothbrushes, toothpaste, dental floss, and bilingual education materials, were provided. Year Four: A total of 264 employees, an increase of 15.3% over the previous year, attended the health fair. This increase reflects a large growth in business operations and the addition of a third farm. Screenings for sleep apnea was added, and revealed the need for referral of only 2% of the population – all of which were women. However, as in the previous year, routine dental screenings yielded a remarkable number of abnormalities in which dental referrals were recommended (182 of 209 participants, (87%). In addition, a striking number of participants, (115 out of 243, (47%) had elevated blood glucose levels (>100 fasting or >150 non-fasting), for which a referral to a primary care provider was made. These alarming results were not seen in previous years and were worrisome as a potential signal of decline in the health status of the farm-workers in general Year Five: Another increase in total participation occurred, with a total of 279 employees attending the health fair. Again, dental screenings resulted in a high referral rate (199 out of 221 participants, (90%). In addition, 94 out of 241 participants (39%) were referred for abnormal visual acuity (>20/40). Figures 1-5 contains plots of the estimated referral rate and corresponding 95% confidence intervals for the true referral rate for each year from 2008 to 2012 (for which referral data were available for blood pressure, vision, lipids, dental and respiratory, respectively). For blood pressure (Figure 1), the method of non-overlapping confidence intervals indicated that the referral rate for 2011 (14%) and for 2012 (16%) differed significantly from the rate for 2008 (31%). No other significant differences were found for blood pressure. For vision (Figure 2), the confidence intervals indicated that the referral rate for 2008 (28%) and for 2012 (39%) differed significantly from the rates for 2009 (11%), 2010 (8%), and 2011 (13%). No other significant differences were found for vision using the non-overlapping confidence interval method. For lipids (Figure 3), the confidence intervals indicated that the referral rate for 2012 (26%) differed significantly from the rates for 2009 (41%) and 2010 (40%). No other significant differences were found for lipids. For dental (Figure 4), the confidence intervals indicated that the referral rate for 2011 (87%) and 2012 (90%) differed significantly from the rate for 2010 (68%). No other significant differences were found for dental. For respiratory (Figure 5), the referral rates were very low for each year, ranging from a low of 2% in 2008 to a high of only 6% in 2012. The method of non-overlapping confidence intervals indicated that none of the years differed significantly in terms of respiratory referral rate. Approximately 1200 total health screenings for these Hispanic farm-workers were performed between 2008 and 2012. Overall, the percentage of employees recommended for referral care was highest for dental care, hypertension, elevated glucose, and elevated lipids. The least number of referrals were made for abnormal visual acuity. While these referral rates provide an indication of this farm-worker’s health status, there are variations in the percentage of referrals among the years which cannot be explained without additional information about other factors associated with the workers, their work environment, the level of nursing student training, etc. Aggregated data was collected from a five year period of health fairs with no identifiers. Additionally, there is no way to know if the same workers were screened year after year, or if the workers were new employees and screened for the first time; nor if improved or worsened screenings results were associated with referrals or any other interventions. The dental screenings among this population appear to be a major health issue with a referral rate of 68% in 2010, climbing to 98% in 2012. Again, it is not known if student assessment skills were stronger in 2012, or if there was an increase in the prevalence of dental disease among this population. Sleep Apnea referral rates (2%) were very low for the screenings performed during 2011 and 2012. Interestingly, the workers referred were all women (n=5). Consistent with the NAWS (2012) report, hypertension appeared to be common among the Hispanic agricultural workers included in this study . Institutional Review Board approval was obtained. There were no identified conflicts of interest with this study. Work-site health fairs can be an effective and beneficial tool for addressing the learning needs of nursing students and the health needs of Hispanic farm-workers. Much health information was gained in working directly with the farm-workers to better appreciate their plight, increase their personal awareness of health issues, improve their ability to navigate the USA healthcare delivery system, and support the concepts of health promotion and prevention among this underserved population. Future work is needed to standardize and validate the “Health Fair Screening Form” tool and offer consistent screenings yearly, thereby validating the assessment of health issues among farm-workers in southeastern Georgia. Additional demographic, environmental and student training factors would add greater dimension to the study of this population.
<urn:uuid:5ea71328-3caa-4fda-9948-49721b8d933e>
CC-MAIN-2019-22
http://www.rroij.com/open-access/usa-multiprofessional-student-led-community-health-fairs-a-surveyof-hispanic-farmworkers-health-issues-in-the-usa-.php?aid=67113
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258451.88/warc/CC-MAIN-20190525204936-20190525230936-00222.warc.gz
en
0.960093
3,613
2.578125
3
3 edition of Four old Greeks found in the catalog. Four old Greeks |Statement||by Jennie Hall ... with drawings from Greek sources, by Raymond Perry.| |LC Classifications||PZ8.1.H143 F| |The Physical Object| |Number of Pages||224| |LC Control Number||03017527| The ancient Greeks honored a wide variety of gods, and many are still worshiped today by Hellenic Pagans. For the Greeks, much like many other ancient cultures, the deities were a part of daily life, not merely something to be chatted with in times of need. Here are some of the best-known gods and goddesses of the Greek pantheon. In January, he fled Syria with his wife and four children. He left his wife behind near the Turkish-Syrian border and crossed into Greece with his eldest daughter, 21, and her 2-year-old son. They Author: Katerina Voutsina. Chariot racing, in the ancient world, a popular form of contest between small, two-wheeled vehicles drawn by two-, four-, or six-horse teams. They were the main events of the Roman public games that took place at the Circus Maximus. Learn more about chariot racing in this article. the years between the old and new testaments by Ray C. Stedman At the close of the book of Malachi in the Old Testament, the nation of Israel is back again in the land of Palestine after the Babylonian captivity, but they are under the domination of the great world power of that day, Persia and the Medio-Persian empire. Modern psychology is not much kinder to the four temperaments concept and, in general, dismisses most personality theories altogether. Despite that, usage of its terms — sanguine, phlegmatic, choleric, and melancholic — persists in both scientific and everyday language. The first year is The Greeks. Old Western Culture: The Greeks is divided into four units: The Epics, Drama and Lyrics, The Histories, and The Philosophers. Each unit can stand alone. I do highly recommend watching Lesson 1: Introduction to Old Western Culture: The Greeks from The Epics unit before starting any of the parts. When the victim is a child Books of Adam Creative dance/movement activities appropriate for integration with existing subject areas in British Columbia schools Religious liberty in Eastern Europe Protecting Property Rights After Kelo Tuarascáil don Aire Oideachais ar atheagrú na nollscoileanna ... = On the art of writing The book of stones Applied economics; introductory principles applied to everyday problems Civil history of the government of the Confederate States, with some personal reminiscences man of yesterday Nineteenth century ornamented typefaces The autopsy as an outcome and performance measure Four Old Greeks: Achilles, Herakles, Dionysos, Alkestis (Classic Reprint) [Jennie Hall] on *FREE* shipping on qualifying offers. Excerpt from Four Old Greeks: Achilles, Herakles, Dionysos, Alkestis The Greeks liked to walk among their mountains and they liked to sail on their sea. The climate was warm and sunny. Rashi's interpretation. Rashi, a medieval rabbi, interpreted the four kingdoms as Nebuchadnezzar ("you are the head of gold"), Belshazzar ("another kingdom lower than you"), Alexander of Macedon ("a third kingdom of copper"), and the Roman Empire ("and in the days of these kings"). Rashi explains that the fifth kingdom that God will establish is the kingdom of the messiah. Genre/Form: Four old Greeks book works Juvenile literature: Additional Physical Format: Online version: Hall, Jennie, Four old Greeks. Chicago, New York, Rand, McNally. Four old Greeks; Achilles, Herakles, Dionysos, Alkestis Item Preview remove-circle Book digitized by Google from the library of the University of California and uploaded to the Internet Archive by user tpb. Title within ornamental border "A Pages: Get this from a library. Four old Greeks Achilles, Herakles, Dionysos, Alkestis. [Jennie Hall] -- Enjoy this overview of the lives of four important Greeks:. In The Blood Of The Greeks (Intertwined Souls Series: Eva and Zoe Book 1) - Kindle edition by Brooks, Mary D. Download it once and read it on your Kindle device, PC, phones or tablets. Use features like bookmarks, note taking and highlighting while reading In The Blood Of The Greeks (Intertwined Souls Series: Eva and Zoe Book 1)/5(). Ancient Greek was a pluricentric language, divided into many main dialect groups are Attic and Ionic, Aeolic, Arcadocypriot, and Doric, many of them with several dialects are found in standardized literary forms used in literature, while others are attested only in inscriptions. There are also several historical grc (includes all pre-modern stages). Start studying Book of the Ancient Greeks - Test Four (Lessons ). Learn vocabulary, terms, and more with flashcards, games, and other study tools. software All software latest This Just In Old School Emulation MS-DOS Games Historical Software Classic PC Games Software Library. Internet Arcade. Top Full text of "Four old Greeks; Achilles, Herakles, Dionysos, Alkestis" See other formats. For the ancient Greeks, 'love' was categorized into distinct words, each representing a different kind of infatuation; which is considerably different from our ideas of generalizing all aspects and types of 'love' into a single word. This played a significant role when working with magic spells and amulets, as the intention of the magic would be focused on what kind of love or relationship a. Proteus - the Old Man of the Sea. He herds seals and can change into any form. Menelaus has to hold onto him no matter what shape he changes into. His daughter is Eidothea, who not only helps Menelaus against her father, but slaughters four seals in order to provide covering for the men. Hardcover Book Four Old Greeks by Jennie Hall, Vintage Ships from Salt Lake City, UT. Hardcover Book Four Old Greeks by Jennie Hall, Vintage Hardcover Book Four Old Greeks by Jennie Hall, Vintage Heh, my old company had a biweekly departmental meeting and the theme that week was Greeks. Usually it involved some kind of trivia contest and if time starts to run out, the contest ends with a tie-breaker. More on that later. Okay, there are a f. Excellent lecture series. This guy also has a series with The Teaching Company (Masterpieces of Medieval Literature) so you know he's a good walks through four aspects of Western Civilization in roughly chronological order: Hebrews (the Old Testament); Greeks (The Iliad, Odyssey, tragedy, Plato and Aristotle, Neo-Platonism in Plotinus); Romans 4/5. The four loves Storge – empathy bond. Storge (storgē, Greek: στοργή) is liking someone through the fondness of familiarity, family members or people who relate in familiar ways that have otherwise found themselves bonded by example is the natural love and affection of a parent for their child. It is described as the most natural, emotive, and widely diffused of loves: Author: C. Lewis. Ancient Greece, the birthplace of democracy, was the source of some of the greatest literature, architecture, science and philosophy in Western civilization, and home to stunning historical sites. Greeks Bearing Gifts is book 13 in the Bernie Gunther series by Philip Kerr. It isand Bernie Gunther is now working as an insurance investigator under the name of Christof Ganz. MRE Insurance sent Christof Ganz to investigate the insurances claim for a sinking ship "Doris" off the coast of Greece.4/5. Greek mythology, body of stories concerning the gods, heroes, and rituals of the ancient Greeks. That the myths contained a considerable element of fiction was recognized by the more critical Greeks, such as the philosopher Plato in the 5th–4th century bce. Travel back in time to Old Testament days and see God's hand throughout ancient history. Learn how the biblical account fits in with other civilizations such as Egypt, Greece, and Babylon. Lesson plans for using this book are included in the Creation to the Greeks Teacher's Manual this four-year curriculum features an extensive survey. Ionians appear in Indic literature and documents as Yavana and Yona. In documents, these names refer to the Indo-Greek Kingdoms; that is, the states formed by the Macedonians, either Alexander the Great or his successors on the Indian earliest such documentation is the Edicts of Ashoka, dated to BC, within 10 or 20 years. . The four bodily humors were part of Shakespearean cosmology, inherited from the ancient Greek philosophers Aristotle, Hippocrates, and Galen. Organized around the four elements of earth, water, air, and fire; the four qualities of cold, hot, moist, and dry; and the four humors, these physical qualities determined the behavior of all created things including the .Good old Ian would take the children out somewhere or other and Gillian and I would knuckle down to Christmas Day preparations, unfailingly not going to plan, due to much Christmas spirit. Bathed and decked out in Christmas pyjamas, the four children took their places on the sofa, Gillian in the middle, the book “The night before Christmas.In the book, authors William Strauss and Neil Howe theorize that the history of a people moves in to year cycles called "saecula." The idea goes Author: Linette Lopez.
<urn:uuid:164da765-7ce1-4dfd-9d52-43396d31e50d>
CC-MAIN-2022-33
https://jaduqomilurinu.bextselfreset.com/four-old-greeks-book-8182tr.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00005.warc.gz
en
0.919358
2,159
3.171875
3
The world most largest biography website ! More than THREE MILLION biographies And hundreds of new biographies are added daily |Use attributes for filter !| |Death||16 years ago| |Date of birth||October 4,1928| |Date of died||January 10,2005| |Books||The making of Black revolutionaries| |Chaka Esmond Fanon Firman| |Chaka Esmond Fanon Firman| |Chaka Esmond Fanon Firman| |Children||James Forman Jr.| |Chaka Esmond Fanon Firman| |Education||St. Anselm's Catholic School| |Date of Reg.| |Date of Upd.| James Forman was a prominent African-American leader in the civil rights movement. He was active in the Student Nonviolent Coordinating Committee, the Black Panther Party, and the League of Revolutionary Black Workers. James Forman (October 4, 1928 – January 10, 2005) was a prominent African-American leader in the civil rights movement. He was active in the Student Nonviolent Coordinating Committee (SNCC), the Black Panther Party, and the League of Revolutionary Black Workers. As the executive secretary of SNCC from 1961 to 1966, Forman played a significant role in the freedom rides, the Albany movement, the Birmingham campaign, and the Selma to Montgomery marches. After the 1960s, Forman spent the rest of his adult life organizing black people around issues of social and economic equality. He also taught at American University and other major institutions. He wrote several books documenting his experiences within the movement and his evolving political philosophy including Sammy Younge Jr.: The First Black College Student to Die in the Black Liberation Movement (1969), The Making of Black Revolutionaries (1972 and 1997) and Self Determination: An Examination of the Question and Its Application to the African American People (1984).The New York Times called him "a civil rights pioneer who brought a fiercely revolutionary vision and masterly organizational skills to virtually every major civil rights battleground in the 1960s." Forman was born on October 4, 1928, in Chicago, Illinois. As an 11-month-old baby, he was sent to live with his grandmother, "Mama Jane", on her farm in Marshall County, Mississippi. He was raised in a "dirt-poor" environment; it was not uncommon for him to eat dirt because it was believed to have some nutritional value. In his autobiography, he called eating dirt a "staple" of his diet. He recalls being "hungry all the time." His family had no outhouse and no electricity. They used leaves, newspapers, and corncobs for toilet paper, and they used twigs as toothbrushes. Despite these things, Forman claims to have never questioned his poverty and did not understand it at the time. His Aunt Thelma once caught James reading a shopping catalog in the dark. She, being a school teacher, took an interest in accelerating James' studying and gave him lessons at home. James credits his upbringing for his eventual successes, saying his grandmother gave him a sense for justice while his aunt gave him his "intellectual fire." James' first experience with lynching came when a white man showed up on his doorstep, asking for food and asking that they not tell anyone where he was. The next day, news spread that a white man had been lynched although Forman never learned why. When Forman was around the age of six he had his first experience with racial segregation. While visiting an aunt in Tennessee, Forman attempted to buy a Coca-Cola from a local drugstore. He was told that if he wanted to buy one that he would have to drink it in the back and not at the counter. Confused, Forman asked why and was told "Boy, you're a nigger." This was the first time in his life he realized that because of the color of his skin that there were "things [he] could and could not do, and other people had the 'right' to tell [him] what [he] could and could not do."In the summer of 1935, Forman moved to Chicago to live with his mother and step-father. That September he enrolled in St. Anselm's Catholic School, his first official schooling, and was immediately put into the second grade. He adjusted to his new life in Chicago fairly well, when playing with the neighborhood kids he would throw rocks and cans at white pedestrians and threw bricks off of roofs and onto police cars. However, his new school put a lot of pressure on him to convert to Catholicism, with his Protestantism becoming a "great issue" by the 6th grade. Being the only Protestant at an all-Catholic school put James through "great emotional turmoil." He decided to transfer to the local public school, the Betsy Ross Grammar School. He did so well there that he was allowed to skip the first semester of the seventh grade.From the age of seven onward, James earned a small amount from selling issues of the Chicago Defender. He would often read these papers which helped develop a "strong sense of protest." He read the works of Booker T. Washington and W. E. B. Du Bois and was heavily influenced by Du Bois. He called Washington an "apologist" and often quoted Du Bois and his call for advancing blacks through education. He had yet to enter high school but for James the "race issue was on my mind, before my eyes, and in my blood."After finishing his primary education, Forman enrolled in Englewood Technical Prep Academy. He started his high school career by taking vocational courses instead of the general, pre-college coursework. This led to a poor performance and eventually a suspension from school. He was sent to a continuation school, Washburne High, he got a job as a paper roller at Cuneo Press, and joined a gang known as the "Sixty-first Raiders." His gang activity was very limited in scope and he said he thought using drugs was "a waste of time." Around the age of fourteen James Forman, who had been going under the name of James Rufus, found out that his step-father was not his real father by happening upon his own birth certificate. His real father was a cab driver that Forman coincidentally met and introduced himself to while working at his step-father's gas station.When Forman returned to high school he returned to general coursework and was an honors student. During school he was influenced by the writings of such figures as Richard Wright and Carl Sandburg. He received ROTC training and the Chicago Tribune Silver and Gold medal for efficiency as a non-commissioned officer; he was a lieutenant upon graduation. He was also the honor student of his graduating class which landed him an interview in the Chicago Tribune. During the interview he said that when he grew up he wanted to become a "humanitarian" and a minister as opposed to a preacher. He graduated from high school in January 1947.Shortly after Forman graduated from high school he was kicked out of his house after an argument with his stepfather. He tried to join the United States Army for a two year period but because of a racial quota he had to settle on joining the United States Air Force for a period of three years. Due to the Korean War his stay was extended to four years. Forman would go on to regret this decision and call the armed forces a "dehumanizing machine which destroys thought and creativity in order to preserve the economic system and the political myths of the United States." He met his first wife, Mary, in California two weeks before being shipped off to Okinawa in 1948. They divorced three years later, in 1951. After his discharge the penniless Forman moved to the slums of Oakland. He was eventually able to raise enough money to attend the University of Southern California. During his second semester, after a long night of studying, a police car stopped in front of him. They called him out and said that a robbery had occurred and Forman looked suspicious. Forman denied any wrongdoing but was apprehended anyway. He demanded a phone call and various other civil rights but instead was locked up for three days while being beaten and interrogated. This caused him severe trauma, for which he sought therapy.Forman overcame his trauma and returned to Chicago in 1954. His step-father died that summer and he enrolled at Roosevelt University that fall. He became president of the student body at Roosevelt and graduated in three years. Forman then went to graduate school at Boston University where he began to develop the ideas of a successful social movement. He wanted blacks to come together and start a visible movement. He knew the movement had to use nonviolent direct action, students, and it had to be started in the South. He was also against monolithic, charismatic leaders because he wanted whatever was created to not die along with the leader. In 1958 he visited Little Rock, Arkansas because he was tired of being an "armchair revolutionary." He taught in Chicago's public schools and worked with dispossessed tenant farmers in Tennessee before joining SNCC. In 1961, Forman joined the newly formed Student Nonviolent Coordinating Committee (SNCC, pronounced "snick"). From 1961 to 1966, Forman, a decade older and more experienced than most of the other members of SNCC, became responsible for providing organizational support to the young, loosely affiliated activists by paying bills, radically expanding the institutional staff and planning the logistics for programs. Under the leadership of Forman and others, SNCC became an important political player at the height of the civil rights movement. SNCC began as an affiliate of another direct action group of the movement, Martin Luther King Jr.'s Southern Christian Leadership Conference. At times, Forman's more confrontational and radical style of activism clashed with King's Christian pacifist approach. In August 1961, Forman was jailed with other freedom riders protesting segregated facilities in Monroe, North Carolina. This episode brought him into contact with Robert F. Williams who won Forman's admiration. During a visit to Williams' home in Monroe, Forman discussed the positive role of using armed self-defense in the struggle against white oppression. After his sentence was suspended, Forman agreed to become executive secretary of SNCC. Forman's occasional criticism of Dr. King was not simply a political exercise, but reflected a genuine concern about the direction King was leading the movement in. He specifically questioned King's top-down leadership style, which he saw as undermining the development of local grassroots movements. For example, following W. G. Anderson's invitation to King to join the Albany Movement, Forman criticized the move because he felt much harm could be done by interjecting the Messiah complex. He recognized that King's presence would detract from, rather than intensify, the focus on local people's leadership in the movement. Forman echoed the concerns of those in SNCC and the broader civil rights movement who saw the potential dangers of relying too heavily upon one dynamic leader.In an interview with Robert Penn Warren for the book Who Speaks for the Negro?, Forman laid out many of his ideologies concerning SNCC, commenting that it is "the one movement in this country that has within its spheres of activity room for intellectuals."Years before the famous Selma marches of 1965, Forman and other SNCC organizers visited the city to assist the voter registration work of Amelia Boynton and J. L. Chestnut. In addition to frontline organizing, Forman facilitated a visit by celebrities James Baldwin and Dick Gregory for Selma's first "Freedom Day" in October 1963—a day of mass African-American voter registration in a Jim Crow area.Forman did significant work for SNCC in the cultural community. For instance, Forman recruited the young folk star Bob Dylan to play benefits and rallies for SNCC ( One of these rallies in Mississippi makes an appearance in the classic documentary Don't Look Back). When Dylan received an award from the Emergency Civil Liberties Committee he said the honor really belonged to "James Forman and SNCC." When the second march out of Selma was turned around by Martin Luther King, Tuskegee Institute students decided to open a "Second Front" by marching to the Alabama State Capitol and delivering a petition to Governor George Wallace. They were quickly joined by Forman and much of the SNCC staff from Selma. The SNCC members distrusted King more than ever after the "turnaround Tuesday," and were eager to take a separate course. On March 11, SNCC began a series of demonstrations in Montgomery, and put out a national call for others to join them. James Bevel, SCLC's Selma leader, followed them and discouraged their activities, bringing him and SCLC into conflict with Forman and SNCC. Bevel accused Forman of trying to divert people from the Selma campaign and of abandoning nonviolent discipline. Forman accused Bevel of driving a wedge between the student movement and the local black churches. The argument was resolved only when both were arrested.On March 15 and 16, SNCC led several hundred demonstrators, including Alabama students, Northern students, and local adults, in protests near the capitol complex. The Montgomery County sheriff's posse met them on horseback and drove them back, whipping them. Against the objections of James Bevel, some protesters threw bricks and bottles at police. At a mass meeting on the night of the 16th, Forman "whipped the crowd into a frenzy" demanding that the President act to protect demonstrators, and warned, "If we can't sit at the table of democracy, we'll knock the fucking legs off."The New York Times featured the Montgomery confrontations on the front page the next day. Although Dr. King was concerned by Forman's violent rhetoric, he joined him in leading a march of 2000 people in Montgomery to the Montgomery County courthouse. According to historian Gary May, "City officials, also worried by the violent turn of events… apologized for the assault on SNCC protesters and invited King and Forman to discuss how to handle future protests in the city." In the negotiations, Montgomery officials agreed to stop using the county posse against protesters, and to issue march permits to blacks for the first time. After being replaced by Ruby Doris Smith-Robinson as executive secretary, Forman remained close to the leadership of SNCC helping to negotiate the ill-fated "merger" of SNCC and the Black Panther Party in 1967 and even briefly taking a leadership position within the Panthers. In 1969, after the failure of the merger and the decline of SNCC as an effective political organization, Forman began associating with other Black political radical groups. In Detroit he participated in the Black Economic Development Conference, where his Black Manifesto was adopted. He also founded a nonprofit organization called the Unemployment and Poverty Action Committee.As a part of his "Black Manifesto", on a Sunday morning in May 1969, Forman interrupted services at New York City's Riverside Church to demand $500 million in reparations from white churches to make up for injustices African Americans had suffered over the centuries. Although Riverside's preaching minister, the Rev. Ernest T. Campbell, termed the demands "exorbitant and fanciful," he was in sympathy with the impulse, if not the tactic. Later, the church agreed to donate a fixed percentage of its annual income to anti-poverty efforts.On May 30, 1969, Forman made plans to pursue a similar course at a Jewish Synagogue, Congregation Emanu-El of the City of New York. Members of the Jewish Defense League (JDL), led by Rabbi Meir Kahane, showed up carrying chains and clubs promising to confront Forman if he attempted to enter the synagogue. Kahane and the JDL forewarned Forman and the public about their intended actions and Forman never showed up at the synagogue. During the 1970s and 1980s, Forman completed graduate work at Cornell University in African and African-American Studies and in 1982, he received a Ph.D. from the Union of Experimental Colleges and Universities, in cooperation with the Institute for Policy Studies.Forman spent the rest of his adult life organizing black and disenfranchised people around issues of progressive economic and social development and equality. He also taught at American University in Washington, D.C. He wrote several books documenting his experiences within the movement and his evolving political philosophy including Sammy Younge Jr.: The First Black College Student to Die in the Black Liberation Movement (1969), The Making of Black Revolutionaries (1972 and 1997) and Self Determination: An Examination of the Question and Its Application to the African American People (1984).Forman died on January 10, 2005, of colon cancer, aged 76, at the Washington House, a hospice in Washington, DC. Forman's marriages to Mary Forman and Mildred Thompson ended in divorce. He was married to Mildred Thompson Forman (now Mildred Page) from 1959 to 1965, during the most active period of SNCC. Mildred Forman moved to Atlanta with James and worked at the Atlanta SNCC office as well as working as coordinator for tours of The Freedom Singers. During the 1960s and 1970s, Forman lived with Constancia "Dinky" Romilly, the second and only surviving child of the British-born journalist, anti-fascist activist and aristocrat, the Hon. Jessica Mitford, and her first husband, Esmond Romilly, who was a nephew-by-marriage of Sir Winston Churchill. Though obituaries and other posthumous articles about Forman have stated that he and Romilly were married, correspondence between Romilly's mother and aunts state that the couple were not legally husband and wife.Forman and Romilly had two sons: Chaka Forman and James Forman Jr., who is a professor at Yale Law School. In his autobiography The Making Of Black Revolutionaries Forman devoted an entire chapter to explaining his atheism. He believed that "belief in God hurts my people." He also received the African American Humanist Award in 1994. Sammy Younge, Jr: The First Black College Student to Die in the Black Liberation Movement (Open Hand Publishing LLC, 1968) La Liberation Viendra D'une Chose Noire (Paris: F. Maspero, 1968) The Political Thought of James Forman (Black Star, 1970) The Making of Black Revolutionaries (New York: Macmillan Co, 1972) Self Determination: An Examination of the Question and Its Application to the African American People (Open Hand Publishing LLC, 1984) High Tide of Black Resistance and Other Political & Literary Writings (Open Hand Publishing LLC, 1994) List of civil rights leaders SNCC Digital Gateway: James Forman, Documentary website created by the SNCC Legacy Project and Duke University, telling the story of the Student Nonviolent Coordinating Committee & grassroots organizing from the inside-out Washington Post Obituary James Forman's oral history video excerpts at The National Visionary Leadership Project "Letters on the Arab-Israeli Dispute in James Forman's The Making of Black Revolutionaries"
<urn:uuid:a7f9c397-090a-47d1-803e-0062ee970ec4>
CC-MAIN-2022-33
https://www.xwhos.com/person/james_forman-whois.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00206.warc.gz
en
0.97596
4,046
2.53125
3
Custom «Real Gross Domestic Product» Essay Paper Sample Table of Contents Gross domestic product refers to the value of the goods and services that are produced by a country over a given period of time which is usually one year (Mankiw 2008:510). The value must be the market value of the goods and services a country produces. Market value of a commodity is taken as the price the customers are willing to pay in order to acquire the good or service. It is the amount the customers are willing to exchange for the goods. In estimation of a country's Gross Domestic Product, all the goods and services of the country are put together and an estimation of their market value is done. All goods of the country and services must be included in calculating the Gross Domestic Product. It is however hard to include some products in calculation for Gross Domestic Product because measuring them is difficult. Examples of such products are illegal goods and goods produced and consumed domestically without going through the process of buying and selling. It is important to note at this point that the goods included in calculation of Gross Domestic Product are only final goods. Unfinished goods are not included. 0 Preparing Orders 0 Active Writers 0% Positive Feedback 0 Support Agents Gross Domestic product is most of the times used to determine whether a country is advancing or not. This is by comparing the Gross Domestic Product of a country with the Gross Domestic Product of other countries or comparing the Gross Domestic Product of a particular year to that of the previous years. Gross Domestic Product can also be viewed in terms of consumption of goods and services in a country. This is done by considering the value of elements known as the components of Gross Domestic Product. They are consumption, investment, government expenditure and net exports. Gross Domestic Product is then considered to be equivalent to total of consumption, investment, government expenditure and net exports (Mankiw 2008:512). Consumption is the expenditure by house holds which means individuals and companies. In this component expenditure in goods like food, clothes, cars and in services like hair styling, transport and education is considered. Investment refers to expenditure in goods and services that will be used in the future or in goods that are used to produce other goods. This category includes expenditure in items such as capital goods like machines, building of new houses and all investing activities by individuals and companies. Government purchases are the expenditure of the government in provision of goods and services to its citizens. Examples of government expenditure are in payment of salaries, repair of roads, protection, purchase of government vehicles and offering of administrative services. Transfer payments like funds given to students in colleges and pension given to retirees must be excluded from government expenditure because they do not contribute to the productivity of the economy. Net exports, the last component of Gross Domestic Product is the simply the difference between total exports and total imports of a country. Hurry up! Limited time offer Use discount code Gross Domestic Product is in two forms, the nominal Gross Domestic Product and real Gross Domestic Product. According to Carbaugh, nominal Gross Domestic Product is the market value of the goods and services produced in a country at a given year expressed in terms of the prices prevailing at that year (2006:237). Real Gross Domestic Product on the other means the nominal Gross Domestic Product adjusted to reflect the current prices. This is considered to be the best measure of a country's Gross Domestic Product since it puts into consideration changes in the prices of the commodities. This is more realistic because the value of a country's currency changes from time to time due to inflation or deflation. Real Gross Domestic Product is then the value of goods and services produced in a particular year with reference to another year. Adjustment of nominal Gross Domestic Product is done with the use of a Gross Domestic Product deflator. A Gross Domestic Product deflator is a measure of inflation and it measures the change of value of currency in a year with respect to a particular year, called the base year. It is calculated by finding the ratio of the price of goods and services at a particular year to the price of those goods and services at the base year.(Carbaugh 2006:237) According to Weerapana & Taylor, Gross Domestic Product is calculated by dividing nominal Gross Domestic Product with real Gross Domestic Product (2007:534). From this formula, real Gross Domestic Product is then calculated by dividing the nominal Gross Domestic Product of a year with the Gross Domestic Product deflator of that year. USE OF REAL GROSS DOMESTIC PRODUCT TO MEASURE LIVING STANDARDS Living standards refer to the state ability of citizens to acquire the goods and services they need in life (Allen, Bengtsson & Dribe 2005:6). It is the measure of the availability of the goods and services to an individual. They also argue that the living standards of people are depicted by the kind of goods they consume or produce. Over the past years, several methods have been use to measure the living standards of people. Such methods include Gross Domestic Product is usually used to measure the living standards of the citizens of a country. In doing this, the total output per citizen is calculated by dividing the real Gross Domestic Product with the population of productive citizens of a country. This is called real Gross Domestic Product per capita. As Gillespie puts it, real Gross Domestic Product per capita shows how much each citizen earns in a given year (2007:274). Citizens in countries with higher real Gross Domestic Product per capita are considered to be living in better conditions that those of countries with lower real Gross Domestic Product per capita. Similarly, if the real Gross Domestic Product per capita of a country increases, there is an assumption that the living standards of the citizens of that country has improved. The opposite is true and therefore if the real Gross Domestic Product per capita of a country declines with respect to that of another country or that of the previous year, the living standards are considered to have dropped also. Benefit from Our Service: Save 25% Along with the first order offer - 15% discount, you save extra 10% since we provide 300 words/page instead of 275 words/page LIMITATIONS OF USE OF REAL GROSS DOMESTIC PRODUCT TO MEASURE THE STANDARD OF LIVING Use of real Gross Domestic Product per head to measure standards of living has been found to have several limitations or shortcomings. The first limitation is that the statistical difficulties in estimating the real Gross Domestic Product which might result to non reliable figures. Buultjens notes that there is distortion in the figures of the Gross Domestic Product because there are challenges in calculation. First, it is difficult to differentiate between final products and intermediate products. Such distinction is critical since only finished goods are supposed to be used to calculate the real Gross Domestic Product. There are other difficulties in putting products into their right year of production. This is because some products are finished goods at various stages during production (2005:16). For example, corn that is harvested in 2009 and put in the stores until 2010 when it is milled and sold for consumption would be hard to classify as finished good in either of the two years. Therefore, it is hard to classify the products as finished or raw products in various stages. Real Gross Domestic product is also affected by changes in the exchange rates currencies in the economy and this is not considered in coming up with the figures for real Gross Domestic product per capita. It is thus argued that real Gross Domestic Product per capita is not a reliable figure due to limitations in calculation. Get an order prepared by Top 30 writers 10.95 USD VIP Support 9.99 USD Get an order Proofread by editor 4.33 USD extended REVISION 2.00 USD SMS NOTIFICATIONS 3.00 USD Get a full PDF plagiarism report 5.99 USD WITH 20% DISCOUNT 29.01 USD Another shortcoming associated with the use of real Gross Domestic Product per head to measure living standards is the exclusion of some goods and services in the calculation of Gross Domestic Product. As discussed earlier in this paper, some goods and services are not used to calculate Gross Domestic Product. Examples of these goods are those that are not traded in the market but are produced and consumed in the households, illegal goods traded in backstreet markets and all transactions which are not recorded. (Buultjens 2005:16). Goods like illegal drugs and dealings in precious stones in the black markets are not recorded thus not used in calculation of real Gross Domestic Product. Goods manufactured for own consumption like agricultural produce are not captured because they are not traded in the market. The problem of this exclusion is given as the fact that these goods and services that are not captured affect the living standards of citizens. Top 30 writers from the incredible opportunity at a very reasonable price Another major weakness of use of real Gross Domestic Product per capita to measure living standards is the fact that calculation of Gross Domestic Product ignores social costs. An economy might be producing more goods and services but at the expense of the health of its citizens. Social costs include overwork of citizens leaving them with little or no time for leisure. Such citizens will be living in low standards even though the Gross Domestic Product is high. Other social costs associated with economic growth are pollution of the environment, escalation of crime levels, health problems and degradation of natural resources, all which cause living standards to decline. Gross Domestic Product would be a more reliable figure if it put these social costs into consideration. Calculation of real Gross Domestic product employs the use of Gross Domestic product deflator which is estimated using the inflation in the economy. Estimation of inflation is hard since many it is affected by many factors in the economy. This may make the real Gross Domestic product not to be exact. from the incredible opportunity at a very reasonable price The other problem is that Gross Domestic Product uses a quantitative rather than a qualitative approach in calculation of living standards. This means that all aspects that concern quality are excluded in Gross Domestic Product. Costs incurred to develop new products and improve on the already existing products are also not captured. This is a serious omission since the quality aspects are more important in determining living standards. Comparison of figure of real Gross Domestic Product per head of different countries is not realistic. This is because countries produce different goods and services and have different prices for their commodities. The methods of production used are different, with some countries using labor intensive methods while others using capital intensive methods. The costs of production are thus different. Therefore, real Gross Domestic Figure is unique for each country and though the figures of two countries may be the same, the people of those countries may be living in different standards due to different prices and production methods. Want an expert write a paper for you? The major problem cited with this method of measuring living standards is that real Gross Domestic product per capita might be high in a country, but distribution of resources might be poor. This is the most common occurrence in economies where wealth is concentrated in the hands of a few, with the rest living in poverty. If the wealth of these few rich individuals increases, the real Gross Domestic product per head in the country increases, but the state of the poor remains the same. Therefore, real Gross Domestic product per capita does not consider the distribution of income among the citizens; it just gives an absolute figure for the whole economy. Boyes & Melvin support this argument by observing that "Economic growth is considered to be good because it allows people to have a higher standard of living, to have more material goods. But an increase in real GDP or per capita real GDP does not tell us whether the average citizen is better of" (2006: 391) Because of the above discussed limitations, real Gross Domestic Product per capita is not a reliable way of measuring the living standards. There is need for other methods to be developed to capture the living standards. Some of the methods that have been devised include use of real wage, use of socio-demographic factors and measuring the ability of citizens to overcome economic shocks in the short run. (Allen, Bengtsson & Dribe 2005: 9) Real wage is a measure of the income of the workers in the economy. It is argued to be more realistic than the real Gross Domestic Product per head since it takes into consideration the distribution of resources to the citizens. This is better than the real Gross Domestic Product per head that considers what each citizen ought to have given the productivity of the nation instead of considering what the citizen actually has. This method is also criticized for using wages only in establishing living standards. It leaves out income generated by land and capital. Attractive plagiarism check option: ensure your papers are authentic! Social-demographic indicators were developed to determine the living standards. These indicators are based on research by companies to determine the living standards. This is through consideration of factors such as availability of health care, mortality rates, child health, availability of recreation facilities and levels of literacy among others. These are also called measures of quality of life. They were proposed and developed by the United Nations Organization. It developed the Human Development index (HDI) to measure the living standards using socio-demographic indicators. This is amore reliable indicator but it consumes a lot of time and resources. Research must be conducted to establish the levels of the factors and such research might take long. The other method cited by Allen, Bengtsson & Dribe is determining the ability of the citizens to deal with economic shocks in the short run. This method is not common because it has some complexities. This method is based on research on how the population reacts and deals with economic shocks such as and abrupt rise or fall in prices of commodities and rise or fall of demand of commodities. If increase of the price of a basic product such as food causes increased death to the population, such population is said to be living in low standards. Do you want your papers to be flawless? Use our proofreading service! Another method in use is the real Gross disposable national income which measures the income available to citizens for consumption. All these were developed to address the inadequacies of the real Gross Domestic Product per capita to measure living standards.
<urn:uuid:7bfae300-f4fd-4877-a9e8-b4ec4aabf4c9>
CC-MAIN-2022-33
https://essays.primewritings.com/economics/real-gross-domestic-product.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00003.warc.gz
en
0.948665
2,952
3.109375
3
AN ALBUM OF URINARY MICROSCOPY IMAGES IN A CLINICAL CONTEXT G.B. Fogazzi, Milan, Italy S. Verdesca, Milan, Italy The next case deals with a woman with a long history of microscopic haematuria of unknown origin. Isolated microscopic haematuria is a condition characterized by an “abnormal” number of red blood cells in the urine (even though there is no agreement at all about the number of red blood cells to considered as “abnormal”) in the absence of proteinuria. For some authors the definition should also include the presence of a normal renal function and the absence of arterial hypertension. In a recent paper published in prestigious “The New England Journal of Medicine” it was stated that the single most important test in the evaluation of a patient with haematuria is the microscopical analysis of urine. This because “it often distinguishes glomerular from non glomerular bleeding.” Therefore, for patients with isolated microscopic haematuria we propose the following algorithm: in which we put the urine sediment examination in the very first steps of the diagnostic work-up, just after the clinical history and the physical examination, in the same position with the measurement of serum creatinine and of urine protein excretion. This because we believe it is important to know, from the very beginning of the clinical evaluation, whether the haematuria is glomerular or non glomerular. What do the words “glomerular” and “non glomerular haematuria actually mean? The story starts in 1982 when Fairley and Birch published in “Kidney International” the seminal paper shown in the slide. In that paper they demonstrated that two main types of erythrocytes can be found in the urine. One type is represented by the so-called “glomerular or dysmorphic” erythrocytes, which are characterized by irregular shapes and appearances, and differ remarkably from the red cells we find in the peripheral blood. The other type is represented by the so-called “isomorphic or non glomerular” erythrocytes, which are identical with the red cells we find in the peripheral blood. After the paper by Fairley and Birch, many other papers were published in the 1980s by different investigators, all of which confirmed the utility of the examination of urinary erythrocyte morphology as a tool to identify the glomerular or non glomerular origin of the haematuria. However, as time passed it became evident that this examination requires experience, it is exposed to the risks of low inter-observer reproducibility, and is limited by the fact that very different criteria were used by different authors (for instance, for Fasset et al , a haematuria was glomerular if > 80% erythrocytes were dysmorphic; for Tomita et al, if dysmorphic red cells were >15%, for Loh et al if >3 morphological subtypes of erythrocytes were present, etc). Luckily enough, a paper, published by Hans Köhler and co-workers in “Kidney International” in 1991, simplified this rather confused situation by identifying a unique subtype of dysmorphic erythrocyte, the so-called “acanthocyte”, which could be used as a reliable indicator of glomerular bleeding. This finding was confirmed by other authors, and today we know that the presence in the sample of ³5% acanthocytes indicates a glomerular bleeding with a 56%-100% sensitivity and 97%-100% specificity. This is a classical example of an acanthocyte as seen by scanning electron microscopy (SEM), while these are acanthocytes as seen by conventional phase contrast microscopy (arrows). As you can easily see, acanthocytes are nothing but erythrocytes with the shape of a ring from which on ore more “blebs” protrude. With this background knowledge, microscopic haematuria of unknown origin should represent the ideal clinical situation for the evaluation of urinary erythrocyte morphology. In spite of this, only few papers have so far been published on the utility of this test in this clinical condition. One is the paper published by Schramek and co-workers in 1991 in prestigious “Lancet”. The authors reported on 316 patients with isolated microscopic haematuria of unknown origin, who had been divided in 2 groups on the basis of the morphology of urinary erythrocytes. The 123 patients with a non-glomerular haematuria were submitted to a complete and immediate urological work-up: a urological disease was found in 85% of cases, while for the other 15% of patients no causes for the haematuria could be found. For the 193 patients with a glomerular haematuria (which was diagnosed when 100% of urinary erythrocytes were found to be dysmorphic), only a basic nephrological investigation was carried out, which did not include renal biopsy. At a mean follow-up of 42 months, 112 patients continued to have glomerular haematuria, while 5 underwent a complete and spontaneous reversion. In 2 other patients, glomerular haematuria transformed into a mixed haematuria, and in both of them a cancer of the urinary tract was found. Three other patients developed proteinuria, which suggested a progression of the renal disease. In our opinion, this paper demonstrates that the examination of urinary erythrocyte morphology is useful in the work-up of patients with microscopic haematuria, especially for the identification of urological disorders. The other paper, which was published by McGregor and co-workers in 1998 in “Clinical Nephrology”, explored the aspect which had not been investigated in the previous paper. Seventy-five adult patients with microscopic haematuria of unknown origin were all submitted to renal biopsy. A glomerulopathy was found in 31 of 33 patients with a glomerular haematuria, and also in 31 patients of 42 with non a glomerular haematuria. We also have some results in this field, which are going to be published in “Pediatric Nephrology”. We have submitted to renal biopsy 16 patients (10 children and 6 adults) all with isolated microscopic haematuria, which had been classified as glomerular after repeated urinary sediment examinations over time (2 to 8 per patients, for a total of 55 urine sediments)*. To define the haematuria as glomerular, we used the following criteria: the presence of ³40% dysmorphic erythrocytes and/or the presence of ³5% of acanthocytes and/or the presence of ³ 1 erythrocyte cast on 50 low power (160x) microscopic fields. *We don’t usually perform renal biopsy on patients with isolated microscopic haematuria. These patients represented a selected group, in which the renal biopsy had been performed for various clinical reasons. We did not include in our study patients with non glomerular haematuria, because we considered renal biopsy unethical for such patients. As you can see in the slide, we found a glomerular disease in 14 out of 16 patients, which in most instances was due to thin basement membrane disease or Alport syndrome. Thus, in our hands the finding of a glomerular haematuria was a good indicator for the presence of a glomerular disease. In addition, one of the two patients without glomerular changes at renal biopsy (in spite of a full investigation with light, electron, and immunofluorescence microscopy) we found a cluster of erythrocytes in the lumen of a renal tubule, which indicates the renal origin of the haematuria. Due to the fact that we didn’t include in the study patients with non-glomerular haematuria, we can just give the sensitivity and a positive predictive value of our urinary diagnostic approach. If we consider the 55 urine samples, we have the figures shown in the slide: you see that the highest sensitivity is for ³5% acanthocytes while the lowest is for red blood cell casts, which however have the highest positive predictive value. If we consider the 16 patients, you see that we have very good sensitivity for both ³40% dysmorphic erythrocytes and ³5% acanthocytes, while this is very low for red blood cell casts. Thus, even though the available studies are very few, are based on different methodologies, and have a number of other limitations, we think we can say that the evaluation of urinary erythrocyte morphology is useful to address the early diagnostic work-up in patients with isolated microscopic haematuria of unknown origin. Now the clinical case. In January 2007, a 66-year-old woman is seen in the clinic of our unit for persistent microscopic haematuria, which was first diagnosed in 1990, 17 years ago. Since then, the patient has always been looked after by urologists. As you can see, the patient was submitted to an intensive diagnostic work-up over time: 8 ultrasounds of the kidneys and bladder; 1 CT scan of the abdomen; 1 intravenous pyelography; 3 cystoscopies, the second of which showed that were some areas of hypervascularisation and oedema at the level of the bladder trigone. This led to electrocoagulation of the hypervascular zone and to a third cystoscopy, which demonstrated the complete ablation of trigone abnormalities… while the microscopic haematuria persited unchanged. The work-up also included 8 urinary cytology examinations, which were all negative for cancer cells, 1 search for urinary tuberculosis, and 15 urine cultures. However, in 17 years the patient had never been offered the evaluation of urinary erythrocyte morphology!! Thus, when at last the patient was sent to us, we examined 4 urine sediments over a period of 1 month, and found that all 4 samples suggested the presence of a glomerular haematuria. In the 1st sample, we had ³40% dysmorphic erythrocytes + 6% acanthocytes + 1 erythrocytic cast. In the 2nd sample we had 35% acanthocytes, which is 7 times higher than the cut off level. In the 3rd sample we found 10% acanthocytes. In the 4th, we found 5% acanthocytes and erythrocytic casts. Thus, all samples examined showed a haematuria of glomerular origin. Serum creatinine, creatinine clearance, C3-C4, and IgA serum levels were all normal, and the search of autoantibodies was negative. Therefore, we explained to the patient that she had a glomerular disease (most likely, thin basement membrane disease or IgA nephropathy) which in 17 years has caused only isolated microscopic haematuria, and that she needed only periodical checks (twice/year) of serum creatinine, urinary protein excretion, and blood pressure. I close the presentation of this case with the following question mark: how many invasive procedures could have been avoided if the urine sediment had carefully been examined at the beginning of the diagnostic work-up and not 17 years after the first diagnosis of microscopic haematuria? THE FOURTH PART WILL BE PUBLISHED ON APRIL 30TH, 2008
<urn:uuid:1fa1498e-f9fd-4e7a-863d-9f36089734e1>
CC-MAIN-2019-22
http://www.ndt-educational.org/fogazzislide2007part3.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258620.81/warc/CC-MAIN-20190526004917-20190526030917-00102.warc.gz
en
0.945925
2,478
2.671875
3
Many Jewish Americans and most Jewish Israelis would call themselves “Zionist”, in very much the same way that nearly every American would claim to be “patriotic”. However, just as Americans differ greatly on what “patriotic” really means, for American Jews and Jewish Israelis, too, what “Zionist” actually means depends on who you talk to--and the differences can be striking. Just as one American’s “patriotism” may be seen as nothing less than treason when seen through the lens of another American’s “patriotism”, so too one Jew’s “Zionism” can be seen as an utter betrayal of Judaism, Jews or Israel from the point of view of another Jew’s “Zionism”. The assassination of Zionist Israeli Prime Minister Yitzhak Rabin at the hands of another Zionist Israeli man is only a particularly acute example of divisions that run through Jewish society, both in the United States and in Israel. From a Muslim or Christian Palestinian Arab point of view, Zionism represents a disastrous attempt to solve the problem of Jewish persecution in Europe by establishing a Jewish State on what was largely Arab-owned and Arab-inhabited land, thus denying the right of Palestinian Arabs to self-determination in very much the same way that European colonization of North America meant the dispossession of the people already inhabiting the land. Many Arabs also see the founding of the State of Israel as having been at least in part promoted by various Western powers for strategic geopolitical reasons. As Miki Kashtan, a Jewish Israeli woman “in voluntary political exile in the US” and leading exponent of the theory and practice of Nonviolent Communication, has put it so succinctly: "The complex tragedy of the region is that Zionism is at one and the same time a return to a long lost home and the gift of liberation to a people persecuted for centuries, and a brutally oppressive system for another people that has never known independence." Historically emerging in the late 1800’s, there were many different “Zionisms”: from the left-wing Labor Zionism of Dov Ber Borochov, to the right-wing pro-capitalist “Revisionist Zionism” of Ze’ev Jabotinsky; from the secular spirituality of “Cultural Zionism” as espoused by Ahad Ha’am, to the more fundamentalist religious nationalism of “Revolutionary Zionism” as advocated by Avraham Stern. It was the largely secular “Political Zionism” of Theodor Herzl which eventually came to dominate the Zionist movement that led to the founding of the State of Israel. All forms of Zionism, however, strove to save the Jewish people from persecution and/or cultural assimilation/annihilation by encouraging the Jewish diaspora to regather in Eretz Yisrael, the Land of Israel (though Herzl and others seemed briefly to have considered setting up a Jewish State elsewhere). With the rise of Hitler and the onset of WWII, Zionism took on the even more urgent task of providing Jews with the means of sheer survival, especially since other countries, including the US, refused to grant entry to Jews fleeing Europe before, during, and after the war. Within the religious community, some Jews have considered it their religious duty to re-settle the land of their forefathers, and so have joined the Zionists. Other religious Jews have maintained a strongly anti-Zionist position, considering any merely human attempt to re-establish Jewish sovereignty in Palestine to be a blasphemous usurpation of divine prerogative, with some of these also seeing it as a violation of the human rights of the Arab inhabitants of the land (http://www.truetorahjews.org/). While Christian Zionism (a powerful political force in the United States) shares many of the goals of Jewish Zionism, it sees the establishment of Israel as part of the fulfillment of end-times prophecy regarding the Second Coming of Christ (while, obviously, religious Jewish Zionists are waiting for the first coming of their Messiah). Zionists (Jewish and Christian, secular and religious) have pointed to centuries of persecution in both Christian and (to a lesser extent) in Muslim lands, and argue that only a truly Jewish State can guarantee the security of the Jewish people. Importantly, nearly all Zionists (from leftwing to rightwing) assume that only by ensuring that there be a substantial demographic Jewish majority can the specifically Jewish character (political and cultural) of the Jewish State be secure. Whether or not achieving and sustaining this Jewish demographic majority would or should entail the expulsion of some or all of the Arab population has been a matter of wide disagreement among Zionists. Likewise, whether or not the Arabs should participate as equals in the Jewish State has been a matter of disagreement. From the Arab point of view, of course, even the asking of such questions reveals an overtly colonial and deeply anti-democratic nature to most forms of Zionism. For some Zionists, the near-total dispossession of the Arabs has been viewed as either a “necessary evil” or a “divine mandate” for Jewish security, demographic predominance, and political sovereignty. For others, no such dispossession was envisioned at all. Martin Buber, for example, envisioned a wholly bi-national State in which Arabs and Jews would live together as equals. Addressing the Zionist Congress of 1921 he said that the movement should proclaim "its desire to live in peace and brotherhood with the Arab people and to develop the common homeland into a republic in which both peoples will have the possibility of free development". So committed was he to the idea of securing the voluntary agreement of the Arabs that he was willing to consider accepting the possibility of Jews remaining a demographic minority in the land. Others had a more complex view. Ze’ev Jabotinsky, for example, clearly stated in his famous 1924 “Iron Wall” article that, while he hoped for a kind of State in which both Arabs and Jews would eventually live together as equals, he nevertheless believed that the securing of a Jewish demographic majority was essential to achieve the goals of Zionism: "There will always be two nations in Palestine – which is good enough for me, provided the Jews become the majority.....I am prepared to swear, for us and our descendants, that we will never destroy this equality [of Arab and Jews] and we will never attempt to expel or oppress the Arabs." (http://www.jewishvirtuallibrary.org/jsource/Zionism/ironwall.html) However, explicitly acknowledging Zionism as a form of colonization, Jabotinsky asserted that it would be hypocritical of Zionists to pretend that such colonization could be accomplished without force because the native Arabs would certainly resist the establishment of a Jewish demographic majority: "Zionist colonization, even the most restricted, must either be terminated or carried out in defiance of the will of the native population...All this does not mean that any kind of agreement is impossible, only a voluntary agreement is impossible.... A living people makes such enormous concessions on such fateful questions only when there is no hope left. Only when not a single breach is visible in the iron wall, only then do extreme groups lose their sway, and influence transfers to moderate groups...And only then will moderates offer suggestions for compromise on practical questions like a guarantee against expulsion, or equality and national autonomy. I am optimistic that they will indeed be granted satisfactory assurances and that both peoples, like good neighbors, can then live in peace. But the only path to such an agreement is the iron wall, that is to say the strengthening in Palestine of a government without any kind of Arab influence, that is to say one against which the Arabs will fight. In other words, for us the only path to an agreement in the future is an absolute refusal of any attempts at an agreement now." (http://www.jewishvirtuallibrary.org/jsource/Zionism/ironwall.html) In the 1980’s, Benny Morris and Ilan Pappe and other “New Historians” began to challenge the traditional Zionist narrative about the founding of the State of Israel. For example, they uncovered evidence that large numbers of Arabs were deliberately and forcefully expelled both before and during what Israelis call their War of Independence. Evidence of Zionist atrocities that accompanied this expulsion also surfaced. Ilan Pappe went on to become a leading advocate of Palestinian rights, a proponent of the One State Solution, and an advocate of the Boycott, Divestment , and Sanctions (BDS) movement. Benny Morris, on the other hand, while still considering himself a leftwing Zionist, asserts: "There are circumstances in history that justify ethnic cleansing. I know that this term is completely negative in the discourse of the 21st century, but when the choice is between ethnic cleansing and genocide—the annihilation of your people—I prefer ethnic cleansing. A Jewish state would not have come into being without the uprooting of 700,000 Palestinians. Therefore it was necessary to uproot them." (http://www.logosjournal.com/morris.htm) Other left-wing Zionists (http://www.tikkun.org/nextgen/israelpalestine), in contrast, deplore the conditions under which the State of Israel came into being (much as many Americans deplore the dispossession of the Native Americans which attended the establishment of The United States of America), and continue to hold out the hope of realizing both the spirit and the letter of the UN’s Declaration of the Establishment of Israel (much as many Americans have hoped to fulfill the “all people are created equal” promise of their own Declaration of Indepedence), in part quoted here: "Israel...will foster the development of the country for the benefit of all its inhabitants; it will be based on freedom, justice and peace as envisaged by the prophets of Israel; it will ensure complete equality of social and political rights to all its inhabitants irrespective of religion, race or sex; it will guarantee freedom of religion, conscience, language, education and culture; it will safeguard the Holy Places of all religions; and it will be faithful to the principles of the Charter of the United Nations." Can Israel be both “Jewish” and “democratic”; that is, can it both be defined in ethnic terms, as a “Jewish State”, and still ensure “complete equality” for “all its inhabitants”? This remains, perhaps, the central existential question facing not only Israelis but also their American allies who claim to see in Israel a fellow exemplar of democracy. In spite of the challenges facing them, many Israeli Jews and Arab citizens of Israel, as well as Palestinians under Israeli occupation, have sought more direct people-to-people engagement in order to try to find a way to live peaceably together in the land. 500 Israelis and Palestinians will Negotiate Solutions to the Conflict Jews, Muslims and Christians to build a joint house of worship in Jerusalem Combatants for Peacehttp://cfpeace.org/personal-stories/ Arthur M. Peña There is currently no content classified with this term.
<urn:uuid:4503e3fe-05cc-41b4-9ccd-9a18fab590e9>
CC-MAIN-2019-22
https://www.allsides.com/dictionary/zionism
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256281.35/warc/CC-MAIN-20190521062300-20190521084300-00022.warc.gz
en
0.956829
2,339
2.515625
3