text
stringlengths 174
640k
| id
stringlengths 47
47
| dump
stringclasses 12
values | url
stringlengths 14
1.94k
| file_path
stringlengths 125
139
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
156k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
This resource is hosted by the Nelson Mandela Foundation, but was compiled and authored by Padraig O’Malley. It is the product of almost two decades of research and includes analyses, chronologies, historical documents, and interviews from the apartheid and post-apartheid eras.
ANC discussion paper on the issue of negotiations
16 June 1989
1.. Once more the question of a negotiated settlement of the SA question is being raised with growing insistence. It is therefore necessary that the ANC and the democratic movement as a whole should discuss this issue in order to arrive at a common view.
2.. Various factors in world politics have brought this matter to the fore. Internationally there is a tendency towards détente and relaxation of tensions. This proves is accompanied by serious efforts to resolve outstanding problems through negotiation.
3.. In addition to the issues of nuclear disarmament and the reduction of conventional forces that are subjects of negotiations by the Nato and Warsaw Pact countries, efforts are also being made to address the matter of regional conflicts. This process has, in varying degrees, affected such areas as Central America, Western Sahara, the Middle East, Afghanistan, Cambodia, Sudan, Ethiopia and South Western Africa.
4.. The Pretoria regime has participated in the negotiations concerning South Western Africa and is party to the execution of the agreements arrived at, which involve the withdrawal of the South African army of occupation and the Cuban internationalist forces from the People's Republic of Angola as well as the implementation of the UN plan for the independence of Namibia. The fact of these agreements is wrongly viewed by many sectors in world politics as proof that the South African regime is committed to the resolution of conflict by negotiation.
5.. These sectors also view the change of leadership in the National party, with FW de Klerk replacing PW Botha, as signaling the possibility of a change of policy as a result of which the Pretoria regime would enter into negotiations to end the apartheid system. Furthermore, to encourage this view, leading spokespersons of this regime has been making various statements suggesting that they are ready to enter into negotiations to end the system of white domination.
6.. There is also recognition of the fact that the apartheid system is immersed in a deepening political and economic crisis from which it cannot extricate itself. The assumption is therefore made that these objective conditions themselves oblige the Pretoria regime to seek a way out through negotiations with the genuine representatives of the people of South Africa.
7.. It is in the light of this overall international, regional and national situation that various forces raise the matter of a negotiated resolution of the South African question as an issue that should be put on the agenda now. The new US Assistant Secretary of State for Africa, Herman Cohen, has stated publicly that during his tenure of office he will pay daily attention to this question. British Prime Minister, Margaret Thatcher, is engaged in a series of discussions with apartheid cabinet ministers with the same objective in mind. Even the chairman of the Frontline States, President Kaunda, has called for negotiations now, which could possibly include a reconstituted Eminent Persons Group which would work with the Frontline States. The European Community countries have publicly rejected calls by the Frontline States to impose new sanctions against apartheid South Africa, arguing that FW de Klerk should be given a chance.
8.. The reality we face, therefore, is that all manner of forces, both within our country and internationally, will be taking various initiatives on the issue of negotiations. These initiatives will, among other things, seek to set parameters for such negotiations, including such questions as the aim of the negotiations and who should sit around the negotiating table. For example, Mrs Thatcher has already said that the principle of one person one vote should be applied in such a manner as recognizes the existence of 'groups'. She has gone on to say that the Pretoria regime would have to negotiate with the leaders of all groups. In this context, she has specifically mentioned such people as Gatsha Buthelezi. It is clear that the British government will seek to propagate these views throughout the world and seek their acceptance by the largest possible number of countries, to the exclusion of views that might emanate from the ANC and the democratic movement of our country.
9.. It has, however, always been our view that the resolution of the South African question is, first and foremost, the responsibility of the people of South Africa, supported by the international community. In this regard it is therefore clear that it should be the people of South Africa who set the parameters for any process of negotiations affecting our country.
10.. Already in October 1987, the National Executive Committee of the ANC put out a statement on the issue of negotiations. Among other things, that statement spelt out what the apartheid regime would have to do to create a climate conducive to negotiations, including the release of political prisoners, the unbanning of organizations, the withdrawal of troops from the townships and ending the state of emergency. It stated that the aim of negotiations should be to transform South Africa into a united, democratic and non-racial country. It addressed other questions such as the termination of the armed conflict and the duration of the negotiations.
11.. The question that has now arisen is whether there is a need to have a look at this statement with a view to its expansion by the incorporation of other elements.
12.. This is particularly important in the light of what we have stated above, that various forces internationally are working on detailed plans concerning the issue of a negotiated settlement of the South African question. It should also be expected that the Pretoria regime itself is involved in discussion further to elaborate its negotiating plan, which has always pursued the objective of co-opting the oppressed so that they act as partners in the perpetuation of the system of white minority domination.
13.. Among others, the regime has already addressed the question of the preconditions for negotiations by insisting that the ANC must, first of all, renounce the armed struggle and prove over a period of time that it has indeed abandoned this form of struggle. It has stated that the aim of the negotiations should be to produce an arrangement whereby, according to the language of the regime, no group dominates the other. It has passed legislation enabling it to create its negotiating mechanism, which it calls a National Council. This scheme visualizes that the apartheid State President would preside over this process as a 'neutral' person and that any agreement arrived at by this Council would have to be endorsed by the apartheid tri-cameral parliament. The regime is looking at these and other elements of its 'negotiating' strategy to take the initiative into its hands by ensuring that it sets the agenda for negotiations.
14.. As a revolutionary movement, it is however our task and responsibility that we should, at all times, keep the initiative in our hands, particularly with regard to strategic questions. The issue facing us is how to keep the initiative in our hands on this strategic matter of negotiations. What positions should be elaborate to ensure that it is our opponent who is forced to respond to us and not the other way round? Clearly, as a revolutionary movement, we cannot afford to tail behind the regime and allow ourselves to fall into a defensive posture, with the regime maintaining the offensive.
15.. Part to the answer of this question must be that we ourselves should elaborate our positions on various questions concerning negotiations and set the agenda on this issue so that we give no opportunity to the apartheid regime and its international allies to impose on us and the people a process that would be designed to safeguard the interests of the racist minority.
16.. In this context we would therefore have to address such issues as the aim of any negotiations, the preconditions for genuine negotiations, the nature of the mechanisms for negotiation and therefore the question who would sit at the negotiating table, the cessation of hostilities by both sides, the possibility of the formation of a transitional government, the duration of the negotiations and the role of the international community in any negotiated resolution of the South African question.
17.. Discussion of the whole question of negotiations in no way affects, and should not affect, the overall strategic orientation of our movement and the tasks that arise from that orientation. Our strategic task is the destruction of the apartheid regime and the transfer of power to the people. This we seek to achieve through mass political action, armed struggle, the international isolation of the apartheid system and by ensuring that the ANC plays its proper role as the revolutionary vanguard of our struggling people.
18.. The issue of negotiations has arisen precisely because of the advances we have made on all these fronts which have led to the emergence of the crisis of the apartheid system to which we have referred. We must continuously intensify our offensive on all these fronts with the sole aim of transforming South Africa into a united, democratic and non-racial South Africa. At the same time, we must be ready to deal with all consequences of our victories. One of these consequences may be, as has been the case in all the countries of Southern Africa where the liberation movements took up arms, that at a certain point the enemy might decide that it is ready to talk seriously.
19.. We must therefore treat the issue of negotiations as one that also involves struggle, a struggle by other means and a struggle that is a continuation of our offensive for the fundamental transformation of our country. Such positions as may emerge in the course of our discussions should therefore be such that they strengthen our overall offensive and defeat all attempts to disarm us and immobilize the people. | <urn:uuid:2766102a-a014-44b0-8872-4c81a0dcedb6> | CC-MAIN-2024-10 | https://omalley.nelsonmandela.org/index.php/site/q/03lv03445/04lv04015/05lv04016/06lv04035/07lv04036.htm | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00658.warc.gz | en | 0.968778 | 1,936 | 2.9375 | 3 |
Computer-generated volume holograms (CGVHs) are gradient refractive index (GRIN) devices that consist of a superposition of multiple periodic diffraction gratings. Fabrication of these components for the visible range is difficult due to the small length-scale requirements but is more tenable in the terahertz (THz), as the length scales become more practical (≥ 10-5 m). We successfully utilized polymer-based 3D additive rapid-prototyping technology to fabricate, to our knowledge, the world's first 3D THz CGVH in approximately 50 minutes, using $12 of consumables. This demonstration suggests that this technique could be extended to fabricate THz volumetric optics with arbitrary electromagnetic profiles.
ASJC Scopus subject areas
- Atomic and Molecular Physics, and Optics | <urn:uuid:8b04f4bc-339a-434b-b0d3-4582614738f3> | CC-MAIN-2024-10 | https://experts.arizona.edu/en/publications/direct-rapid-prototyping-fabrication-of-computer-generated-volume | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00658.warc.gz | en | 0.87066 | 171 | 2.921875 | 3 |
What is the Lottery?
The lottery is a process whereby people pay for a ticket and have a chance to win a large sum of money. It is a form of gambling that is often organized by governments. Prizes can range from a few dollars to millions of dollars. The winner of the lottery is chosen through a random selection. Some states and countries have laws against the lottery, but others endorse it as a way of raising funds for public projects. In the United States, lottery games are often operated by state or local government agencies. The word lotteries comes from the Middle Dutch word lot meaning “fate” or “choice.”
The earliest recorded lotteries were held in the 15th century in the Low Countries, where towns would hold public lotteries to raise money for town fortifications and poor relief. The English word lottery is derived from the Dutch noun lot, which means “fate” or “choice.”
In the early days of modern lotteries, prizes were small and not very frequent. However, as demand grew, and technology improved, prizes increased in size and frequency. Now, some states offer multiple drawings daily. Each drawing has a different prize amount. In addition, there are now electronic and computerized lotteries that let players select numbers electronically rather than by hand.
There are also many charitable lotteries that award non-monetary prizes such as goods or services to charitable organizations. These are popular in the United States and around the world.
In order to participate in a lottery, one must purchase a ticket for a specific period of time and then hope to win the jackpot prize. The chances of winning are very slim, but there is always the possibility.
Some people have an inexplicable urge to play, especially when they see the enormous jackpots advertised on billboards along the highway. Others say they feel a sense of obligation to support their state or community. In the immediate post-World War II period, the lottery was widely hailed as a way to expand social safety nets without particularly heavy burdens on the middle and working classes.
The short story Shirley Jackson’s Lottery reveals that even a small, seemingly peaceful village can develop its own group dysfunction. As a result, some individuals may become outcasts and be blamed for the group’s problems. This dynamic also appears in many workplaces and church groups.
In the story, Mr. Summers, the man representing authority in the community, holds up a black box. He then begins to draw papers from the box. When the boy from the Hutchinson family draws, he discovers that this is not just any ordinary lottery. This particular lottery is to select a victim among the town’s residents to be stoned to death. This is a very disturbing depiction of how a social norm can be corrupted. The message is that people must be willing to stand up against their communities when they find them unjust. | <urn:uuid:77e58426-6f88-4a33-b32a-a859bfee1c81> | CC-MAIN-2024-10 | https://studiosebastienleon.com/what-is-the-lottery-5/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00658.warc.gz | en | 0.976734 | 602 | 3.046875 | 3 |
Last updated on August 25th, 2023 at 12:31 pm
Jovibarba heuffelii, commonly known as heuffel’s houseleek, jovibarba heuffelii, beard of Jupiter, or beard of Jove, is an attractive perennial succulent that makes an excellent addition to any succulent collection.
Native to the mountains of the Western Alps, Jovibarba heuffelii only grows in the rocky cliffs and crags above 2,000 meters of elevation, which makes growing it indoors a challenge if you live at lower elevations. It grows well in pots, however, as long as they are large and have adequate drainage.
Jovibarba heuffelii is an odd succulent that can be grown indoors or out but prefers cold and moist winters with full sun exposure during the rest of the year. It can tolerate drought conditions but will not grow as large as it could in more moderate climates.
This plant does have some special care requirements, however, that makes it much harder to grow than most other succulents.
Sempervivum heuffelii, also known as Hen and Chicks or Houseleeks, comes from the Crassulaceae family of succulents and flowers. They were introduced to England in the late 1700s by an English gardener named John Heuffel who tended the grounds of the Leopold I, Prince of Anhalt-Dessau’s castle at Heidelberg, Germany.
Origin and distribution
Sempervivum heuffelii is an Alpine species native to Mediterranean regions of Europe, including France, Italy, and Spain. This succulent plant typically grows in rocky areas at high elevations and can withstand exposure to temperatures as low as 25 degrees Fahrenheit.
Jovibarba heuffelii are also commonly called beard of Jove or beard of Jupiter due to their resemblance to a beard. These hardy plants prefer full sun and should be planted outdoors in well-drained soil.
A beard of Jove will grow quickly if given adequate sunlight, but it’s important to note that direct sunlight may cause its leaves to turn brown or bronze. As long as it receives enough light for photosynthesis, your beard of Jove will thrive indoors year-round.
Sempervivum heuffelii propagation
Sempervivum heuffelii is easy to propagate, as long as you have some time on your hands.
If you’re looking for a succulent that will grow slowly but steadily, then look no further! This beauty is ideal for even beginners who are just getting started in gardening.
Sempervivum heuffelii or The Beard of Jupiter is a succulent, so it needs to be propagated via cuttings. To do so, take 6-inch stems and remove any leaves and flower buds on them. Then, put those stems in a glass of water until roots begin to grow at the base of your cuttings.
After they’ve grown their roots, transplant your sempervivums into pots with well-draining soil. Water regularly, but not too much; overwatering can cause rot.
You can also propagate jovibarbas by division. Just like all plants, sempervivums need sunlight for photosynthesis to occur. However, if you want to keep your plant healthy indoors year-round, you’ll need artificial light sources like fluorescent bulbs or compact florescent bulbs.
As far as temperature goes, keep your plant somewhere between 50 and 75 degrees Fahrenheit during its active growing season, and somewhere between 45 and 55 degrees Fahrenheit during its dormant period in winter.
The best part about sempervivums is that they look great when displayed in hanging baskets! It may seem counterintuitive to place a plant that likes shade outdoors in direct sunlight, but hang your basket from an overhang outside or near a south-facing window and you should have no problem keeping it alive through most of the summer. The light will even help give it more color!
Sempervivum heuffelii care information
Jovibarba heuffelii, commonly known as houghton’s hen and chicks or bearded Jovibarba, is a perennial flowering plant native to South Africa. It is a succulent evergreen that grows best in areas with hot summers. Jovibarba heuffelii requires plenty of sun and well-drained soil in order to thrive. The plant thrives in both sandy and loamy soils but does not do well in poorly drained areas that are overly moist.
Sempervivum heuffelii need full sun, and at least six hours of light a day. They prefer indirect light in winter and semi-shade in summer. If you’re growing them indoors, place them near a south-facing window with bright but indirect sunlight.
If you have enough space outdoors, consider planting your sempervivums in an area that gets both morning and afternoon sun, you can also try moving them around to find their ideal spot.
Sempervivum prefers soil with a pH of 6.1 to 7.5, which can be achieved by mixing sand or perlite into your potting mix. If you’re planting in a rock garden, make sure to choose one that mimics these conditions as closely as possible. In addition, it likes well-drained soil and lots of sun.
Always keep your Sempervivum heuffelii moist, but never waterlogged. It is ideal to use a well-draining potting soil and make sure your container has excellent drainage. You will want to water them lightly every few days in warm weather and more frequently when in bloom or during winter months when they are less active, but do not let them dry out completely between watering.
Be careful not to overwater as it can cause root rot and kill it if left unchecked. If you have overwatered, allow it to dry out some before watering again. If you have underwatered, increase the frequency of watering until the plant recovers.
Sempervivum heuffelii is a slow-growing species, so it’s not necessary to fertilize your plants. Simply use an all-purpose indoor plant fertilizer applied once per month when watering. Most sempervivums prefer slightly acidic soil, though they can survive in a range of growing conditions.
Always use caution and dilute any chemicals or fertilizers before using them on succulents, especially if you are using something other than what is suggested on the label.
Sempervivum heuffelii require 60-70 degrees Fahrenheit during the day and 50-60 degrees at night. It is best to keep these succulents outside in the summer months, but if your home or office is too warm, they can also be kept inside.
You can put them on a window sill or give them indirect light. However, if you do decide to bring them indoors, make sure to provide enough sunlight in your space so they don’t lose their color and stay healthy.
Sempervivum heuffelii is a succulent plant and requires lots of moisture, but also needs to be kept in very well-drained soil. The key is to find a happy medium, not so dry that they shrivel up or so wet that they rot. Place them in a spot with some humidity, such as near an open window or on top of a radiator, but make sure not to overwater them.
The ideal humidity range is between 50 and 70 percent. You can measure your own home’s humidity by using a hygrometer, which you can purchase at any hardware store. If you live in an area with low humidity, such as a desert or arid climate, consider placing your plants on top of a pebble tray filled with water.
Once Sempervivum heuffelii has rooted and sprouted new leaves, begin to trim back long stalks by half. Continue trimming, making sure you don’t leave too little growth to support each plant. If a stalk grows back in a short or weak way, you should remove it completely.
Over time they will fill in nicely and resemble a bushy beard of Jupiter! It is normal for Sempervivum heuffelii plants to produce runners with smaller plants on them; these can be removed once established.
If you notice that one is not thriving, you can cut it off at its base. The plant may go into shock for a few days but will grow back quickly if cared for properly. Be careful not to break off any of your leafy tips when pruning your plants; just pinch off any unwanted growth at ground level and let them do their thing!
When to repot
Sempervivums, sometimes referred to as hen and chicks, require repotting every year. During its first season, repot your Sempervivum into a larger container with fresh potting soil. In subsequent years, move it to a slightly larger pot each time you repot it until it reaches a 4-inch diameter pot size.
The best time to do so is in springtime when growth begins and in early summer when you notice your plant getting crowded in its pot. If you don’t want to repot your Sempervivum every year, then use an extra-large pot for it in its first season. This will allow for root growth without crowding later on.
Sempervivum heuffelii plants are rosette-forming succulents that grow in clumps. They are usually evergreen and many have thick, waxy leaves. In late summer through fall they should be given a long dormancy period so they can build up energy reserves for winter. This can be done by withholding water until new growth ceases and then withholding water throughout winter.
During their dormant period, they need little light or none at all. The best place to store them is an unheated garage or basement where temperatures will remain stable but not freeze.
If you cannot provide these conditions, consider storing them in a pot with vermiculite or perlite and keep them somewhere cool but not freezing such as an unheated attic or closet with no light at all.
Sempervivum heuffelii flower & fragrance
Jovibarba heuffelii is most often used in rock gardens or gravel beds. It grows from rosettes of fleshy, succulent leaves and produces deep-pink or white flowers throughout summer. The sempervivum flower is a tiny cup-shaped bloom with 5 petals and numerous stamens.
This succulent is a slow grower, with a growth rate of about an inch per year. They do not require much water or nutrients and will live many years if properly cared for.
Do not handle jovibarba heuffelii with bare hands, since it is highly toxic. If your skin comes in contact with sempervivum heuffelii, wash your hands immediately and thoroughly. If you do come into contact with jovibarba, see a doctor right away. Keep people and pets away from jovibarba to keep them safe and healthy as well.
USDA hardiness zones
Sempervivum heuffelii thrives best in USDA hardiness zones 3-9. While it can survive colder temperatures, it will not thrive or bloom at these temperatures. If you live in a zone that is too cold for Sempervivum heuffelii, consider growing other succulents such as Echeveria or Crassula instead.
Pests and diseases
While jovibarba have been known to suffer from red spider mites, aphids, and powdery mildew, there are many techniques to prevent these threats. Jovibarba is tolerant of many light conditions as long as it’s not in direct sunlight for most of the day.
Keeping them moderately moist will also help to deter pests. If you do notice signs of infestation, remove infested leaves or stems immediately, clean up your potted plants and avoid overwatering.
Sempervivum heuffelii, also known as hen and chicks, are one of the most beautiful types of succulents. They are versatile plants that can be grown indoors in a pot on a windowsill and kept dry during winter, or outdoors in a rock garden under suitable conditions. Sempervivum heuffelii is exceptionally easy to grow, with only minimal care requirements necessary for survival indoors. | <urn:uuid:fe72d860-d595-46a9-b30f-eb82f43c67c8> | CC-MAIN-2024-10 | https://whenyoumatter.com/sempervivum-heuffelii/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00658.warc.gz | en | 0.939705 | 2,654 | 2.78125 | 3 |
Indian Legal System
NAME AKASH YADAV 20LL10 A
India has the oldest judiciary in the world. No other judicial system has
a more ancient or exalted pedigree.
The present judicial system of India was not a sudden creation. It has
been evolved as the result of slow and gradual process and bears the
imprint of the different period of Indian history.
The judicial system deals with the administration of the laws through the
agency of the courts. The system provides the machinery for the
resolving of the disputes on account of which the aggrieved party
approaches the court.
Indian law refers to the system of law which operates in India. It is
largely based on English common law. Various Acts introduced by
the British are still in effect in modified form today. Much of
contemporary Indian law shows substantial European and American
Law is a set of rules recognised by the state in the administration of
justice, which governs the government, the relation between the
government and its citizen and also the relation between the citizens.
Manu’s Manusmriti, Brihaspati’s Dharma Shastra's, Narada the Smritis, and Kautilya the
Arthshastra were considered as the Ancient texts of law.
Civil judicial proceeding in ancient India
As at present commenced ordinarily with the filing of a plaint or what was known as Purva
Paksha before a competent authority.
Written statements known as Uttara Paksha were required to be filed by the defendants and the
rules enjoined that they must not be vague and must meet all the points of the plaint.
Normally, parties were required to produce their witnesses.
Different modes of proof for substantiating allegations were prescribed.
On the conclusion of the trial, judgment known as Nirnaya was pronounced and the successful
party became entitled to Jayapatra or a document of success, Execution of the decrees could
entail imprisonment, sale, fine and demand for additional security.
Criminal judicial proceeding in ancient India
In criminal law there was an elaborate classification of offences. Apart from offences like
rape, dacoity and the like, there were other offence like not running to the rescue of another
person in distress.
Punishment was prescribed for causing damage to trees in city parks, to trees providing
shades, to trees bearing flowers and fruits and to trees in holy places.
It was an offence for a judge to give a wrong decision out of corrupt motive.
Perjury by a witness attracted severe penalty.
There were six types of punishment, namely, fine, reprimand, torture, imprisonment, death
Theft was classified into three kinds according to the value of the thing stolen.
Manu prescribed the following oath for parties and witnesses:
“Let the Judge cause a
Brahmin to swear by his truth or sat, a Kshatriya by his chariot or the animal he rides or by
his weapons, a Vaishya by his cattle, grain and gold, and a Shudra by imprecating on his
head the guilt of all grievous offences”.
According to Brihaspati Smiriti, there was a hierarchy of courts in Ancient India beginning
with the family Courts and ending with the King. The lowest was the family arbitrator. The
next higher court was that of the judge; the next of the Chief Justice who was called
adhyaksha; and at the top was the King’s court.
The jurisdiction of each was determined by the importance of the dispute, the minor
disputes being decided by the lowest court and the most important by the king. The decision
of each higher Court superseded that of the court below.
A very strict code of judicial conduct was prescribed for the king. He was required to decide
cases in open trial and in the court-room, and his dress and demeanour were to be such as not
to overawe the litigants.
He was required to take the oath of impartiality, and decide cases without bias or attachment.
According to Katyayana: "The king should enter the court-room modestly dressed, take his
seat facing east, and with an attentive mind hear the suits of his litigants. He should act under
the guidance of his Chief Justice (Praadvivaka), judges, ministers and the Brahmana members of
his council. A king who dispenses justice in this manner and according to law resides in
According to Brihaspati: “A judge should decide cases without any consideration of personal
gain or any kind of personal bias; and his decision should be in accordance with the procedure
prescribed by the texts. A judge who performs his judicial duties in this manner achieves the
same spiritual merit as a person performing a Yajna”.
The strictest precautions were taken to ensure the impartiality of judges. A trial had to
be in open court and judges were forbidden to talk to the parties privately while the suit was
pending because it was recognised that a private hearing may lead to partiality
Another safeguard of judicial integrity was that suits could not be heard by a single judge,
even if he was the king. Our ancients realized that when two minds confer, there is less
chance of corruption or error, and they provided that the King must sit with his counsellors
when deciding cases, and judges must sit in benches of uneven numbers.
Corruption was regarded as a heinous offence and all the authorities are unanimous in
prescribing the severest punishment on a dishonest judge. Brihaspati says: “A judge should
be banished from the realm if he takes bribes and thereby perpetrates injustice and betrays the
confidence reposed in him by a trusting public”.
It is the period of Islam Kings and Sultans. The sovereignty in Muslim state essentially
belonged to the god. The administration of justice was regarded by the Muslim kings as a
religious duty. They considered themselves as God’s humble servants.
Shershah considered justice as the most excellent of religious rites.
Jahangir regarded daily administration of justice in public as one of his most sacred duties.
Shahjahan once remarked as justice was the mainstay of his government.
Quran was considered as the main text of law.
Quazis were appointed to assist the king in administration of justice and they held the office
till the pleasure of the king.
set the standards. He said in the Quran, "Justice is the balance of God upon earth in which things
when weighed are not by a particle less or more. And he appointed the balance that he should not
transgress in respect to the balance; wherefore observe a just weight and diminish not the
Individual Sultans had very high ideals of justice. But unfortunately the administration of justice
under the Sultans worked fitfully. The reason was that the outstanding feature of the entire
Sultanate period was confusion and chaos. No Sultan felt secure for a long time. One dynasty
was replaced by another within a comparatively short period, and the manner of replacement
was violent. Consequently the quality of justice depended very much on the personality of the
juristic thought in Arabia or Egypt because no Indian Emperor’s or Qazi’s decisions was ever
considered authoritative enough to lay down a legal principle to elucidate any obscurity in the
Quran, or supplement the Quranic law by following the line of its obvious intention in respect of
cases not explicitly provided for by it. Hence, it became necessary for Indian Qazis to have at their
elbow a digest of Islamic law and precedent compiled from the accepted Arabic writer.
After the conquest of Bengal by the British the process of replacement of the Mughal system of
justice by the British began. But it took a long time.
The Mughal judicial system has left its imprint on the present system, and a good part of our legal
terminology is borrowed from it. Our civil courts of first instance and called Munsifs, the plaintiff
and the defendant are termed Muddai and Muddaliya and scores of other legal terms remind us of
the great days of the Mughal Empire.
The system of administration of justice and laws we have today are the product of British rule in
Not less than 4 Law commissions and committees were appointed by the British rulers during
1834-1947 to give shape to the system.
The common law system means the system of law based on recorded judicial precedents came in
to India with the British East India Company.
The company was granted charter by King George I in 1726 to establish Mayor’s Court in
Madras, Bombay, and Calcutta.
Following the first war of Independence in 1857 the control of company territories in India
passed to the British crown.
The next big shift in the Indian legal system was the establishment of Supreme Courts replacing
the existing Mayor’s courts.
The doors of newly created SC were closed to the Indian practitioners, right of audience was also
limited to the members of English, Irish and Scottish professionals. Later the Legal Practitioners Act,
1846 which opened up the profession regardless of nationality or religion to all.
These courts were later converted in to the first High Courts through letters of patent authorised by
the Indian High Courts Act passed by British parliament in 1862.
During British Raj the Privy Council acted as the highest court of appeal. Cases before the council
were adjudicated by the house of lords.
Coding of law also began with forming of the first law commission. The IPC was drafted, enacted and
brought in to force in 1862.
The CrPC also was drafted by the same commission.
Later in 1937 the Federal court was established at Delhi under the provisions of Government of India
Act 1935 with original, appellate and advisory jurisdiction. The court was in function till 1950.
The right of appeal from the decisions of the federal court was granted to Privy Council in London.
There are certain sources of law from which the rules of conduct came in to existence and
derived the legal and binding force. They are namely;
Precedents: These are the judgements passed by some of the learned jurists.
Customs: It is a rule or a law which is not written, but is established by long use of a particular
class, family, section, district or tribe and obtained the force of law.
3. Legislations: It is the direct or primary source of law framed by the parliament or state
International agreements and treaties.
Law of Tort
Law of Contract
Law of Property
A State consists of three organs, the legislature, the executive and the judiciary. The
courts have by and large enjoyed high prestige amongst and commanded respect of the
people. This is so because of the moral authority of the courts and the confidence the
people have in the role of the courts to do justice between the rich and the poor, the
mighty and the weak, the state and the citizen, without fear or favour.
Judiciary is a part of the democratic process. Judiciary not only administers justice, it
protects the rights of the citizens and it acts as the interpreter and guardian of the
constitution. The judiciary enjoys the power of judicial review by virtue of which the
judiciary decides the constitutional validity of the laws enacted or of the decree issued.
It can invalidate laws and decrees which are not constitutional. The justice system is
the mechanism that upholds the rule of law. Our courts provide a forum to resolve
disputes and to test and enforce laws in a fair and rational manner. The circumstances
of any particular case may result in a modification or refinement of the law and its
The judicial system provided by the Constitution of India is comprised the three type of courts. At the
top, it is Supreme Court, at middle the High Courts and at bottom the subordinate Courts in
addition to the Constitution, there are other laws and rules which direct the composition, power and
jurisdiction of these courts.
Supreme Court of India: It is the highest court of the land seated at New Delhi, comprised of one
Chief Justice twenty other judges ( at the time of constitution). Now there are 29 sitting judges
against the maximum possible number of 31 (A. 124(1)).
The CJI is appointed by the President of India. Every other judge of the Supreme Court shall be
appointed by the President of India after consulting the CJI (A. 124(2)).
According to A. 124(3) Qualification to be appointed as judge is that he should be citizen of India,
should have been Judge of High Court for at least five years or an advocate of High court for at least
10 years or is in the opinion of the President a distinguished jurist.
Tenure: As per A. 124(4), the Judge of Supreme Court holds office up to the age of sixty five years
unless he resigns earlier or removed on the ground of proved misbehaviour and incapacity by
Jurisdiction of SC: The jurisdiction of Supreme Court is classified as under;
Original Jurisdiction: According to Article 131the Supreme Court has exclusive original
jurisdiction to hear dispute between;
The Centre and the States or the States interest
One or more states and centre
Issues relating to enforcement of Fundamental Rights( Article 32).
2. Appellate Jurisdiction:
Article.132: It can hear appeal against the decision every High Court on the granting of
certificate by the High Court if substantial question as to the interpretation of the Constitution is
Article.133: In a civil case a substantial question of law of general importance involved and the
High Court thinks that the question needs the decision of the Supreme Court or in a criminal
case is fit one to be hear by the Supreme Court.
Article.134: The Supreme Court can hear the criminal appeal even without the certificate of
High Court against a decision of a High Court in which death sentence has been pronounced
after reversing the acquittal order passed by the lower Court or after withdrawal of case from the
Article.136: It also enjoy extra ordinary jurisdiction to allow an appeal in any matter against the
decision of any court or tribunal by way of special leave petition except the tribunals
concerning Armed Forces.
The Supreme Court can transfer or withdraw the cases from any High Court. It can review any
judgment pronounced or order made by it. The law declared by the Supreme Court is binding on
all courts within India.
It can make its own rule of government with the approval of the President.
It is a Court of record and has power to punish in contempt of it.
3. Advisory Jurisdiction (Article 143)
The Court can report to the President its opinion about a question of public importance referred
to it by the President.
Chapter V of part VI of the Constitution contains the provisions regarding the High Court.
There is to be High Court for each state or one High Court for more than one State. There are the
judicial Commissioner Courts in the Union Territories of Manipur, Goa and Tripura. The High Court
can be established for Union Territories.
Appointment: The Judges of a High Court are appointed by the President after consulting the Chief
Justice of India, the Governor of the concerned and the Chief Justice of the concerned High Court.
Number of Judges: The number of judges of a High Court is fixed by the President from time to time.
In this way, flexibility is maintained with respect to the number of Judges in a High Court which can
be settled by the Central Executive keeping in view the quantum of work before the Court.
Qualifications: A person to be eligible for appointment as a High Court Judge must be a citizen of
India and must either have held a judicial office in India for 10 years or been an Advocate of a High
Court for at least ten years.
Tenure : The Judges have a fixed tenure and they retire at the age of sixty two years. They cannot be
removed earlier except when the two Houses of Parliament pass an address on the ground of proved
misbehaviour or incapacity by a majority of not less than two thirds of the members present and
Court of Record: Each High Court is to be a Court of Record having the powers to punish for
contempt of itself (A. 215).
Writ Jurisdiction: Every High Court has power to issue various writs under Article 226 of the
Superintendence: Article 227 which authorize every High Court to have superintendence over all
Courts and Tribunals within its territorial jurisdiction. The High Courts thus occupy high
position of respect, dignity and authority in the Judicial System of India.
Article 226-A empowers the HC’s to check the validity of central and state laws.
Appellate Jurisdiction: it is the highest court of appeal in the state.
Power to punish for contempt.
Chapter VI under Part VI of the Constitution provides the provisions regarding subordinate
Below the High Court there is the Court of District Judge which is top court among subordinate
The appointment, posting and promotion of District Judge are made by the Governor of the
concerned State in consultation with the concerned High Court.
As regards eligibility for the post of the District Judge, a person not already in the service of the
Union or of the State shall only be eligible to be appointed as District Judge if he has been for not
less than seven years an Advocate or a Pleader and is recommended by the concerned High
Appointments of a person other than District Judges to the judicial service of the State shall be
made by the Governor of the State in accordance with rules made by him in that behalf after
consultation with concerned State Public Service Commission and with concerned High Court.
As regards control over subordinate courts, including the matters of posting , promotion, leave
etc., the concerned High court is vested with the power to have control over subordinate courts
but the High court is to exercise the control in accordance with the conditions of service under
the law applicable in relation to subordinate courts.
The Governor may by public notification direct the application of the provisions of Chapter VI of
the Constitution and the rules made there under on any class or classes of magistrates in the
concerned State subject to any exception or modification.
Generally, there are two types of legal cases- civil and criminal.
1. Civil litigation: Civil litigation is a lawsuit whereby a party seeks damages against another
party. The damages can come in the form of money or the modification of some type of conduct.
The first stage of civil litigation is the pleading stage. The pleading stage simply refers to the filing
of the complaint against the party that is the defendant. The next stage of civil litigation is
Discovery is simply the process of learning what evidence each side has regarding the dispute.
Once discovery comes to a close, the defendant will often file something known as a motion for
2. Criminal litigation: The criminal justice process typically begins when a police officer places a
person under arrest. After a criminal suspect is arrested, the next steps in the case are the
processing of the person into police custody and a determination of his/her eligibility for release
from custody in exchange for the posting of a set amount of money (bail).
After a criminal defendant is formally charged with a crime, the case proceeds to the trial phase.
After a defendant is convicted or pleads guilty, a judge will decide on the appropriate
punishment/sentence during the sentencing phase of a criminal case.
Sentencing for criminal offenses can range from probation and community service to prison and
even the death penalty. | <urn:uuid:3bdebc9e-b8ed-41ef-a257-5978c374ba7c> | CC-MAIN-2024-10 | https://ppt-online.org/1105008 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00658.warc.gz | en | 0.959248 | 4,139 | 3.484375 | 3 |
State codes and jurisdictional authorities are the ideal combination to ensure the proper implementation of GST throughout the country. Come, let us read all about it to know more.
GST is a tax that is prevalent in India. The tax was passed in the parliament on March 29, 2017, and has replaced many indirect taxes. The Goods and Services Tax Act is a multi-stage, destination-based, and is imposed on any value addition.
It is a tax that the recipient has to pay for using goods and services in the country. It is interesting to note that there were several existing tax laws before this in India. They have all been replaced by this single tax, GST State Codes.
In this article, we aim to find out how the state codes that have been assigned, and the jurisdictional authorities help in implementing the GST throughout the country. Without further ado, let us read to learn more.
What is state jurisdiction charge under GST?
The state jurisdiction of the GST is the area under which a particular officer has the authority to enforce the provisions. The officer or the proper authorities should ensure that the provisions of the Goods and Services Tax (GST) laws are properly enforced in the area.
The Jurisdictional Authorities in GST is normally divided into two levels, namely, the Central Level, and the State Level. At the state level, the state tax officer is in charge of enforcing the GST law in the state. Likewise, at the central level, the central tax officer is in charge of enforcing the GST law at the national level.
The authority needs to ensure that the taxpayers of the particular region or area that they are in charge pay their taxes regularly. The citizens of the area or region must comply with the provisions of the GST laws.
Moreover, the officers and the authorities need to conduct proper audits and do annual assessments. Besides, they may also be required to conduct investigations related to GST. This can help in the smooth transactions of the GST laws.
How do you find state jurisdiction under GST?
We read about the types of jurisdiction under GST in the above passage. We will read more on them to get a clear picture.
State jurisdiction is responsible for enforcing GST in their respective states. As you may know, every state in the country has its own GST department. The department is in charge of doing audits and, more importantly, registering the businesses based in the state, and obviously, collecting GST within their state.
The department has to ensure that there is transparency. If they feel that there are some suspected cases of non-compliance, then they should conduct audits and investigations.
Central jurisdiction is responsible for enforcing GST on a national level. The Central Board of Indirect Taxes and Customs (CBIC) is the authorized department to ensure that the GST is implemented throughout the country.
The CBIC has to formulate procedures, guidelines, and policies for the proper implementation of GST, and managing GST compliance. The central jurisdiction also includes the GST Council, which is in charge of making recommendations on key GST issues.
A few of them include revenue-sharing, tax rates, and exemptions between the central and state governments. We have provided you with the categorization of the GST jurisdictions in order of hierarchy and size.
- Commission rates
- Divisions Offices
- Range Offices
|Name of the states and territories
|Jammu and Kashmir GST Code
|Himachal Pradesh GST Code
|Punjab GST Code
|Chandigarh GST Code
|Uttarakhand GST Code
|Haryana GST Code
|Delhi GST Code
|Rajasthan GST Code
|Uttar Pradesh GST Code
|Bihar GST Code
|Sikkim GST Code
|Arunachal Pradesh GST Code
|Nagaland GST Code
|Manipur GST Code
|Mizoram GST Code
|Tripura GST Code
|Meghalaya GST Code
|Assam GST Code
|West Bengal GST Code
|Jharkhand GST Code
|Odisha GST Code
|Chhattisgarh GST Code
|Madhya Pradesh GST Code
|Gujarat GST Code
|Daman and Diu GST Code
|Dadra and Nagar Haveli GST Code
|Maharashtra GST Code
|Andhra Pradesh GST Code
|Karnataka GST Code
|Goa GST Code
|Lakshadweep Islands GST Code
|Kerala GST Code
|Tamilnadu GST Code
|Pondicherry GST Code
|Andaman and Nicobar Islands GST Code
|Telangana GST Code
|Andhra Pradesh (New) GST Code
Can we change state jurisdiction in GST?
Yes, you can change the state jurisdiction in GST. These things happen. If you chose the wrong jurisdiction when you were applying for the GST application, then you should get it corrected or rectified as soon as possible.
You can do that by issuing a separate submission of a request to change the details of jurisdiction. This can be done before the administrative or IT cell of the respective state. When you want to transfer your GST from one state to another state, then you can do so.
This may be due to a change in location or business address. When you have several companies that are based in several states, then you have to register in each state they operate. Each of the states where your business is in operation has a different tax method, hence they should be registered likewise.
Can GST of one state be used in another state?
You can also add state jurisdiction to GST by using the following steps:
- You have to log into the CBIC website at https://cbic-gst.gov.in/.
- Now, click on the ‘services’ option.
- Then click on the ‘know your jurisdiction’ option.
- Choose the state for which you are looking at a GST jurisdiction list.
- Now, choose the zone.
- You have the commissioner option.
- Select the division & range.
Which states are not GST applicable?
This is a piece of very crucial information for taxpayers. Because, if you belong to the states where GST is not applicable, then you do not have to pay. Hence, please make it a point to find out whether you belong to the state or not.
This is vital especially if you are running a small business. Moreover, if you are running & operating a small and medium-scale business, then you can enjoy GST exemptions. That is if your business turnover is up to a specified limit.
These limits are as follows:
- Businesses who are supplying goods can get GST exemption if the aggregate turnover is less than INR 40 lakhs per year. Besides, they do not fall under compulsory registration.
- For now, the limit has been revised up to INR 20 lakhs per year. This is for the North Eastern states and hilly regions of India.
- For businesses involved in the supply of services, if the turnover is less than INR 20 lakhs, then they can claim GST exemption.
- For businesses in the supply of services, based in North East India and hilly regions, in India that have an aggregate turnover of up to INR 10 lakhs, then they can also claim GST exemptions.
- The North East Indian states and hilly regions would include Himachal Pradesh, Uttarakhand, Arunachal Pradesh, Jammu and Kashmir, Meghalaya, Mizoram, Tripura, Nagaland, Sikkim, Assam, and Manipur.
The aggregate turnover, per year, means the aggregate value of all types of taxable supplies. They can also include the goods and services, which have been exported, inter-state supplies, and exempt supplies.
However, the following would be deducted from the value of aggregate turnover:
- The IGST is already paid by the investor, CGST, and SGST.
- Taxes to be paid based on the reverse charge mechanism.
- The value of the inward supply of goods and services.
- The value of non-taxable goods and services.
- GST exemptions for goods.
Here is a list of goods that do not have any GST on them. These were recommended by the GST Council.
Following are the reasons for granting exemption:
- Interest of the public.
- As per the GST Council’s recommendation.
- Granted by the Government through a special order.
- Allowed on specific goods through an official notification.
There are two types of GST exemptions on goods, which are follows:
- Absolute exemption is the supply of specific types of goods that are exempted from GST. The details of the supplier or receiver are not considered, and if the goods are supplied within or outside the state.
- Conditional exemption is the supply of goods that are exempted from GST subject to certain conditions specified under the GST Act.
GST exemption on services
There is also a GST exemption on services as well. They are as follows:
- Supplies that have a 0% tax rate.
- Supplies that do not attract CGST or IGST due to the provisions stated in a notification.
- Supplies defined under Section 2(78) of the GST Act.
- Types of supplies without any Input tax credit applicable and would not be available to set off the GST liability.
Under the supply of services, there are two types of GST exemptions. They are as follows:
- Absolute exemption as the service would be exempted from GST.
- Partial exemption where the exemption is granted based on a condition. The GST would be exempted if the total value received by a registered person is not more than INR 5000/day.
Also Read: Applicability and exemptions for GSTR-9
We have ended our discussion on the state codes and jurisdictional authorities, the Interplay of State Codes in GST. We learned about the state jurisdiction charge under GST, and how you find state jurisdiction under GST.
We also read about how to change state jurisdiction in GST, whether you can use the GST of one state in another state, and finally, the states are not GST applicable. We hope that this information was useful to you.
Please do the needful immediately. if you find something wrong in your GST filing.
What is the state jurisdiction charge under GST?
The state jurisdiction charge under GST states that 50% – 90% of the taxpayers who have a yearly turnover under Rs 1.5 crores come under the state administration. The remaining 10% of taxpayers come under the central administration.
How do I know my state jurisdiction in GST?
You can find out more about your state jurisdiction in GST by logging on to the CBIC website at https://cbic-gst.gov.in/. Now, you can click on the services option, and then click on the ‘know your jurisdiction.’
Choose the state for which you are looking for a GST jurisdiction list, then you have to choose the zone. Then you can make use of the commissioner option. Now, select the division and then select the range of your state jurisdiction in GST. This is how you can know your state jurisdiction in GST.
What is the jurisdiction of the state?
The jurisdiction of the state is the power of a state that has the ability to affect an individual, property, and circumstance as well. These things can happen under the territory. This can be exercised through judicial or executive actions.
Is state code mandatory for GST invoices?
The GST invoice should carry the name and the original address of the recipient. More importantly, the GST invoice should have the address of the delivery. It should also contain the state name and state code.
What is meant by tax jurisdiction codes?
The tax jurisdiction code is a smaller code that represents the province, state, or district. The code finds out the amount of tax that has been taken from a single transaction. This transaction must then go to each tax authority.
Can the GST of one state be used in another state?
A GST of one state can be used in another state. You can use it for doing business in any other state you want in India. Because the Goods and Services Tax (GST) has the ability to replace several indirect taxes charged by the central and state governments.
How is the jurisdiction of a tax authority defined?
The area that you reside in is the jurisdiction of the tax authority. For example, if you reside in Mumbai, then you come under the Mumbai tax authority. The jurisdictional assessing officer is an officer who works under the Income Tax Department, to oversee the area assigned to him.
How to correct a wrongly selected GST jurisdiction?
If you wrongly choose your GST jurisdiction, then you can rectify it with a separate submission of the request. This is something that you need to do before the administration of your state. Then you can change the details of the jurisdiction. | <urn:uuid:0970e1bf-4b11-4184-a49a-879c32d4987b> | CC-MAIN-2024-10 | https://www.captainbiz.com/blogs/state-codes-and-jurisdictional-authorities-interplay-in-gst/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00658.warc.gz | en | 0.937149 | 2,689 | 2.6875 | 3 |
Inside out: Climate change induced migration
Inside out: Climate change induced
Shobha Shukla, CNS (Citizen News Service)
Climate change greatly impacts the lives of migrants in different parts of the world. According to the United Nations, by 2050, up to 1 billion people could be driven away from their homes due to the worsening impacts of climate change. Both, sudden and slow onset weather events, affect the migrants.
Migrants face numerous challenges around their livelihood, safety, mobility and access to health/ and social services. Migrants are also impacted when climate changes affect their families back home, as they have to then provide increased financial support to their families to cope with the aftermath of such events.
However, these issues are not properly documented and migrants' voices are often not much heard. A workshop on understanding climate change and its impacts on migrants and their families was organised by the International Migrants Alliance (IMA) during the recently concluded International Solidarity Conference on the Rights of Climate Migrants (Beyond Labels, Beyond Borders), held in Philippines by Rosa Luxemburg Stiftung, IMA, Kalikasan and Asian People's Movement on Debt and Development.
Here is a snapshot of some examples of the causes and consequences of climate induced migrations shared by the participants.
RISING SEA LEVELS
A returning migrant from Saudi Arabia, Anisur Rahman Khan from Bangladesh, shared that an estimated 15 million Bangladeshis will migrate internally and externally by 2050 due to climate change. One major cause for internal migration in Bangladesh is the rising sea level.
Statistics show that rising sea levels will wipe out more land in Bangladesh than anywhere else in the world. As a result, rice production is expected to drop by 10% and wheat production by 30% by 2050. Many coastal areas will be submerged, forcing more people to migrate from rural to urban areas, which are already bursting at the seams. Food, housing and drinking water insecurity are the major emerging problems that the government will have to deal with.
Reverend Emmanuel Chikoya from Council of Churches in Zambia shared that nature has blessed Zambia with huge deposits of minerals, which has attracted investors (or rather infesters as he prefers to call them) for extractive mining activities. This in turn has led to a massive reduction in forest cover due to felling of trees; contamination of underground water, making water unsafe for human consumption; and serious health hazards. Unplanned construction of dams is drying up the rivers. Even those who sacrificed their ancestral land for construction of electricity plants, are not the beneficiaries of the electricity generated. All this has resulted in large scale displacement of people to areas which do not have even the basic necessities. To top it all, local communities lack the knowledge and expertise to negotiate with the multinational corporations, and more often than not are taken for a ride.
Of late, Zambia has been receiving much less rain which has adversely impacted food grain production. Focus on production of crops like tobacco, instead of food crops like maize, has added to the problem. In an exclusive interview given to CNS (Citizen News Service), Reverend Emmanuel said that: “All religious bodies, including the Church, can play an important role in protecting the climate. In Zambia, the Council of Churches believes in helping people to live a dignified life on this earth, rather than preparing them for a life after death. It is the primary mandate of the Church that all human beings must be good stewards of the natural resources given to us by God and use them responsibly. Increase in agricultural production has to go hand in hand with soil and environmental protection. Religion must not only remove myths and wrong perceptions, but also use the principle of 'love one another' to promote good practices, clean energy and clean environment."
TRIPLE TRAGEDY: EARTHQUAKE, TSUNAMI AND NUCLEAR MELTDOWN
Luisito Pongos from Asia Pacific Mission for Migrants (APMM) Japan who facilitated this workshop, reflected that one of the worst natural disasters that Japan experienced was an earthquake in 2011 that hit its north east region- which is called the rice bowl of Japan- followed by a devastating tsunami that also led to a nuclear accident at the Fukushima nuclear power plant. There were an estimated 22,000 deaths and more than 70,000 people, mostly migrants- 9000 of them being Filipinos- were affected. A large majority were marriage migrants- women of neighbouring countries legally married to Japanese men. Those who survived faced an acute shortage of food and shelter. Many migrants lost their documents, which resulted in losing their jobs and/or not being able to go back to their home country because they did not have their regular travel documents.
Even though the affected people were relocated to other safer areas, the disasters affected the livelihoods of many migrants settled in Japan, thereby also affecting their families in their home countries.
One silver lining has been the closure of several nuclear power plants in Japan. Currently only 9 out of the 54 nuclear power plants are in operation and the country is moving towards cleaner alternative energy sources, thanks to a strong people’s movement.
HUMAN ACTIVITIES ABET NATURAL DISASTERS
Eni Lestari and Iweng Karsiweng from Indonesia shared that Indonesia is a disaster prone country. In 2018 alone there were 5 big tsunamis and earthquakes. But no government support or compensation was given to the affected families to rebuild their lives. As many migrants working abroad came from 3 of the affected areas, it put them under an additional pressure to send more money back home to help their families.
Apart from adverse weather events, multinational corporations are adding to the problems. They have indulged in a lot of land grabbing in Indonesia. More than 300,000 hectares of forests have been burned down to make way for other lucrative businesses. This has led to high pollution levels resulting in severe respiratory health problems in the communities. The construction of numerous electric power plants is destroying the marine life of the oceans and forcing fisherfolk to migrate elsewhere. Also, large scale conversion of farmlands into palm oil plantations has depleted the water level and made surrounding areas dry, resulting in forced migration of people.
In 2013, Philippines suffered one of its greatest natural disasters when Typhoon Haiyan hit Tacloban and many other neighbouring cities. More than 7,360 people were dead or missing and some 4.1 million were displaced. Some of the survivors of Typhoon Haiyan had families living in Cavite. After Haiyan, the survivors’ families in Cavite planned to go back to Tacloban and help their relatives with reconstruction and rehabilitation. However, fearing the loss of his workforce, the Mayor of Rosario, a municipality in Cavite, offered to relocate the Haiyan survivors to Cavite instead. Isla Paglaum, a beach resort, was converted into a relocation site for the survivors. As of 2018, there are some 150 families living in this area together with a few families coming from other parts of Cavite.
THE WAY FORWARD
A common consensus that emerged from the discussions was the urgent need to conduct and document evidence based studies that investigate the effects of climate change on internal and external migration, and to engage with governments at local and regional level to come up with sustainable solutions that address the causes and effects of climate migration.
And let us not forget that, more often than not, human activities like uncontrolled mining, faulty urban planning, depletion of forest cover, unplanned construction of dams, are all perfect precursors to worsening weather conditions like droughts, floods, landslides, water and air pollution... the list is endless!
Political decisions are overriding the interests and safety of the majority of the people for the benefit of a select few. We need to have well-informed and knowledgeable citizens who can unite and #RiseUp to change mindsets and hold governments to account.
Shobha Shukla - CNS (Citizen News Service) | <urn:uuid:f644679e-0ea8-4716-b78c-605d3a6809de> | CC-MAIN-2024-10 | https://www.scoop.co.nz/stories/WO1909/S00148/inside-out-climate-change-induced-migration.htm | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00658.warc.gz | en | 0.963163 | 1,632 | 3.21875 | 3 |
There are many different types of malware and it is difficult to keep track of them all. It gets even more difficult when the malware stays under the radar. One of the longest active spyware, before it was discovered, is the Invisimole malware.
What is Invisimole?
As the name suggests, Invisimole is an invisible mole that is used for spying. While it is named spyware it combines the functionalities and features of a trojan, backdoor to do its actual work, spying. Invisimole is filled with a lot of well-equipped backdoors.
These backdoors allow attackers to peek into the compromised system. From webcam and microphone access, Invisimole also allows the attacker to edit files inside the system and spawn command shells among other functionalities.
Where Was it Found?
The first known discovery of Invisimole was in 2018. It was found in compromised Russian and Ukrainian systems. Even though it was
Aimed to target both the Russian and Ukrainian governments, the campaign was highly concentrated. The places of discovery hint at it being used strictly for cyber espionage.
Read More: NOTPETYA MALWARE: CYBER WORLD’S FOE
How Does it Work?
The Invisimole spyware consists of a wrapper DLL file. The resources also have feature-rich backdoor modules embedded in them. The backdoor modules come in play once a system has been infected.
The backdoor modules work analogously to a Remote Access Trojan. They enable the attacker to gain a huge level of control over the
The developers of the code have also taken extra measures to avoid grabbing the attention of the victim. This ensures the malware’s presence in the system for a long time. The malware is written in both 32-bit and 64-bit versions, making it functional on both architectures.
The lengthy dwell time for Invisimole made it difficult to understand the attack vector. It was thought to be done using a couple of different methods including spear-phishing or physical access to the infected systems. The concentration of the malware to just a few dozen systems make cybersecurity experts believe that there is no code to self-propagate.
Such access to the attacker can be frightening. Combining that with the sneaky approach makes Invisimole a dangerous malware. No one knows the amount of data that the attackers got from 2013 till 2018 when it was discovered.
Read More: The Manifestation of Malware
The Return of Invisimole
Invisimole made a return in June 2020. This time it was found in high profiles organizations in the military sector and diplomatic missions of Eastern Europe. The dwell time for this discovery was short and it was believed to be present since 2019. This also allowed cybersecurity experts to find the attack vector.
This discovery also allowed security researchers to understand how it spreads inside the system once it enters the system. It spreads across the network by exploiting the BlueKeep vulnerability in the RDP protocol and the EternalBlue vulnerability in the SMB protocol (Yes, the same one used by WannaCry).
The toolset was found to be updated this time around.
The Updated Version of Invisimole 2.0
The code has had updations from the original version which was running in 2013. It used DNS tunneling for a stealthier command and control communication (C2 communication).
The Concerns of Undetectable Spyware
Imagining an unknown entity being able to access your webcam and microphone without being caught for 5 years can be frightening. The impacts of such malware being used to spy and incite cyberwars between countries will bring a lot of changes to the world as we know it.
Interested to learn more about the big shots of other types of malware? Follow our blog to keep yourself updated with the latest trends in cybersecurity.
Contributors : Navaneeth S | <urn:uuid:0705d393-df36-4338-87e9-8891435446fa> | CC-MAIN-2024-10 | https://www.wattlecorp.com/why-invisimole-the-spying-malware/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00658.warc.gz | en | 0.941714 | 799 | 2.53125 | 3 |
Bonner, F. A., II, & Jennings, M. (2007). Never too young to lead: Gifted african american males in elementary school.Gifted Child Today, 30(2), 30.
Just within the past two decades, there has been a proliferation of a variety of literature, both academic and popular, regarding the underachievement and underrepresentation of African American males in U.S. schools. According to the literature, African American males have been disproportionately placed in special education classrooms and underrepresented in gifted and talented programs. Despite the efforts at broadening the definition to include multifaceted categories and criteria in the identification of giftedness, there is still a widespread underrepresentation of African American students in gifted and talented programs, by as much as 50% nationally. This article discusses the promise offered by one of the ability areas cited in the federal definition of giftedness–“leadership ability”–as a potential means of addressing the problem of underrepresentation. The article not only focuses on key mentoring initiatives, but also on promising national programs. The article concludes with practical recommendations for practitioners.
Full article can be found here: | <urn:uuid:7f1d607f-78b4-4f6c-8672-b94297e1dc37> | CC-MAIN-2024-10 | https://community.utexas.edu/black-male-education-research/2015/11/never-too-young-to-lead-gifted-african-american-males-in-elementary-school/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00658.warc.gz | en | 0.932546 | 241 | 3.609375 | 4 |
Stereotactic Ablative Radiotherapy (SABR) is an external beam treatment modality that delivers high precision large doses of radiation. In simple words, it is a way of giving Radiotherapy to precisely target cancer cells. It is a standard type of care in the treatment of early-stage non-small cell lung cancer. The aim of SABR is to stop the cancer cells from growing and shrink the tumor or completely destroy it.
In the process of SABR, many small and focused beams of radiation are directed from different angles that meet at the tumor. This implies that tumor gets high dose of radiation and lower the damage risk to normal cells. This treatment concentrates on using intense doses of radiation on a specific tumor site without causing any harm to the surrounding healthy tissues. The effectiveness and convenience offered by this method is responsible for growing interest in exploring SABR as treatment for patients with NSCLC.
SABR is used to treat the cancer that has started in the lung which is small in size. It is also recommended in cases where cancer has spread to another part of body such as lymph nodes, lung etc. This treatment method is suitable for the patient depending on the location of cancer, the size of cancer and whether it has spread to other parts of body or not. Usually, SABR is give in three, five or eight treatments on alternate days but number depends on the position of tumor and other factors.
The therapy is given by radiographers where minimum two attend each session. They work together to position you accurately so that during treatment, the machine moves around you and not actually touch you. Each session takes about thirty to forty-five minutes. Although SABR does not come with any serious health effects but some common side effects include fatigue, chest pain, shortness of breath etc.
The information shared in this blog is for educational purposes only. | <urn:uuid:b62ebf7e-b7bb-4b62-b3b4-8aaad777492b> | CC-MAIN-2024-10 | https://lungcancersymptomsx.com/sabr-for-inoperable-early-stage-nsclc.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00658.warc.gz | en | 0.960645 | 386 | 2.953125 | 3 |
The woodpecker is a fascinating bird that is known for its ability to peck at trees with great force. But just how fast can a woodpecker peck? How many times can a Woodpecker peck per second? It turns out that the answer to this question is quite impressive.
A woodpecker can actually peck at a rate of up to 20 times per second!
A woodpecker’s pecking strength is amazing. The bird can apply up to 12 times its body weight in force when it hits a tree trunk. It has been reported that a woodpecker can peck 20 times per second.
How Many Times a Minute Does a Woodpecker Peck?
Woodpeckers are known for their quick, repetitive pecking. But just how fast can they tap? A new study has found that the fastest woodpecker can peck 20 times in a single second.
That’s double the previous record, set by the ivory-billed woodpecker (Campephilus principalis), and makes this new record-holder. The yellow-bellied sapsucker (Sphyrapicus varius), is not only the fastest woodpecker but also one of the fastest animals on Earth when it comes to striking rate.
The findings were published in The Wilson Journal of Ornithology. To come up with their findings, researchers looked at high-speed video footage of seven different species of woodpeckers, including the yellow-bellied sapsucker.
They found that while all seven species could peck quickly, the yellow-bellied sapsucker was in a class of its own—striking up to 20 times per second.
Interestingly, even though the other six species didn’t come close to matching the sapsucker’s speed, they all had similar peak deceleration rates—around 10 Gs (10 times Earth’s gravity).
This suggests that there may be an upper limit to how fast a woodpecker can strike without seriously injuring itself.
How Fast Can a Woodpecker Make a Hole?
Assuming you are referring to the rate at which a woodpecker can drill a hole in a tree, the answer is approximately 15-20 times per second.
Why Does a Woodpecker Peck So Fast?
There are many reasons why a woodpecker pecks so fast. The most common reason is that the woodpecker is looking for food. Woodpeckers eat insects, and they use their beaks to drill into tree trunks to find them.
Pecking quickly allows the woodpecker to create a hole that is deep enough to reach the insects inside. Another reason why woodpeckers peck so fast is because they use their beaks to communicate with other woodpeckers.
When two woodpeckers meet, they will often tap their beaks together in a rapid rhythm.
This helps the woodpeckers communicate and figure out if they are friends or enemies. Lastly, some scientists believe that woodpeckers also use their quick pecking as a way to ward off predators.
How Many Times Does a Woodpecker Hit a Tree in a Second?
The answer to this question depends on the type of woodpecker. The smallest woodpeckers only tap their beaks against trees a few times per second, while the largest woodpeckers can peck up to 20 times per second.
What Happens When a Woodpecker Can’t Find the Food for a Long Time?
How Fast Does a Woodpecker Peck in Mph?
A woodpecker can peck up to 20 times per second. This means that they can hit their beak against a tree trunk at speeds of up to 12 mph!
Woodpeckers are known for their pecking abilities, but just how many times can they peck per second? A new study has found that the answer may be as high as 20 times per second.
The study, which was published in the journal PLOS ONE, looked at the speed of woodpecker pecks using a high-speed camera. The researchers found that the woodpeckers were able to peck at a rate of up to 20 times per second, which is much faster than previous estimates.
This study provides new insight into the amazing abilities of these birds and could help to explain how they are able to avoid head injuries from all of their pecking. | <urn:uuid:56259f4d-8bb9-467e-acbc-f7c63fe5dc20> | CC-MAIN-2024-10 | https://mybirdgarden.com/how-many-times-can-a-woodpecker-peck-per-second/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00658.warc.gz | en | 0.960688 | 926 | 3.25 | 3 |
A new study published by Trends in Ecology & Evolution indicates an animal’s ability to count helps it better understand specific circumstances including how to better understand how to reproduce and how to survive. As one example, researchers honed in on the behavior of elk.
Some prey animals adopt more sophisticated strategies: elk minimize predation risk by wolves by either living in small herds that are rarely encountered by wolves, or by gathering in large herds that reduces the chance that any particular individual will be the victim.
Seeking shelter among social companions has at least three distinct advantages. First, an individual reduces the risk of being predated upon as the number of individuals in the group increases, a phenomenon termed the ‘dilution effect’, or simply ‘safety in numbers.’ Second, a predator has a harder time singling out an individual that lives in larger groups, the ‘confusion effect.’ And finally, many individuals together have a higher chance of detecting a predator, termed the ‘many eyes effect.’
Other than elk and wolves, scientists focused on bees and frogs, among other species.
“Interestingly, we know now that numerical competence is present on almost every branch on the animal tree of life,” Andreas Nieder, neurobiologist at the University of Tuebingen, told UPI. “Different groups of animals obviously developed this trait independently from other lineages and that strongly indicates that it has to be of adaptive value. So the capability to discriminate numbers has to have a strong survival benefit and reproduction benefit.”
(Photo source: U.S. Fish and Wildlife Service) | <urn:uuid:8ffb44dc-88d4-47d0-b5b2-19e856abf961> | CC-MAIN-2024-10 | https://rmef-prod.eba-g4mzppwp.us-west-2.elasticbeanstalk.com/elk-network/study-animals-do-math-for-the-sake-of-survival/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00658.warc.gz | en | 0.933516 | 340 | 4.1875 | 4 |
Did you know the individual involved in putting the patients to the unconscious is the professional anesthesiologists who start their career with a BSc anesthesia course? They are the vital and inseparable members of the team engaged in operations and surgeries. By injection and inhalation process of using anaesthetic drugs, anesthesiologists make the patients unconscious to facilitate the surgical procedures.
Moreover, they are crucial in several other situations during a patient’s surgery, like managing the respiratory system, interpreting hemodynamic monitors, and others. These experiences and skills come after completing the anesthesiology program, and a BSc in Anesthesia serves as the foundation for making a promising and lucrative career in the paramedical field.
What is Anesthesiology?
It is a practice of medicine used to make the patients unconscious using anesthetic agents. This practice of medicine is widely used in routine and complex surgeries procedures to provide pain relief to patients. Thus, the anesthesia technologists have a crucial role in several medical procedures like just putting the patients to sleep for surgery, carrying out an assessment in critical care units, managing emergency situations, and giving pain management advice.
What BSc Anesthesia is All About- An Overview?
Leading your career in the anesthesia medical field starts with a BSc Anesthesia course. It helps you to be well-versed with the pharmacology of anaesthetic & non-anaesthetic drugs, their preparation, physiology, and other anesthesia technologies. This BSc in Anesthesia program can be pursued after completing an intermediate examination with physics, chemistry and biology as the main subjects. Apart from this, you must have some soft skills like critical thinking ability, empathy for the patients, problem-solving ability, creative mind, sense of responsibility, and so on. These will help you to build as a proficient and competent graduate who can lead a promising career in the healthcare profession. The course is extended for 3-years, which is the amalgamation of theoretical and practical learning.
Moreover, gaining theoretical knowledge and skills along the anesthesia course will help you emerge as a competent anesthesiologist who can help the surgeons facilitate the surgery’s procedures. Well, it is to be noted that anesthesiologists are the most prominent anaesthesia care team members as they operate and maintain the anaesthesia techniques, instruments, supplies, and technology needed during or around the surgery’s procedures. Apart from these, they are also crucial in resuscitating the patients, interpreting the hemodynamic monitors, and managing the respiratory system.
Who can Study the BSc in Anesthesia Course- Eligibility?
Since BSc in Anesthesia is an undergraduate program based on science (biology discipline), so it will demand the students to fulfill the minimum academic qualification of intermediate education. Thus, the aspiring students must have gained the class 12th education with science stream (Physics, Chemistry and Biology subjects). Besides, several other requirements asked by the institutes offering this speciality course include the following:
(a) The students, whether they have the ambition to study the program from India or abroad, must have completed their intermediate examination from a recognized board of education.
(b) Also, candidates must have done their intermediate education with physics, chemistry, biology, or mathematics as the main subjects.
(c) Getting admission to the reputed institutes, you might need to clear the qualifying entrance exams (Such as NEET)
Eligibility to Enter into the Abroad institutes
The students do also have the option to take up the course from the foreign universities. Several institutes outside India offer a platform to study the course and grow a promising career in the same. Here are the requirements to pursue a BSc Anesthesia program from abroad:
(a) Like India, the foreign universities are also asked students to complete the basic and minimum requirements of intermediate education in physics, biology, chemistry and mathematics subjects.
(b) To be eligible to pursue a Bachelor of Science in Anesthesia program abroad, you will require to clear the English proficiency test like IELTS/TOEFL/PTE/Duolingo.
(c) You may also require to submit the LORs and SOP documents to get entry to the program.
Top Entrance Exams to Pursue B Sc Anesthesia Course
Anesthesia discipline being one of the essential practices of medicine during and around the surgery of the patients plays a critical role in the field of medicine. As every physician and surgeon requires a well-versed anesthesiologist, gaining proficient and competent skills is really significant for the individuals. And, it could be obtained with the right learning ambient and quality education. Thus, choosing a compatible and suitable college for your career prospect is really important, where you will be equipped with the vital skills and expertise required in the medical field. There are several entrance exams that play a critical role in choosing the reputed institute for studying the Bachelor of Science in Anaesthesia program. Some of the popular entrance exams are mentioned below:
(a) Bangalore University Entrance Exam
(b) AICET (All India Common Entrance Test)
(c) University of Technology Entrance Exams
(d) NEET (National Eligibility cum Entrance Test)
(e) AIIMS (All India Institutes of Medical Sciences)
(f) BVP CET (Bharati Vidyapeeth Common Entrance Test)
(g) NIMS School of Paramedical Sciences and Technology Entrance Exams
How to get Admission into BSc in Anaesthesia Course?
The BSc Anesthesia course directs aspirants to fulfil several standard qualifications to join and make a career in the concerning field. This Bachelor of Science in Anaesthesia can be pursued by either qualifying for an entrance exam or a class 10+2 scorecard (merit-based). Though many renowned institutes offer admission to this program on the basis of a qualifying test, but several others also let students study the program through 12th scores. Here, I have written the ways of exploring the Bachelor of Science in Anesthesia program in detail.
Entrance-Based Entry to the Undergraduate Anesthesia Program
It is one of the techniques through which students join the BSc Anesthesia program. This method of getting admission is considered the most difficult, even significant, for better career prospects. Therefore, the aspiring candidates must ensure that they have prepared well enough to qualify for the entrance test. Here are the general approaches to going after BCom Computers program.
(a) Check the well-reputed college that offers admission through the entrance exam
(b) Fill Out the application form for the entrance examination
(c) You must insert the details correctly and documents in the appropriate format and size
(d) After a few days, the concerning authority will publish the Hall ticket, which you must take with you during the commencement of the examination
(e) You must make sure to obtain enough marks to qualify for the cut-off set by the respective institute.
(f) As anesthesiology is a speciality discipline, therefore you may be called for the PI/GD round after making your name on the cut-off list.
(g) Your last step is to submit the hard copy of the requisite documents and the admission charges.
Merit-Based Entry to the Undergraduate Anesthesia Program
Apart from getting admission through an entrance test, students also have options to gain entry to reputed institutes through a merit-based. It is the other way to join and explore the Anaesthesia discipline. The following pointers are the steps to take up the BSc in Anesthesia program:
(a) Register yourselves in the interested institute that offers a Bachelor of Science in Anesthesia.
(b) Next step is to fill out the application of the chosen institute. While filling, you must keep in mind that the documents should be in appropriate formats and sizes.
(c) The concerning authority will announce the cut-off list after some days of filling the admission form.
(d) If you are able to cross the cut-off set by the institute, you may be called for the PI/GD round. After that, you will be eligible to get admission to the B Sc Anesthesia course.
(e) Your last step is the submission of requisite documents the universities/colleges ask for.
What are the Syllabus & Subjects of B Sc Anesthesia Course?
Playing a crucial role in the practice of medicine, the Bachelor of Science in Anaesthesia imparts both theoretical and practical learning to the participants. More so, as the course is a career-oriented program, so it primarily focuses on providing valuable understanding and expertise to the students. Apart from this, the students also develop vital abilities and skills along the course, including the ability to work under pressure, critical thinking, problem-solving, sharp eyes for the minute details, and others.
Moreover, studying such a pivotal and unique area of study does not only equip you with discipline-specific technicalities, attitudes, and skills but professionally prepares you for the significant job roles. You will add understanding of numerous subjects other than discipline-specific, which include Human Anatomy, Physiology, biochemistry, Anesthesia Technology, and so forth. Let’s delve deeper into the subjects & syllabus of the undergraduate Anaesthesia program:
B Sc Anesthesia Course Fees
“How much Would Cost to Pursue BSc Anaesthesia Course?” is one of the questions that pop up in the head of the aspirants. So, if you are also curious to know the fees of the course, then you will get here. Several universities offered the programme of BSc Anesthesia to the aspirants, but after meeting the requirements of the institute. In the same different colleges ask for a different amounts of fees from the participants. And it depends upon several factors, like the controlling authority, geographical location, facilities, infrastructure, and others. However, the average fees to be paid by students for this course can be around 25k to 50k. It is just an indicative figure, which could go up or down, depending on the institute.
Career Prospects After Pursuing BSc Anesthesia Program
After getting a degree in BSc Anesthesia, graduates can explore the numerous career opportunities in promising employment settings. This course prepares you for the special care units, emergency situations, and other perioperative care of patients. Here is the list of some popular job profiles for the graduates:
(c) Medical Consultant
(d) Anesthesiologist Assistant
(f) Associate Consultant
(g) General Anaesthetists
(h) Anesthesia Technician
(i) Clinical Associate (Anesthesia)
(j) Anesthesiology Physician
(k) Physician Anesthesiologist
(l) Nurse Anaesthetist
(m) Medical Consultant
Higher Studies After Pursuing BSc Anesthesia Course
Apart from exploring jobs in the medical field concerning anesthesia, graduates can go for advanced studies to get more advance and specialized skills. They can obtain a master’s degree and a doctoral degree to achieve the esteemed and well-paid job roles in the field of the anaesthesia system. Elucidated below are the popular higher-studies courses for the B.Sc. Anesthesia graduates:
(a) MSc Anesthesia
(b) MSc in Critical Care Anesthesia
(c) MSc in Cardiothoracic Anesthesia
(d) MSc in Neurosurgical Anesthesia
(e) MSc in Pediatric Anesthesia
(f) MSc in Hospice and Palliative Anesthesia
(g) MSc in Orthopedic Anesthesia
(h) MSc in Obstetric Anesthesia
Top Colleges for B Sc Anesthesia Programme in India
Finding a good college for this unique and obviously remarkable BSc Anesthesia degree is crucial for any student. This will assist students in gaining not only in terms of essential abilities and knowledge but also provide them with a proper learning environment to grow as a professional anesthesiologists. The following is the list of some popular colleges/universities for BSc Anesthesia courses in India:
(a) Aligarh Muslim University
(b) Indira Gandhi Medical College
(c) All India Institute of Medical Sciences
(d) Government Medical College and Hospital
(e) Mahatma Gandhi Mission Institute of Health Sciences
B Sc Anesthesia colleges in Tamil Nadu
List of Colleges in Tamil Nadu, includes the following:
(a) Vinayaka Mission University, Salem
(b) Madras Medical College (MMC), Chennai
(c) Sri Ramachandra Medical College & Research Institute Chennai
(d) Government Changalpattu Medical College (GCMC), Kanchipuram
(e) Government Kilpauk Medical College (GKMC), Chennai
B Sc Anesthesia colleges in Kerala
(a) Government Medical College (GMC), Kottayam
(b) Government T.D. Medical College (GTDMC), Alapuzha
(c) Periyaram Medical College (PMC), Kannur
Top Universities Abroad for BSc Anesthesia
Here is a list of some of the best and world-class universities from around the world for aspirants to pursue BSc Anesthesia :
(a) University of Nottingham, UK
(b) University of St Andrews, Scotland
(c) University of Notre Dame, US
(d) University of New South Wales, Australia
(e) National University of Ireland Galway, Ireland
Difference Bsc Anesthesia & Operation Theatre Technology
The basic difference between BSc Anesthesia & Operation Theatre Technology is visible explicitly by sneaking on the terms. BSc anesthesia program provides skills and expertise related to the anaesthesia discipline, whereas the BSc Operation Theatre Technology course imparts knowledge related to Operation theatre (OT).
Questions Mostly Asked About BSc Anesthesia Course
Ans- B.Sc Anesthesia is an undergraduate course that imparts an understanding of the use of anaesthetic agents, technology, and others to make it easy for doctors and surgeons in surgeries and operations.
Ans- There is no such course to be labelled as good or bad. It depends on the individual perspective and experiences with the program. But, every area of study demands perseverance and determination from the participants to be studied with. And they must be competent enough to make a career in the field.
Ans- Yes, NEET is a qualifying entrance exam for the BSc Anesthesia program for some institutes. However, there are several reputed institutes that offer admission to study the BSc Anesthesia course. Some of them provide entry on the basis of entrance tests, and others are based on a merit-based method.
Ans- Yes, it is a course to be studied after intermediate or 12th education. But, students must be from science backgrounds with physics, chemistry, biology and mathematics as the main subjects. | <urn:uuid:27a0c43b-f8b6-4f9f-8b20-cb2a4c001de5> | CC-MAIN-2024-10 | https://career101.in/bsc-anesthesia-eligibility-salary-career-prospects/7902/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00658.warc.gz | en | 0.931004 | 3,098 | 3.140625 | 3 |
The new EU General Data Protection Regulation or GDPR is meant to standardize data protection laws and strengthen data protection for individuals across the European Union (EU). The new law will apply to any company small or large that collects or processes personal data of any EU resident and regardless of where the organization is based in the world.
The GDPR, approved in April 2016, will be enforced on the 25th of May 2018 and replaces the Data Protection Directive 95/46/EC. Organizations after that time could face heavy fines if found out of compliance.
It may take a few perusals of the new regulation and supporting articles to better understand the terminology. Here are just a few of the most commonly used terms in the GDPR.
“Controller” – An organization, entity or legal person that collects personal data from European Union (EU) residents, regardless of location or country of origin. For example, a controller could be a bank or website operator that determines the purposes and means of the processing of personal data.
“Processor” – An organization, entity or legal person that processes data on behalf of a data controller, such as a service provider (e.g., cloud providers, data centers, document management companies, etc.).
“Data Subject” – A person or individual who resides in the EU.
“Personal Data” – any information used to identify a ‘data subject’ or natural person, via identifiers such as a person’s name, an identification number, location data, an online identifier or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
With that, here are our ten key and favorite takeaways from the new GDPR regulation to include some changes from the previous directive. At the end of this article, we’ve also included some quick references to just a few GDPR articles and brief summaries.
1. Extended Jurisdiction
Perhaps the biggest change is GDPR applies now to all companies processing or controlling personal data of EU data subjects, regardless of the company’s location. This also applies even if processing takes place in or out of the EU, per Article 3 “Territorial Scope.”
Organizations that are out of compliance or in breach of the GDPR can be fined up to 4% of the annual global turnover (aka “revenue”) or 20 million Euros, whichever is greater. GDPR will also use a tiered approach to fines. For example, a 2% fine could be imposed for not keeping records in order or failing to notify supervising authorities and data subjects. Not conducting an impact assessment could also result in fines. See related Article 83.
Conditions for consent have been strengthened. For example, companies must make their terms and conditions much more clear by removing illegible, legal lingo that is hard to understand. Organizations will need to ensure consent is, as stated in the GDPR, “provided in an intelligible and easily accessible form, using clear and plain language.” See related Article 7.
4. Breach Notification Changes
Breach notification will become mandatory in all member states and must be done within 72 hours after the organization first becomes aware of the breach. Data processors will also be required to notify their customers and controllers “without undue delay” as soon as they learn of the breach, per Article 33.
5. Right to Access
GDPR expands data subjects “right to access” or to obtain a confirmation from the data controller on whether or not his or her personal data is being processed, where and for what purpose, per Article 15. Controllers are also required to provide free of charge a copy of personal data in electronic format. The end result is to improve transparency and individual empowerment over their data.
6. Data Erasure
GDPR specifies individuals in EU have the “right to be forgotten” or have his/her data erased, no longer disseminated and potentially no longer processed by third parties. Conditions are outlined in Article 17, such as data that is no longer relevant to original purposes of processing the personal data.
7. Data Portability
A person has the right to receive from the data controller his or her own personal data that was previously provided in a “structured, commonly used and machine-readable format.” A person also has the right to transmit that data to another data controller without hindrance under certain circumstances, as outlined in Article 20 of the Right to Data Portability.
8. Privacy by Design
“Privacy by Design” has been around for a while, but is becoming a legal requirement with the GDPR. It basically calls for the inclusion of data protections in early system design, not just an addition. The European Union Agency for Network and Information Security (ENISA) also provided a report on how data privacy by design and default can be achieved, per Article 25. Privacy by Design and Default should also take into consideration Security of Processing controls as outlined in Article 32, such as data encryption of personal data, availability of personal data and proper testing of security controls to ensure effectiveness, just to name a few.
Data controller organizations must hold and process only the minimum data required to carry out its duties, also called “data minimization.” Organizations must also limit access to personal data to only those authorized to perform processing of the data. See Article 23 for more details.
9. Data Protection Officers (DPOs)
To help cut down on the “bureaucratic nightmare” of having member states having to manage different notification requirements, organizations will no longer be required to submit notifications to each DPO nor have to get approvals for transfers based on Model Contract Clauses (MCCs).
Instead, organizations will have to appoint a mandatory DPO only for controllers and processors “whose core activities consist of processing operations which require regular and systematic monitoring of data subjects on a large scale or of special categories of data or relating to criminal conviction and offenses.” Internal record keeping will also be necessary to meet GDPR requirements. See Article 38 for more details about the DPO and related activities in Article 39.
There is debate over what size organizations would qualify. For instance, the Commission refers to enterprises over 250 employees. Parliament calls for organizations that process data of more than 5,000 data subjects in 12 months. Council does not mandate a DPO unless required by EU or member state law. We will see how this plays out over the next year.
Finally, one of the key drivers behind the new GDPR requirements is the “one-stop-shop” to help simplify and harmonize data protection laws. There has been considerable debate, however, over how to balance between “reducing the red tape” of such harmonization and ensuring the rights of data subjects are secured by the ability of legal redress with appropriate DPA.
Language barriers, lack of sufficient resources and shortage in experienced privacy staff could also cause challenges for companies to implement GDPR effectively.
All in all, the EU GDPR should help improve overall data privacy and could set a higher bar for many organizations to achieve. Achieving GDPR compliance could also add business benefits by gaining additional customer trust. GDPR provides many good business practices that will benefit any company. Look for an upcoming article where we’ll dive a little deeper into recommendations for more specific data security controls to help organizations meet GDPR requirements.
Quick references to related GDPR articles
Some related statements from GDPR articles referred to in this article are provided in part below, but see full GDPR articles for more details.
- “This Regulation applies to the processing of personal data in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes place in the Union or not.”
- Regulation applies to processing activities related to:
- “The offering of goods or services, irrespective of whether a payment of the data subject is required, to such data subjects in the Union; or
- the monitoring of their behavior as far as their behaviour takes place within the Union.”
- “This Regulation applies to the processing of personal data by a controller not established in the Union, but in a place where Member State law applies by virtue of public international law.”
- “Where processing is based on consent, the controller shall be able to demonstrate that the data subject has consented to processing of his or her personal data.”
- “If the data subject’s consent is given in the context of a written declaration which also concerns other matters, the request for consent shall be presented in a manner which is clearly distinguishable from the other matters, in an intelligible and easily accessible form, using clear and plain language. Any part of such a declaration which constitutes an infringement of this Regulation shall not be binding.”
- “The data subject shall have the right to withdraw his or her consent at any time. The withdrawal of consent shall not affect the lawfulness of processing based on consent before its withdrawal. Prior to giving consent, the data subject shall be informed thereof. It shall be as easy to withdraw as to give consent.”
- “When assessing whether consent is freely given, utmost account shall be taken of whether, inter alia, the performance of a contract, including the provision of a service, is conditional on consent to the processing of personal data that is not necessary for the performance of that contract.”
Article 15 – Right of access by the data subject
- “The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and, where that is the case, access to the personal data and the following information [see articles for details to include purposes of the processing, categories of personal data, etc.].”
- “Where personal data are transferred to a third country or to an international organisation, the data subject shall have the right to be informed of the appropriate safeguards pursuant to Article 46 relating to the transfer.”
- “The controller shall provide a copy of the personal data undergoing processing. For any further copies requested by the data subject, the controller may charge a reasonable fee based on administrative costs. Where the data subject makes the request by electronic means, and unless otherwise requested by the data subject, the information shall be provided in a commonly used electronic form.”
Article 17 – Right to erasure (‘right to be forgotten’)
- “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies [see article for details on grounds to include personal data no longer necessary to original purpose of why it was collected, personal data unlawfully processed, etc.].”
- “Where the controller has made the personal data public and is obliged pursuant to paragraph 1 to erase the personal data, the controller, taking account of available technology and the cost of implementation, shall take reasonable steps, including technical measures, to inform controllers which are processing the personal data that the data subject has requested the erasure by such controllers of any links to, or copy or replication of, those personal data.”
Article 20 – Right to data portability
- “The data subject shall have the right to receive the personal data concerning him or her, which he or she has provided to a controller, in a structured, commonly used and machine-readable format and have the right to transmit those data to another controller without hindrance from the controller to which the personal data have been provided…”
- “In exercising his or her right to data portability pursuant to paragraph 1, the data subject shall have the right to have the personal data transmitted directly from one controller to another, where technically feasible.”
Article 23 – Restrictions
- “Union or Member State law to which the data controller or processor is subject may restrict by way of a legislative measure the scope of the obligations and rights provided for in Articles 12 to 22 and Article 34, as well as Article 5 in so far as its provisions correspond to the rights and obligations provided for in Articles 12 to 22, when such a restriction respects the essence of the fundamental rights and freedoms and is a necessary and proportionate measure in a democratic society to safeguard [national security, defense, public security, etc. – see Articles for full details].”
Article 25 – Data protection by design and by default
- “Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects.”
- “The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons.”
- “An approved certification mechanism pursuant to Article 42 may be used as an element to demonstrate compliance with the requirements set out in paragraphs 1 and 2 of this Article.
Article 32 – Security of processing
- “Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
- (a) the pseudonymisation and encryption of personal data;
- (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
- (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.”
- “In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.”
- “Adherence to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.”
- “The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law.”
Article 33 – Notification of a personal data breach to the supervisory authority
- “In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.”
- “The processor shall notify the controller without undue delay after becoming aware of a personal data breach.”
- “The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article.”
Article 38 – Position of the data protection officer
- “The controller and the processor shall ensure that the data protection officer is involved, properly and in a timely manner, in all issues which relate to the protection of personal data.”
- “The controller and processor shall support the data protection officer in performing the tasks referred to in Article 39 by providing resources necessary to carry out those tasks and access to personal data and processing operations, and to maintain his or her expert knowledge.”
- “The controller and processor shall ensure that the data protection officer does not receive any instructions regarding the exercise of those tasks. He or she shall not be dismissed or penalised by the controller or the processor for performing his tasks. The data protection officer shall directly report to the highest management level of the controller or the processor.”
- “Data subjects may contact the data protection officer with regard to all issues related to processing of their personal data and to the exercise of their rights under this Regulation.”
- “The data protection officer shall be bound by secrecy or confidentiality concerning the performance of his or her tasks, in accordance with Union or Member State law.”
Article 39 – Tasks of the data protection officer
- “The data protection officer shall have at least the following tasks:
- (a) to inform and advise the controller or the processor and the employees who carry out processing of their obligations pursuant to this Regulation and to other Union or Member State data protection provisions;
- (b) to monitor compliance with this Regulation, with other Union or Member State data protection provisions and with the policies of the controller or processor in relation to the protection of personal data, including the assignment of responsibilities, awareness-raising and training of staff involved in processing operations, and the related audits;
- (c) to provide advice where requested as regards the data protection impact assessment and monitor its performance pursuant to Article 35;
- (d) to cooperate with the supervisory authority;
- (e) to act as the contact point for the supervisory authority on issues relating to processing, including the prior consultation referred to in Article 36, and to consult, where appropriate, with regard to any other matter.”
- “The data protection officer shall in the performance of his or her tasks have due regard to the risk associated with processing operations, taking into account the nature, scope, context and purposes of processing.”
Article 42 – Certification
- “The Member States, the supervisory authorities, the Board and the Commission shall encourage, in particular at Union level, the establishment of data protection certification mechanisms and of data protection seals and marks, for the purpose of demonstrating compliance with this Regulation of processing operations by controllers and processors. The specific needs of micro, small and medium-sized enterprises shall be taken into account…”
Article 83 – General conditions for imposing administrative fines
- “Each supervisory authority shall ensure that the imposition of administrative fines pursuant to this Article in respect of infringements of this Regulation referred to in paragraphs 4, 5 and 6 shall in each individual case be effective, proportionate and dissuasive.”
- “Infringements of the following provisions shall, in accordance with paragraph 2, be subject to administrative fines up to 20 000 000 EUR, or in the case of an undertaking, up to 4 % of the total worldwide annual turnover of the preceding financial year, whichever is higher [see article for specific provisions].” | <urn:uuid:a2665bb9-bcfc-466d-9c92-b69fe9af6637> | CC-MAIN-2024-10 | https://securezoo.com/2017/08/gdpr-10-key-highlights-from-the-new-eu-regulations/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00658.warc.gz | en | 0.932265 | 4,149 | 2.65625 | 3 |
Researchers at the University of Pennsylvania and MIT have genetically engineered muscle cells to flex in response to light, which may one day enable highly articulated, flexible robots.
Many robotic designs take nature as their muse: sticking to walls like geckos, swimming through water like tuna, sprinting across terrain like cheetahs. Such designs borrow properties from nature, using engineered materials and hardware to mimic animals’ behavior.
Now, scientists at MIT and the University of Pennsylvania are taking more than inspiration from nature — they’re taking ingredients. The group has genetically engineered muscle cells to flex in response to light, and is using the light-sensitive tissue to build highly articulated robots. This “bio-integrated” approach, as they call it, may one day enable robotic animals that move with the strength and flexibility of their living counterparts.
The researchers’ approach will appear in the journal Lab on a Chip.
Harry Asada, the Ford Professor of Engineering in MIT’s Department of Mechanical Engineering, says the group’s design effectively blurs the boundary between nature and machines.
“With bio-inspired designs, biology is a metaphor, and robotics is the tool to make it happen,” says Asada, who is a co-author on the paper. “With bio-integrated designs, biology provides the materials, not just the metaphor. This is a new direction we’re pushing in biorobotics.”
Seeing the light
Asada and MIT postdoc Mahmut Selman Sakar collaborated with Roger Kamm, the Cecil and Ida Green Distinguished Professor of Biological and Mechanical Engineering, to develop the new approach. In deciding which bodily tissue to use in their robotic design, the researchers set upon skeletal muscle — a stronger, more powerful tissue than cardiac or smooth muscle. But unlike cardiac tissue, which beats involuntarily, skeletal muscles — those involved in running, walking and other physical motions — need external stimuli to flex.
Normally, neurons act to excite muscles, sending electrical impulses that cause a muscle to contract. In the lab, researchers have employed electrodes to stimulate muscle fibers with small amounts of current. But Asada says such a technique, while effective, is unwieldy. Moreover, he says, electrodes, along with their power supply, would likely bog down a small robot.
Instead, Asada and his colleagues looked to a relatively new field called optogenetics, invented in 2005 by MIT’s Ed Boyden and Karl Deisseroth from Stanford University, who genetically modified neurons to respond to short laser pulses. Since then, researchers have used the technique to stimulate cardiac cells to twitch.
Asada’s team looked for ways to do the same with skeletal muscle cells. The researchers cultured such cells, or myoblasts, genetically modifying them to express a light-activated protein. The group fused myoblasts into long muscle fibers, then shone 20-millisecond pulses of blue light into the dish. They found that the genetically altered fibers responded in spatially specific ways: Small beams of light shone on just one fiber caused only that fiber to contract, while larger beams covering multiple fibers stimulated all those fibers to contract.
A light workout
The group is the first to successfully stimulate skeletal muscle using light, providing a new “wireless” way to control muscles. Going a step further, Asada grew muscle fibers with a mixture of hydrogel to form a 3-D muscle tissue, and again stimulated the tissue with light — finding that the 3-D muscle responded in much the same way as individual muscle fibers, bending and twisting in areas exposed to beams of light.
The researchers tested the strength of the engineered tissue using a small micromechanical chip — designed by Christopher Chen at Penn — that contains multiple wells, each housing two flexible posts. The group attached muscle strips to each post, then stimulated the tissue with light. As the muscle contracts, it pulls the posts inward; because the stiffness of each post is known, the group can calculate the muscle’s force using each post’s bent angle.
Asada says the device also serves as a training center for engineered muscle, providing a workout of sorts to strengthen the tissue. “Like bedridden people, its muscle tone goes down very quickly without exercise,” Asada says.
The light-sensitive muscle tissue exhibits a wide range of motions, which may enable highly articulated, flexible robots — a goal the group is now working toward. One potential robotic device may involve endoscopy, a procedure in which a camera is threaded through the body to illuminate tissue or organs. Asada says a robot made of light-sensitive muscle may be small and nimble enough to navigate tight spaces — even within the body’s vasculature. While it will be some time before such a device can be engineered, Asada says the group’s results are a promising start.
“We can put 10 degrees of freedom in a limited space, less than one millimeter,” Asada says. “There’s no actuator that can do that kind of job right now.”
Rashid Bashir, a professor of electrical and computer engineering and bioengineering at the University of Illinois at Urbana-Champaign, says the group’s light-activated muscle may have multiple applications in robotics, medical devices, navigation, and locomotion. He says exploring these applications would mean the researchers would first have to address a few hurdles. “Development of ways to increase the forces of contraction and being able to scale up the size of the muscle fibers would be very useful for future applications,” Bashir says.
In the meantime, there may be a more immediate application for both the engineered muscles and the microchip: Asada says the setup may be used to screen drugs for motor-related diseases. Scientists may grow light-sensitive muscle strips in multiple wells, and monitor their reaction — and the force of their contractions — in response to various drugs.
Reference: “Formation and optogenetic control of engineered 3D skeletal muscle bioactuators” by Mahmut Selman Sakar, Devin Neal, Thomas Boudou, Michael A. Borochin, Yinqing Li, Ron Weiss, Roger D. Kamm, Christopher S. Chenb and H. Harry Asada, 21 August 2012, Lab on a Chip.
The other authors on the paper are Devin Neal, Yinqing Li and Ron Weiss from MIT, and Thomas Boudou and Michael Borochin from Penn.
This research was supported by the National Science Foundation, the National Institutes of Health, the RESBIO Technology Resource for Polymeric Biomaterials, the Center for Engineering Cells and Regeneration of the University of Pennsylvania, and the Singapore-MIT Alliance for Research and Technology. | <urn:uuid:ee56c15c-9f7a-48bf-b56d-836aeb42a412> | CC-MAIN-2024-10 | https://scitechdaily.com/light-activated-muscle-cells-may-advance-biorobotics/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00658.warc.gz | en | 0.928949 | 1,416 | 3.609375 | 4 |
Biff Chip and Kipper
Phonics spelling dictionary
My phonics kit
This app orders words by sounds to help children master phonics and thereby reading and spelling skills too. The words are organised by sound and broken up into coloured sections and the app features fun illustrations and interactive audio feedback throughout to help the user engage as they learn. They can also save words to practice later in the 'My Words' section. The app also allows them to take spelling tests in preparation for spelling tests at school and it rewards hard work with exciting stickers!
5 quick and fun word games to help young children develop early reading skills in advance of the UK government's national phonics screening check for 6-year-olds. It’s a fun and tactile way to practise reading and sentence construction. The games include Cloud Cations, Sentence Builder, Picture Search, Sound Hunt and All Cards.
Word games encourages children to practice recognising and reading useful words through playing games. The aim of the app is to get children recognising and reading all the words quickly, without trying to decode them. The app also includes eight character names (Mum, Dad, Biff, Chip, Kipper, Wilma, Wilf, Floppy). The games help children build their confidence while they have fun.
This app contains 34 rhyming pairs of words - 68 words in total. Children can use it to practise recognising rhyming letter patterns both aurally and in writing. The words can be read by children who know the sounds of the letters of the alphabet as well as blended sounds. In addition to the simple three letter words like cat, there are a number of four-letter words which begin or end with two consonants, like tent and twin. | <urn:uuid:5e2dba4c-b2d9-42d0-88e2-998862ac7404> | CC-MAIN-2024-10 | https://therapy-box.co.uk/biff-and-chip | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00658.warc.gz | en | 0.950068 | 355 | 2.703125 | 3 |
The Enduring Allure of Games: From Ancient Pastimes to Modern Escapades
Games have been an integral part of human culture for millennia, evolving from simple pastimes into complex, immersive experiences that captivate people of all ages descargarclashroyalegratis.net and backgrounds. From ancient board games played by civilizations long gone to the cutting-edge digital realms of contemporary video games, the concept of play has endured as a fundamental aspect of the human experience. In this article, we’ll explore the rich history of games, their cultural significance, and the evolution of gaming into a global phenomenon.
The history of games can be traced back thousands of years, with evidence of various forms of play found in archaeological sites across the globe. Ancient civilizations engaged in board games, dice games, and sports that served not only as entertainment but also as social and strategic activities. Games like Senet in ancient Egypt and Go in ancient China provided not just amusement but also a reflection of cultural values and societal structures.
Medieval and Renaissance Games:
As societies evolved, so did the games they played. The medieval period saw the rise of chess, a game that transcended borders and became a symbolic representation of military strategy and noble hierarchy. The Renaissance brought about a surge in card games, introducing decks that evolved into the standard playing cards we know today. These games were not only sources of recreation but also opportunities for social interaction and skill development.
The Birth of Modern Board Games:
The 19th and 20th centuries witnessed a surge in creativity with the invention of many popular board games. Classics such as Monopoly, Scrabble, and Clue became staples in households worldwide, offering a mix of strategy, luck, and friendly competition. These games not only entertained but also brought families and friends together, fostering social bonds and creating lasting memories. | <urn:uuid:d4085f40-dc6b-4999-8e1e-57cff4074b53> | CC-MAIN-2024-10 | https://d-trs.com/the-enduring-allure-of-games-from-ancient-pastimes-to-modern-escapades/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00758.warc.gz | en | 0.948117 | 377 | 3.0625 | 3 |
Summary of Recent Changes
- CDC is announcing that it will be amending its Face Masks Order to not require people to wear a mask in outdoor areas of conveyances (if such outdoor areas exist on the conveyance) or while outdoors at transportation hubs.
- CDC is announcing that, until it can amend the Order, it will exercise its enforcement discretion to not require wearing a mask in outdoor areas of transportation conveyances (if such outdoor areas exist on the conveyance) or while outdoors at transportation hubs.
- CDC continues to recommend wearing of masks in these areas by people who are not fully vaccinated.
For more guidance, check out the CDC website.
Who Should Wear a Mask?
- People, including children older than 2, should wear a mask in indoor public places if they are:
- Not fully vaccinated
- Fully vaccinated and in an area with substantial or high transmission
- Fully vaccinated and with weakened immune systems
- In general, you do not need to wear a mask in outdoor settings.
Check out the CDC website for more guidance.
CDC is working with state and local public health officials to monitor the spread of Omicron. As of December 20, 2021, Omicron has been detected in most states and territories and is rapidly increasing the proportion of COVID-19 cases it is causing.
CDC has been collaborating with global public health and industry partners to learn about Omicron, as we continue to monitor its course. We don’t yet know how easily it spreads, the severity of illness it causes, or how well available vaccines and medications work against it.
For more guidance on the Omicron variant and how to defend against it, check the CDC website.
Correct and consistent mask use is a critical step everyone can take to prevent getting and spreading COVID-19. Masks work best when everyone wears them, but not all masks provide the same protection. When choosing a mask, look at how well it fits, how well it filters the air, and how many layers it has.
Check the CDC website for more guidance on mask wearing.
How to select, properly wear, clean, and store masks
- Everyone 2 years or older who is not fully vaccinated should wear a mask in indoor public places.
- In general, you do not need to wear a mask in outdoor settings.
- People who have a condition or are taking medications that weaken their immune system may not be fully protected even if they are fully vaccinated. They should continue to take all precautions recommended for unvaccinated people, including wearing a well-fitted mask, until advised otherwise by their healthcare provider.
- If you are fully vaccinated, to maximize protection and prevent possibly spreading COVID-19 to others, wear a mask indoors in public if you are in an area of substantial or high transmission.
Visit the CDC website.
A Network for Grateful Living is a global organization offering online and community-based educational programs and practices which inspire and guide a commitment to grateful living, and catalyze the transformative power of personal and societal responsibility.
We hold grateful living as an engaged mindfulness practice, grounded in both wisdom and science, which supports our ability to see the wonder and opportunity in every moment, and motivates us to act boldly with love, generosity, and respect towards one another, ourselves, and the Earth.
Check out positive practices here: https://gratefulness.org/practice/practice-space/
Places to Call for Help
Updated December 23, 2021
Crisis Text Line – Text ‘Home’ to 741-741. Crisis Text Line is free, 24/7 support for those in any type of crisis.
Text TalkWithUs to 66746 (TTY 1-800-846-8517) if you or someone you care about is feeling overwhelmed with emotions like sadness, depression, or anxiety, or feel like you want to harm yourself or others.
Visit the Disaster Distress Helpline, which provides 24/7, 365-day-a-year crisis counseling and support to people experiencing emotional distress related to natural or human-caused disasters. Call 1-800-985-5990
Visit the National Domestic Violence Hotline to get help, identify abuse, plan for safety, or support others. Call 1-800-799-7233, chat live, or text START to 88788.
To Find A Therapist – Psychology Today’s Find a Therapist tool is a wonderful resource for discovering therapists in your area and according to your needs. You can also find quality inexpensive licensed professional therapists using a popular resource called BetterHelp.
The National Suicide Prevention Lifeline provides 24/7, free and confidential support for people in distress, prevention and crisis resources for you or your loved ones, and best practices for professionals in the United States. Call 1-800-273-8255.
Call 911 if you are in an EMERGENCY SITUATION. If you feel like you’re going to hurt yourself, it is an emergency!
In New Mexico, if you or a loved one is experiencing any kind of emotional crisis, mental health or substance use concern, you can find help 24 hours a day, seven days a week, by calling the New Mexico Crisis and Access Line at 1-855-NMCRISIS (662-7474) 24 hours a day / 7 days a week. You are not alone and it is normal to feel anxious and worried! You can confidentially reach out to talk to someone anytime and anyplace.
If You Just Want Someone to Hear You Out…
Call the Peer-to-Peer Warmline at (855) 466-7100. If you want to talk to someone who has been there and understands the emotional, mental, and behavioral health concerns you may be experiencing then call us to talk to a professional peer support specialist between 7:00 a.m. – 11:30pm MT, or by text from 6:00pm-11:00pm MT, 7 days a week, 365 days a year. You can reach the New Mexico Peer-to-Peer Warmline at 1-855-4NM-7100 (466-7100).
There’s still time to sign up for the Emergency Broadband Benefit!
Congress recently created the Affordable Connectivity Program, a new long-term, $14 billion program, which will replace the Emergency Broadband Benefit Program. This investment in broadband affordability will help ensure we can afford the connections we need for work, school, health care and more for a long time.
Households enrolled in the Emergency Broadband Benefit Program as of 12/31/21 will continue to receive their current monthly benefit until 3/1/22.
- The maximum monthly benefit will change from $50 per month to $30 per month for households not located on qualifying Tribal lands. The monthly benefit will remain at $75 per month for households on qualifying Tribal lands.
- Households have new ways to qualify for the Affordable Connectivity Program such as: receiving WIC benefits or having an income at or below 200% of the Federal Poverty Guidelines.
- Households that qualified for the Emergency Broadband Benefit due to a substantial loss of income due to job loss or furlough since February 29, 2020 or by meeting the eligibility criteria for a participating provider’s COVID-19 program will need to requalify for the Affordable Connectivity Program. These households will receive additional details about the steps they need to take from the program administrator (USAC) or their broadband provider, in January 2022, and will be given at least 30 days to respond. They will continue to receive their full EBB benefit until March 1, 2022.
More information about actions current Emergency Broadband Benefit recipients will need to take to continue receiving the Affordable Connectivity Program benefit after the transition period will be available in the coming weeks. The FCC is seeking comment on the changes enacted in the Infrastructure Investment and Jobs Act and will be adopting rules for the Affordable Connectivity Program. Please stay tuned for additional updates.
Tents and sleeping bags not only make living on the streets more bearable this time of year, they can often mean the difference between life and death.
Homeless shelters in New Mexico are in need of both as the COVID-induced eviction moratorium nears an end and colder temperatures arrive.
Georgia Evans, development associate for the New Mexico Coalition to End Homelessness, said the number of unhoused has been harder to track due to the pandemic, especially because some shelters closed or had limited capacity.
“A lot of homelessness, especially in New Mexico, is not seen,” Evans explained. “It’s people sleeping in their cars or sleeping in different areas every night and not necessarily pitching a tent in a busy, more central area.”
Evans pointed out in Santa Fe, the shelter is seeking funds to purchase clothing and equipment for those experiencing homelessness, while other shelters are accepting warm clothing including coats, hats and gloves.
New Mexico, along with New Jersey and New York, are the only states with a pandemic-related statewide eviction moratorium still in effect, but Evans noted it is scheduled to end in early January.
“And so we’re anticipating that there might be a giant flood of people that do not have housing or will not have housing in the new year,” Evans projected.
To honor those who lost their lives while homeless, annual memorials are held across the U.S. on or near Dec. 21. In New Mexico, some cities are planning virtual memorials, while others will be in-person with social distancing. Evans added it is fitting to hold the memorial on the longest and one of the coldest days of the year.
“To recognize that these people are in our communities, and are important and in relation to the national memorial for homelessness,” Evans emphasized.
The National Homeless Persons Memorial Day has been held on the winter solstice for 30 years. | <urn:uuid:d5e46303-6461-4d35-b7ac-d8e741b4aa0c> | CC-MAIN-2024-10 | https://grantcountycoronavirusupdate.org/category/resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00758.warc.gz | en | 0.938894 | 2,065 | 2.609375 | 3 |
Mystery seabird deaths reported in Yorkshire as mass phenomenon sweeps North Sea coast
In Yorkshire, dead birds have been found at locations including Filey and Runswick Bay, and there have also been mass deaths off the Northumberland and Scottish coastlines.
It is not known if the phenomenon - which seems to particularly affect guillemots - is caused by disease, a marine pollution event or long-term environmental pressure.
Species such as puffins, razorbills and kittiwakes have also been affected.
Bird flu has been ruled out but poisoining from algae blooms is among the possibilities being assessed.
The furthest north deaths have been recorded is Orkney.
The bodies show signs of malnutrition, suggesting low fish stocks could be to blame, and the guillemots have been seen up to 20 miles inland feeding in rivers and along beaches, despite them normally avoiding people.
Mass death events are known as 'wrecks' but usually occur in winter following storms.
Maria Prchlik from RSPB Bempton Cliffs in East Yorkshire said: “Extreme weather, pollution and disease can kill seabirds. If prey fish are scarce, seabirds can be weakened through starvation. We don’t know the exact cause here, but we know climate change is driving prey fish numbers down in our seas and creating more extreme weather events. The world is in a nature and climate crisis with humans and wildlife already experiencing the impacts. We need urgent action from governments to help revive our world.” | <urn:uuid:45b3491c-b3e1-48dd-9493-cc6026951550> | CC-MAIN-2024-10 | https://www.yorkshirepost.co.uk/news/people/mystery-seabird-deaths-reported-in-yorkshire-as-mass-phenomenon-sweeps-north-sea-3389089 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00758.warc.gz | en | 0.965607 | 320 | 3.140625 | 3 |
The late 19th century marked the beginning of the growth of tourism in the Georgian Bay region..
Once only the very wealthy could afford to take time away from work.
Now, more and more members of society could partake in leisure activities.
In the 1890s, John McLauchlan opened McLauchlan Park, or as it was also called, the Pleasure Grounds, at Balmy Beach just north of Owen Sound on Georgian Bay.
Here visitors could fish, swim, lawn bowl, or just idle the time away on a warm summer day.
The only transportation link to the park was by water.
Visitors boarded the Mazeppa at Owen Sound and took a short, but scenic boat ride, to this pioneer amusement park.
McLauchlan probably saw the economic potential from the growth of tourism in other parts of the province, especially in the Muskoka district.
He realized that the existing park needed accommodations to attract visitors from more distant points.
In 1901, he formed the Georgian Bay Summer Park and Resort Company. Like other projects in Owen Sound's past, this enterprise enjoyed the economic support and encouragement of the business community of the region.
The board of directors was a virtual "who's who" of Owen Sound's economic elite; including names such as Eaton, Butchart, Harrison, Hay, Creasor and many others.
Given the support of such high-profile citizens, many Owen Sounders bought into the project either monetarily or with moral support.
The owners had ambitions to make what was to be called King's Royal Park one of Ontario's premier tourist attractions.
The hotel was magnificent. It contained more than 100 rooms.
The Spanish style exterior was painted white with a red tiled roof.
The balconies had ornate iron designs and gave guests a breathtaking panoramic view of scenic Georgian Bay.
Passenger ships stopped at the King's Royal docks, bringing visitors from the midwest United States and the southern states as well as tourists from across Canada.
Two vessels that visited this Georgian Bay resort on many occasions were the North American and her sister ship, the South American, often called the Queen of the Great Lakes.
(After the demise of King's Royal Park, these two vessels continued to visit many ports of call on Georgian Bay including Owen Sound.)
While natural scenic delights, golf, tennis, lawn bowling, and other outdoor activities were attractive, the hotel itself drew travellers.
Private dining rooms, billiard rooms, private baths, and writing and sitting rooms for the ladies, illustrate an opulent splendor almost unheard of in this, or any other, Ontario hinterland region.
There was dining and dancing in the hotel and a professional theatrical group performed in a location behind the main building.
The debut found the hotel full to capacity and dreams of future growth and prosperity for the area were held by all.
Through foresight, ambition, and determination, Owen Sound looked to be on the verge of benefiting from a new economic adventure.
Unfortunately, King's Royal Park was not to be the vehicle for economic diversification through tourism for the region.
Its existence as a tourist destination would be short-lived.
The community of Owen Sound supported the project wholeheartedly, but other factors would lead to its demise and destruction.
The syndicate supporting the project spent $100,000 to create this oasis of pleasure and entertainment.
Through drive and determination, the hotel had been completed in one year.
The major shipping lines that travelled the waters of Georgian Bay provided easy transportation access.
Initially, the tourists flocked to the Balmy Beach resort, but gradually, the smartly-dressed white uniformed 112-member staff began to outnumber the guests.
By the beginning of the First World War, registration was less than 10 per cent of capacity.
In 1916, the hotel was sold to a Toronto wrecking crew for a paltry $5,200!
What caused the demise of King's Royal Park?
One can only speculate.
Some suggest the impact of the First World War was important.
Others are of the opinion that the Muskoka region was more favorable and more in style with the wants of would-be tourists from Toronto and other parts of southern Ontario.
This may indeed be the real reason. The guest register of the hotel reveals many American' names and addresses.
However, not enough American travellers came to the shores of Georgian Bay to sustain such a large enterprise.
King's Royal Park may not have been a long-term success, but it is an example of the spirit of cooperation and entrepreneurial drive which helped create the community of Owen Sound!
Lighthouses were vital to Georgian Bay and Great Lakes sailing traffic. They assisted mariners in making their sailing a safe venture.
Recreational Boating on Georgian Bay There is a long tradition of recreational boating on Georgian Bay. Reports indicate that regattas were being held at Owen Sound as early as 1852.
Great Lakes Recreational Boating Great Lakes recreational boating has been a popular pastime in the summertime in the Georgian Bay region for many years.
Yachts on Georgian Bay A history of yachts on Georgian Bay.
Georgian Bay Ferry Boat Service between Tobermory and Manitoulin Island has a history that is more than a century old. Today, the Chi-Cheemaun continues that tradition.
Ferry boat service after 1930 increased in activity between Tobermory at tip of the Bruce Peninsula and Manitoulin Island
1867 Election Meant Sailing to the Soo. There was only one polling station in the Georgian Bay region in the first election after Canadian Confederation and that was in Sault Ste. Marie!
A Flowerpot Island boat trip takes you to one of the many Georgian Bay islands dot the landscape of the waters around Tobermory at the tip of the Bruce Peninsula. One island features not only unique landforms and vegetation, but also a mysterious indigenous Romeo and Juliet tale of romance.
Chicora the first stage of an 1871 Great Lakes tour aboard a cruise ship on Georgian Bay.
Chicora the final stage of an 1871 cruise a foggy voyage on the Great Lakes.
Historic Vacations: King's Royal Park Historic Vacations: King's Royal Park, opulent adventures for the wealthy of the day. It was the late 19th century and tourism was beginning to bloom.
Sailing the Lake Huron Shoreline is a step back in history and a delightfully scenic trip. But beware of the big waves that can arise anytime!
Sailing Lake Huron Shoreline Part 2 takes us through the most treacherous part of our voyage and also a most interesting part as we visit some unique islands.
Georgian Bay Sailing Georgian Bay Sailing history is a rich tapestry of tales of heroism, tragedy, and exploration. Sailing vessels traversing the rugged waters of Georgian Bay predate the arrival of European explorers and settlers.
Boating for Recreation on Georgian Bay and beyond had an early start once settlement began in the region. As early as the 1850s pleasure crafts were popular. | <urn:uuid:bd1cb594-17a8-412e-9a23-65e1a8d44399> | CC-MAIN-2024-10 | https://www.history-articles.com/historic-vacations-kings-royal-park.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00758.warc.gz | en | 0.957284 | 1,471 | 2.96875 | 3 |
Knowing what influences self-esteem allows you to nurture it
From The Happy Child set of talks and materials
Caring for children within our incredibly busy, ever-changing lives, is rarely easy at the best of times. Our own exhaustion and stress can add to the invisible pressures placed on our families, especially if we try to live up to some social media representation of perfection. But when we can understand the influences on our children’s self-esteem, we are far better placed to nurture it.
Technology that once promised a helpful support can become a destructive influence
This is especially true when trying to raise happy, balanced and resilient children. Particularly if they are living in a world where everything is wanted and expected NOW. With value placed on what we deem to be worthy of our time and attention, decided on with a swipe on the screen.
When we judge something, whether we realise it or not, we assign a value to it. And we do this according to a given criteria. But what makes something worthy of our time and attention? What are we rating its goodness against? And when it comes to judging the value of a person, where can you possibly start?
What gives someone value?
We all look to find positive human connections. It is how we reassure ourselves that we are loved and that we belong. This basic human need is so powerful, that children will do almost anything to get it, which is why peer pressure is so powerful. But growing up is hard at the best of times. And with the constant exposure many children have to social media, their difficult times are viewed through a lens of “post-ready-perfection”.
Your child is picking up on every influence around them – especially from you, their most trusted influencer – so you need to be careful of the messages you are sending. How do you rate the things you value? Is it based on skill within a given activity? Or the number of likes on a given post? Is it a current favoured physical appearance or ownership of a must-have item?
The trouble with assigning value through any of these criteria is that they are fluctuating
Criteria that depend on fads or fashions have no real basis on the important qualities we may want for our children as they grow into capable, well-rounded adults. And it is this rocking basis that cause so many teenagers, and increasingly our young children too, to find their self-esteem at dangerously low levels.
And the truth is – our children are struggling
While self-confidence is built through experience; the more your child can practice something, the more confident they can become. What influences self-esteem is more subjective. It is more about who your child believes themselves to be. And for this to be at hight levels, your child needs to feel unique, loved and valuable, just for being them. A difficult concept to believe in if they see and hear you judging others harshly. And if they themselves begin tying their own self-worth to narrow, unrealistic or fluctuating ideals, their self-esteem will suffer.
Studies consistently show all kinds of benefits when self-esteem is boosted, improving children’s sense of satisfaction and happiness, to improvements in mental health, schoolwork and physical health. So, look to develop your child’s inner, psychological strength – more than any reliance on today’s fad. Help them to understand the world on their terms, as they become aware of their strengths and weaknesses, and the power they have to control their outcomes. And help your child to avoid the depression and low self-esteem that so many of our teenagers are facing.
This article is taken from our course: The Happy Child
Dr Kathryn Peckham is an Early Childhood Consultant, author and researcher and the founder of Nurturing Childhoods. Providing all the knowledge, understanding and support you need to nurture your growing child. www.nurturingchildhoods.co.uk
DEVELOPING EVERY CHILD’S POTENTIAL | <urn:uuid:c0e00222-12f7-4cc6-85c8-d75ada8cd41c> | CC-MAIN-2024-10 | https://nurturingchildhoods.co.uk/understand-what-influences-your-childs-self-esteem/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00758.warc.gz | en | 0.957192 | 827 | 2.515625 | 3 |
126.96.36.199 Control Over Sentencing Policy
Control over sentencing policy creates a tension between government and the judiciary, as politicians look for easy popularity.
A government that wants to be seen as being “tough on crime” wants to impose stiff mandatory sentences for criminals, which can create two problems:
● Sentences for some crimes become disproportionate compared to others.
● Some people are unnecessarily sent to prison, most notably in America. An article in Time, for example, argued that 39% of Prisoners Should Not Be in Prison. There are effective alternatives, as described in the next section (2.7).
California’s “Three Strikes and You’re Out” law is a well-known example of political interference in sentencing. A Stanford Law Society article, Three Strikes Basics, noted how the policy had backfired, lacking proportionality:
“.. the sentencing scheme was intended to “keep murderers, rapists, and child molesters behind bars, where they belong.” However, today, more than half of inmates sentenced under the law are serving sentences for nonviolent crimes.
.. [offenders] have been given life sentences for offenses including stealing one dollar in loose change from a parked car, possessing less than a gram of narcotics, and attempting to break into a soup kitchen.
.. the law disproportionately affects minority populations. Over 45 percent of inmates serving life sentences under the Three Strikes law are African American. The Three Strikes law is also applied disproportionately against mentally ill and physically disabled defendants. California’s State Auditor estimates that the Three Strikes law adds over $19 billion to the state’s prison budget. Criminologists agree that life sentences for non-violent repeat offenders does nothing to improve public safety.”
It is hard to avoid drawing the conclusion that politicians’ need for short-term popularity makes them unsuited to having control over sentencing policy. Careful analysis is more appropriate. Judges can be respected, and be accepted without being popular, if they are able to explain their decisions. And they can set sentences that are appropriate to individual cases, taking all the circumstances into account.
This page is intended to form part of Edition 4 of the Patterns of Power series of books. An archived copy of it is held at https://www.patternsofpower.org/edition04/5263.htm. | <urn:uuid:25383b07-b240-47c8-a734-1388f91e7aab> | CC-MAIN-2024-10 | https://www.patternsofpower.org/patterns/control-over-sentencing-policy/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00758.warc.gz | en | 0.948139 | 490 | 2.609375 | 3 |
Smithtown High School East's Holy Mary Zaher is among 300 students nationwide named scholars in this year's Regeneron Science Talent Search!
Started in 1942, the Regeneron Science Talent Search is the nation’s oldest and most prestigious science and mathematics competition. It recognizes and empowers our nation’s most promising young scientists who are developing ideas that could solve society’s most urgent challenges.
Ms. Zaher’s research project was titled “The Correlation Between Peroxisome Levels and Short-Term Memory Loss in a PINK1-/- Rat Model of Parkinson's Disease."
The focal point of the study was looking at the cellular level in those who have the disease. There is a certain cellular subcomponent responsible for decreasing stress caused by harmful compounds. The cellular component’s levels can be measured to establish a possible relationship between how much is present and Parkinson’s disease.
However, to examine the organelle’s levels, a brain region of interest afflicted by Parkinson’s disease needed to be chosen. Rat models of Parkinson’s disease were used to investigate memory deficits by exploiting rats’ natural tendency to explore. They were introduced to new and old objects and their interactions with the objects were observed. It was found that the 12.5-month-old rats with Parkinson’s disease had short-term memory problems, but not long-term memory problems; therefore, brain regions responsible for short-term memory were selected as regions of interest.
Holy Mary counted over 45,000 points delineating pyramidal neurons in the selected brain regions. No difference between the intensity of the organelle’s presence and Parkinson’s disease was found. However this leads to the next step of investigating if the organelle is functioning to its full capacity.
High School East's science research coordinator Maria Zeitlin says Ms. Zaher’s research was especially impressive because she was the one who created it.
"Ms. Zaher's work investigating Parkinson's Disease utilized rat brain tissue to probe the presence of damage due to reactive oxygen species on brain cells. Often students are given projects to work on. What makes this extra special is that it was a project she created. It was a very clever investigation performed after pondering what was seemingly a simple question in theory, but complicated for a high school student to actually execute, and she did so at such an advanced level. She is well-deserving of this honor and I am so proud of her! Her work involved countless hours including weekends reading research journals and executing the experiment. She exhibited incredible resilience as her data was still coming in right up until days before the STS deadline."
Pictured are Director Science K-12 Dr. Stephanie O'Brien, Maria Zeitlin, Holy Mary Zaher and High School East Principal Robert Rose. | <urn:uuid:19d04c92-4819-4eb1-9281-77a0b15a3b10> | CC-MAIN-2024-10 | https://www.smithtown.k12.ny.us/News/Regeneron-Scholar-at-HSE.htm | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00758.warc.gz | en | 0.967865 | 585 | 2.796875 | 3 |
Table of Contents
- The Shift to New Democracy
- Jackson's Undemocratic Desicions
- The Bank War
- Jackson and Native Americans
Andrew Jackson was known as obstinate, but a man of the common people, and a democratic man. He was a man who created the party of the common white men and birthed American political culture. He was a frontiersman who although controversial, executed solely to the benefit of the common white men, with the underlying belief, that pushing westward was the cornerstone of American prosperity. He was a strong-willed character who spoke up in sight of flawed systems, which he saw as a burden to the equality of the common white men. He was the creator of a New Democracy which people began to see as the ‘true character' of the United States. Due to Jackson being the first voice of a new political party, his intentions were frequently disputable by the people of America… and still, are to this day. Jackson's intentions were always democratic throughout his presidency, although the follow through was contentious; which can be seen throughout two major instances, Indian Removal and the Bank War during the New Democracy era.
$45 Bundle: 3 Expertly Crafted Essays!
Expert Editing Included
The Shift to New Democracy
During the New Democracy era, Jackson represented the common white man by being the first president to value the judgment of the people. Though the huge change he craved to endure on the nation caused controversy on his morals. The presidents prior to Jackson's inauguration like John Adams and Henry Clay, were afraid of having too many people voting because they looked down on lower classes of society. There was even a state law that restricted the franchise to propertied men, which evidently discluded a large population at the time. Their outlook was that if you didn't have a stake in the country, (land and wealth) then you weren't qualified to make rational decisions regarding the fate of the nation. Thankfully by 1810, the ideals of democracy began to catch on among the common people, and lead to the property voting rights to be eliminated! This expansion of voting rights represented a shift in who the average American thought deserved to have a political voice.
With this shift about Democratic ideals in mind, Jackson ran for the president whose views pathed the segway from ‘traditional democracy' to ‘new democracy'. His style in governing was portrayed in document 2, written by Thomas Bailey and David Kennedy. This document outlines Jackson's character resemblance to the people's new values of a relatable president, who is a man of the people. It also shows Jackson's connections he's developed between the people, which was the building block to a New Democracy.
Jackson's Undemocratic Desicions
Apart from the good that he intended on the nation though, Jackson made some undemocratic decisions which made people question those good intentions. As document 7 explains, Jackson's secretary of state (Van Buren) warned Jackson about appointing Samuel Swartwout to be the collector of the port new york due to his ‘criminal tendencies'. Overall, Jackson did not comply solely because Swartwout was an early supporter. In time, Swartwout absconded $1,222,705.09. Along with Jackson's biased decision he made, he created something called the Spoil System which is explained in document 6 in a letter to Congress. He believed in ‘rotation in office' because most people can do government jobs. So every new official would be able to appoint his own supporters and friends to government jobs. This was an irresponsible action taken it replaced hundreds of good federal employees with incompetent party loyalists. Overall, his democratic intentions of providing land for the good of the common white men were clear, although the way he acted disobeyed the democratic intent.
The Bank War
Jackson defended the common men in one major instance during his presidency called the Bank War. In 1816, the national bank (the second bank of the united states) was given a twenty year charter by Congress, but before the charter bank expired in 1836, Jackson destroyed the bank. Jackson argued against the bank because it went against his Democratic ideas which can be seen in Document Four. This document outlines how to Jackson, the bank was a corrupt business which illustrated how a privileged class of bank owners, oppressed the will of the common people of America. Jackson was a man to speak up in sight of flawed systems and wasn't afraid to deny any audience… even Congress'. The president went against Congress when Jackson vetoed the charter, which caused the Bank War to be the biggest controversy of Jackson's administration. It gave off the image that he felt his vote was more important than Congress' vote. Because of this, Nicolas Bittle and a group of people who started to coalesce around their hatred for Jackson called Jackson's veto a manifesto of anarchy and compared him to King Andrew the First, which can be seen on the bottom of document 3. If you look at the document you can see how he tramples on the constitution and pushes forward his own agenda like a monarch. Thus, although his intentions of getting rid of a flawed bank were Democratic, the outcome did not portray so taken it later caused the Panic of 1837... which led to the plummet of the American economy.
Jackson and Native Americans
The obstinate Andrew Jackson took office having one major goal, that Indians must be moved "beyond the great river Mississippi." As mentioned earlier, Jackson was a frontiersman who believed that pushing his people westward was the cornerstone of American prosperity. Therefore, as the frontier population continued to push westward, it forced a confrontation with the Indians that were living there. This caused the Indians to gradually get pushed away more and more. Knowing Jacksons values of working behalf the common white who wanted to grow cotton on their land, he ordered the Indians to leave their homeland and walk to a specifically designated territory. He puts forth this desire in document 8 as he proposes a place where Native Americans could go… but interestingly enough, never mentioned HOW. He entirely disregarded the supreme court's vote (which defended the tribes status); he thought his vote was superior over the supreme court's vote. More importantly, he disregarded ensuring that the tribes would get to the designated area safely. This caused the Trail of Tears which was the Native Americans life-threatening journey which led to the death of at least 3000 people. This was the worst outcome any president could have ever ask for. It was an unorganized and selfish decision that can be seen by the response from the Cherokee people in document 9. They appeal their case to the American people, to announce that they have natural rights just like white Americans do. It wasn't an altruistic act which a democratic president should have made if he meant well for the nation. Once again, while his intentions of wanting to extend America's borders were democratic, he did sacrifice moral principles (by causing thousands of deaths), to achieve some political goals.
In conclusion, Jackson was full of Democratic intentions for the nation, although failed to portray Democratic Actions. He was a man who assured that he would do his utmost to comply to his supporters' demands, but unfortunately faced a huge problem being that; Jackson showed blatant disregard for people other than his supporters, which is an undemocratic action. Whether or not he was good for the nation is another complex question, but overall, he was a democratic man whose intentions were honorable to the nation. | <urn:uuid:1d551230-eab2-4fa6-a3ec-54cd18f12f6f> | CC-MAIN-2024-10 | https://eduzaurus.com/free-essay-samples/andrew-jackson-democratic-intentions-vs-undemocratic-actions/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00758.warc.gz | en | 0.983257 | 1,527 | 3.9375 | 4 |
What’s That You Say?
[CLICK HERE to read the article, “Cracking the Code,” from Psychology Today, March 6, 2015.]
[CLICK HERE to read the article, “How to Be a Better Mind Reader,” from Psychology Today, Nov. 4, 2014.]
This dichotomy creates an interesting dilemma for market researchers, particularly those who invest in focus groups to get feedback on new products. Henry Ford, founder of Ford Motor Company, was famously prolific regarding customer input, having once said, “If I had asked people what they wanted, they would have said a faster horse.”
Late Apple co-founder Steve Jobs also was a big proponent of not listening to customer words, but rather to their needs. He’s quoted as saying, “It’s really hard to design products by focus groups. A lot of times, people don’t know what they want until you show it to them.”
[CLICK HERE to read the article, “Bridging the Gap Between Actual and Reported Behavior,” from UX Booth, May 19, 2013.]
[CLICK HERE to read the article, “Why Steve Jobs Didn’t Listen to His Customers,” from The Huffington Post, Sept. 28, 2014.]
It’s also not an uncommon phenomenon that people will say what they think in writing, but not face to face. In recent years, the Internet has provided a popular forum for readers to make comments and get opinions off their chest without rankling anyone they know personally. Experts have observed that the mask of an online identity permits inhibition in a way similar to drinking alcohol. However, because people do change their behavior in different situations, it’s important not to make quick judgements. Rather, true behavior patterns reveal their consistency over time and in various situations.
[CLICK HERE to read the article, “What Your Online Comments Say About You,” from The New York Times, Feb. 14, 2015.]
Sometimes when posed a direct question, you can surprise even yourself with the answer. We don’t often get interviewed in the manner of movie stars and famous athletes, but if we did, consider how you might answer pointed questions about life lessons.
[CLICK HERE to read the article, “Kevin Costner: What I’ve Learned,” from Esquire, April 23, 2012.]
[CLICK HERE to read the article, “Hope Solo: What I’ve Learned,” from Esquire, accessed June 12, 2015.]
At the end of the day, one of the best ways to plan, set goals, compromise and move forward is to communicate better — with ourselves and with each other. In the financial world, we get to know our clients through face-to-face meetings, stay in touch via phone calls and emails and sometimes work with clients through written materials — questionnaires, profiles and individualized plans. Everyone has different communication preferences, but what’s important is that we discover what it is we really want to say, and mean it.
If we can help you better define your plans for the future, please reach out and communicate with us by whatever means suit you the best.
We are an independent firm helping individuals create retirement strategies using a variety of insurance products to custom suit their needs and objectives.
The information contained in this material is provided by third parties and has been obtained from sources believed to be reliable, but accuracy and completeness cannot be guaranteed; it is not intended to be used as the sole basis for financial decisions.
If you are unable to access any of the news articles and sources through the links provided in this text, please contact us to request a copy of the desired reference.
Content obtained through a PR firm. | <urn:uuid:e1ae00f4-747c-49c3-9457-beeb5805e931> | CC-MAIN-2024-10 | https://wasmithfinancial.com/whats-that-you-say/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00758.warc.gz | en | 0.952641 | 798 | 2.53125 | 3 |
In recent years, there has been much interest in the potential health benefits of CBD (cannabidiol). Although CBD is best known for its ability to relieve pain and reduce stress, a new study suggests that it may also aid in weight loss. CBD works with the body’s endocannabinoid system, which regulates many physiological processes such as appetite and metabolism. By promoting balance in this complex system, CBD can help weight loss efforts. By reducing inflammation, boosting metabolism or curbing cravings, adding CBD to your health regimen can help you reach your weight loss goals. Let’s look at the possible ways CBD can help you on your weight loss journey.
What is CBD (Cannabidiol)?
Cannabidiol, or CBD for short, is a natural compound that comes from the cannabis plant. CBD is non-psychoactive, meaning it doesn’t give you a “high” sensation like its THC counterpart. CBD is usually extracted from hemp plants, which have minimal THC levels. It is known for its potential therapeutic benefits, including pain relief, anxiety reduction, and sleep promotion. CBD supports overall well-being through its interaction with the body’s endocannabinoid system, regulating many physiological processes. It is available in a variety of forms such as oils, tinctures, edibles, and topicals, making it readily available to individuals seeking its potential benefits. Research on CBD is still developing, but its popularity is growing due to its wide potential applications.
How CBD May Help Weight Loss?
- Boosting metabolism: According to some studies, CBD can boost metabolism by stimulating the endocannabinoid system in adipose, or fat, tissue. This process causes the calorie-burning conversion of white fat into brown fat.
- Appetite Suppression: CBD interacts with CB1 receptors that regulate appetite and food intake. Because of this interaction, appetite can be reduced, allowing one to consume fewer calories without feeling hungry or starvation.
- Reducing Fat Storage: CBD can improve fat breakdown by activating genes and proteins involved in fat breakdown and preventing the formation of new fat cells. This mechanism can facilitate the reduction of excess body fat.
CBD’s Anti-Inflammatory Effects
While more research is needed, A research study suggests that CBD may help with weight loss indirectly. Firstly, CBD can help reduce inflammation in the body, which is often associated with obesity and metabolic problems. CBD can help with weight management and a better metabolic rate by reducing inflammation. Furthermore, CBD may be able to control appetite and reduce cravings. It may promote more balanced eating habits as it has been demonstrated to interact with brain receptors that regulate hunger and satiety. However, it is important to remember that CBD should not be viewed as a miracle weight loss solution and that a balanced diet and healthy lifestyle are critical to reaching weight loss goals.
Managing Stress and Anxiety with CBD(Cannabidiol)
CBD has gained recognition for its ability to reduce anxiety and stress. According to research, CBD can facilitate feelings of calmness and relaxation by interacting with brain receptors that regulate mood and anxiety. Through its effects on serotonin levels, CBD may be able to reduce symptoms of anxiety and stress. Furthermore, CBD has been discovered to have anti-inflammatory properties, which may further contribute to stress reduction. Many people use CBD in their self-care regimens as a natural alternative to traditional anxiety medications. To manage stress or anxiety, it’s important to talk to a healthcare provider before starting any new supplements.
Improving Sleep Quality
Both overall health and weight loss depend on getting enough sleep. Your body produces more ghrelin hormones when you are not getting enough sleep, which stimulates your appetite. This hormone stimulates appetite. At the same time, lack of sleep reduces leptin levels, a hormone that suppresses appetite. The imbalance causes an increase in cravings and overeating.
Research shows CBD(Cannabidiol) may help improve sleep in various ways:
- CBD can help calm racing thoughts and anxiety that interfere with sleep. CBD facilitates deep, restful REM sleep by reducing anxiety and tension in the body and mind before sleep.
- Research suggests that CBD can improve overall sleep quality. Adequate sleep is essential for effective weight loss.
- CBD has been proven to help people with chronic pain sleep better at night. Pain can frequently interfere with one’s ability to sleep. CBD can improve sleep quality by reducing pain.
- CBD may also help with sleep apnea. As CBD supports respiratory function, it may reduce sleep apnea events and enable longer periods of uninterrupted sleep.
Using CBD to improve sleep can help with weight loss. With adequate rest, your body is energized to exercise, avoiding cravings becomes easier, and your metabolism functions optimally. Any diet and lifestyle changes should include better sleep patterns.
Incorporating CBD into a Weight Loss Plan
When taking CBD for weight loss, it is important to have realistic expectations. CBD(Cannabidiol) is not a magic bullet that will cause weight loss on its own. Instead, it should be combined with a balanced diet and frequent exercise into a healthy lifestyle.
Some lifestyle changes that can complement your CBD(Cannabidiol) regimen include:
- Eat whole grains, lean meats, fruits and vegetables
- Drink more water
- Cut back on excess sugar and processed foods
- Exercise for 30 to 60 minutes most days of the week
- For weight loss, it is advisable to start the CBD dose modestly and gradually increase as needed.
The best way to take Cannabidiol oil is sublingually (under the tongue) 15-30 minutes before eating. This timing allows CBD(Cannabidiol) to interact with your body’s endocannabinoid system before eating. This may suppress appetite and activate fat-burning pathways.
When using CBD, consistency is essential. For best results, continue taking it daily in a dose that suits you. Weight loss takes time, so stick to your CBD routine and healthy lifestyle. Over time, CBD can help you lose weight by increasing your metabolism, suppressing appetite, and burning fat.
Potential Risks and Side Effects
Although CBD can help with weight loss, there are potential risks and side effects that are important to be aware of.
- Cannabidiol can interact with certain medications, including blood thinners, immunosuppressants, antidepressants, and more. It’s critical to consult your doctor before using CBD, especially if you are taking any medications.
- Taking the wrong dose of Cannabidiol can increase side effects. Start with a low dose and increase gradually over several weeks if necessary. Consuming too much CBD at one time can cause dizziness, hunger, fatigue and drug interactions.
- The science behind CBD(Cannabidiol) and weight loss is still preliminary. Although preliminary findings are encouraging, larger and longer clinical trials are needed. For weight loss, CBD is not a miracle cure. It should be included in the whole healthy lifestyle.
- Regulations for CBD products are lacking. Some CBD products may have inaccurate labels or contain contaminants. Buy CBD only from reputable companies that offer third-party lab testing to verify purity and potency.
- CBD may not be safe for some people, such as pregnant/nursing women, children, and those with liver problems. Discuss using CBD with your doctor first If you have any medical problems.
- Although generally well tolerated, potential side effects may include changes in liver enzyme levels, fatigue, nausea, diarrhea, and irritability. If you experience any negative effects, stop using CBD(Cannabidiol) and consult a doctor.
- Further investigation is still needed on the long-term safety and side effects of CBD, especially at higher doses. Be careful and talk to your healthcare provider before using CBD(Cannabidiol), even if it helps you reach your weight loss goals. Start with a low dose and take it gradually to minimize the risks. | <urn:uuid:b33b52c9-ec0f-44f0-a69e-09e1b51e09f1> | CC-MAIN-2024-10 | https://www.allmedscare.com/cannabidiol-or-cbd-is-it-really-effective.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00758.warc.gz | en | 0.946598 | 1,658 | 2.546875 | 3 |
Mucous membranes are tissues that line organs and entrance points to your body including your nasal cavity, eyelids, windpipe and lungs, nose, mouth, urethra and genital organs. These areas are the first to be hit by invading parasites and microbes. Taking supplements that strengthen mucous membranes will protect your overall health. Not all supplements may be right for your individual situation. Consult with your doctor before taking supplements.
Vitamin C acts as an antioxidant in your body. As an antioxidant, this vitamin fights free radicals throughout your body that are trying to harm your cells, according to the Office of Dietary Supplements of the National Institutes of Health. If left unchecked, free radicals can lead to health ailments such as infections, colds and flu, premature aging and disease. Vitamin C supplements come in a variety of forms. Powders can be sprinkled into beverages or cereals. Tablets or capsules can be taken with other supplements. Or, vitamin C can be consumed as part of a multivitamin formula. Many manufacturers add extra vitamin C to items such as orange juice and/or energy bars. Take vitamin C daily since your body does not store this nutrient. The proper amount of vitamin C depends on your age and whether you are pregnant or lactating. If you smoke or are around secondhand smoke, your body needs extra vitamin C. Vitamin C may interact with some medications.
Video of the Day
Vitamin A plays a major role in keeping your respiratory, intestinal and urinary tract surface linings healthy. This nutrient assists in keeping your mucous membranes and skin properly nourished to function as a barrier against harmful viruses and bacteria, according to the Office of Dietary Supplements. Vitamin A makes white blood cells, which fight off infections. The nutrient regulates your immune system. Help your mucous membranes by taking retinol supplements. Retinol is a form of vitamin A usually found in animal products, according to the Office of Dietary Supplements. Retinol is most easily absorbed by the body. Get vitamin A through beta carotene supplements. Beta carotene can be sold as a single ingredient or included as part of a multivitamin supplement. Recommended daily allowances of vitamin A vary according to gender and age.
Goldenseal has long been used for treating inflammations and irritations of respiratory, digestive and urinary tract mucous membranes, according to Holistic Online. One of goldenseal's active components is berberine, found in the plant root and rhizome. Berberine may fight against fungi and bacteria, according to Medline Plus of the National Institutes of Health. Berberine has antibiotic properties that can keep harmful bacteria such as E. coli and salmonella from binding to urinary tract walls. Topical applications of goldenseal can fight against eye and skin infections, rashes, wounds and herbes blisters. Goldenseal may be helpful in treating colds, flu, upper respiratory infections, digestive disorders, vaginal infections and pain, and diarrhea. Oral applications of goldenseal may not be as effective as topical applications, according to Medline Plus.
Some medications counteract goldenseal's efficiency. Goldenseal has no known interactions with foods or other herbs. Holistic Online recommends most people consume four to six grams of powdered or liquid goldenseal supplements daily for no longer than three continuous weeks. Goldenseal is not recommended for infants, pregnant or lactating women. | <urn:uuid:37643032-7a86-4bad-8319-7ed0cc301a01> | CC-MAIN-2024-10 | https://www.livestrong.com/article/278727-supplements-to-strengthen-the-mucous-membrane/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00758.warc.gz | en | 0.922963 | 695 | 2.953125 | 3 |
The North Wind’s sister/cousin, and the cubs' great aunt. The South Wind takes the form of an African-looking woman. Even though all the Cardinal Winds have the ability to take the form of both genders, she is the only one of the group who's chosen to take a female form. She goes by the names of Yoruba (a reference to Yoruba religion), Notus (the south wind in Greek mythology) and Storm Mother. She could be considered the more compassionate and sensible one of the Winds, although she has been shown to have a more ruthless, cunning side as well.
After hearing the West Wind’s ideas, the South Wind suggested that they should instead conduct themselves as proper guests until Bigby had another outburst. When that happened, they would be "fully justified" in stepping in with force. The other winds agreed to the plan, with a few modifications from the East Wind, who suggested that they not only killed the entire wolf clan, but the North Wind’s attendant winds as well. The West Wind and the South Wind both agreed. Later, it becomes clear to the winds that the testing might place the children in mortal danger, and the East Wind remarks that if the cubs are killing themselves in the process of testing, the fewer the winds will have to take out when they are compelled to step in. The South Wind reminds the others that their patience is paying off and that they were right to hold off taking a direct hand.
One of the "cubs", Winter, is eventually chosen as the new North Wind. The South Wind watches in silence and appears to accept the new development. However, Winter becomes very afraid when she starts having premonitions of her older self as a cold and selfish North Wind that hurts people. The East Wind refers to the new development as "marvelous" because the new North Wind will be timid, and the South Wind appears to be very pleased and answers that "our day of ascendancy has come at long last". | <urn:uuid:f55946ae-9aa1-4b04-9812-c4fb06b2db2c> | CC-MAIN-2024-10 | https://comicvine.gamespot.com/south-wind/4005-86616/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00758.warc.gz | en | 0.975231 | 414 | 2.703125 | 3 |
Geology is the science of the study of the Earth that deals with the rocks that the earth is composed of, and the chemical and physical changes that the earth is going through. If you are learning about Earth science in your homeschool, you will most likely be learning about geology and the study of rocks.
Children are fascinated with rock hunting, and rock collecting. Learning about rocks is a great way to engage your children in a fun, and interesting sub topic of science. Download some free fossils worksheets and rock printables to add to your study of geology.
Rocks and Fossils Worksheets
When you are learning about rocks that are found in the earth, you will most likely come across the topic of fossils! I love how homeschooling lets us go down so many different rabbit holes and areas of interest. Kids love to learn about fossils and how they are found.
We have put together a ton of resources for you to be able to study both topics with your children. There are free printables, unit studies and lesson plans, as well as websites for even more research on both the topics of rocks and also fossils. Enjoy!
- Rocks and Minerals Unit – Ginger Snaps
- Rock Cycle Fill in the Blank Printable – Teacher Vision
- Rocks and Minerals Review Sheet and Quiz for Highschool
Free Printable Rock Cycle Worksheets
Types of Rocks Worksheet Printables
Learning About Rocks
The Handbook of Nature Study Blog has some wonderful studies and articles to learn and study rocks:
Online Rock Resources:
- Kids Love Rocks – rock and mineral website for kids
- Geology.com Rocks has pictures of the three different types of rocks to help with classification.
- Online Kids Discover Rocks and Minerals
- Ducksters Rock Science
- DK Find Out: Rocks and Minerals
- Instant Download: Rock Terminology Copywork Notebook – In this rock terminology copywork notebook, your children will not only learn the basic rock terms, they will also learn many other rock types and terminology. They will learn 30 keywords and definitions while they are practicing their handwriting at the same time.
Recommended Resource: The Geology Student Notebook
This geology notebook is a great resource to use when you are studying about rocks and fossils for earth science.
- 3 Types of Fossils – Elemental Blogging
- Fossil Definition Worksheet – Have Fun Teaching
- Fossils Fill in the Blank Worksheet – Have Fun Teaching
Printable Fossil Activity Worksheet
How Fossils Form
- Fossil Flow Chart and How Fossils Form – Enchanted Learning
Types of Fossils Printable
- Types of Fossils – Enchanted Learning
Printable Fossil Identification Chart
If you enjoy looking for fossils, this handy printable fossil identification chart is a great thing to take along with you. These fossil identification sheets cover different parts of the country, depending on where you are looking for fossils.
Online Fossil Resources
- Geology.com Fossils has images on different fossils and paleontology
- Answers in Genesis has a page with a video devoted to fossils found within the earth, from a creationist perspective.
- DK Find Out: Fossil Facts for Kids – has articles and clickable photos with information on fossils, fossil hunters, where fossils can be found and so much more.
Recommended Resource: The Fossils Student Notebook
This fossils notebook is a great resource to use when you are studying about rocks and fossils for earth science.
Learning about rocks and fossils can be fun for students. If you incorporate different activities when you teach about the 3 types of rocks, it makes it more enjoyable.
Sarah is a wife, daughter of the King and Mama to 4 children (two homeschool graduates) She is a an eclectic, Charlotte Mason style homeschooler that has been homeschooling for over 20 years.. She is still trying to find the balance between work and keeping a home and gardens. She can only do it by the Grace of God, coffee and green juice | <urn:uuid:a2f34ad8-dee6-4b5d-b531-9e94577d7e93> | CC-MAIN-2024-10 | https://homeschoolgiveaways.com/free-printables-and-resources-on-rocks-and-fossils/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00758.warc.gz | en | 0.913522 | 829 | 4.03125 | 4 |
As adverts for the initiative hit TV screens across the UK from 18th August, shoppers are being asked to come into store and drop the Tesco blue token they receive at checkout into the voting box for one of three local schools or young person’s projects.
The grants awarded will help schools and children’s groups provide nutritious food and healthy activities that support young people’s physical health and mental wellbeing, such as breakfast clubs or snacks, and equipment for healthy activities.
Schools or children’s groups that could benefit from a Stronger Starts grant, are also being asked to apply by visiting www.tescoplc.com/strongerstarts.
The scheme, supported by UK community charity Groundwork, replaces the former Tesco Community Grants funding programme.
Recent research from Groundwork found that 78% of schools are currently having to provide food for children from their own budget.
And Stronger Starts research carried out by Tesco in July, found that more than half (51%) of parents agree that their child struggles to concentrate at school if they do not have breakfast.
Other highlights showed that nine out of 10 (90%) 5-11 year-olds want to help others when they grow up and make the world a better place. 92% of them also said that looking after the planet was important to them.
When it comes to their future choice of career, Tesco’s Stronger Starts research found that 86% of 5-11 year-olds would like a job that helps others and a third (36%) dream of one that helps to protect the planet.
Today’s youngsters’ dream jobs include: doctor, nurse, firefighter, midwife, scientist, vet and zoo keeper. However, some youngsters dream of going into more unusual careers such as: bell ringer, Lego builder, flying doctor, author and prime minister.
Unlike previous generations, only one in 10 dreams of being famous when they grow up.
While children dream of being a vet, a doctor or a scientist, almost half (43%) of parents worry that their child might not reach their full potential. When asked what factors would help their child realise their aspirations, two thirds (67%) believe the key is schools having all the resources they need. Almost half (49%) believe a healthy meal every day is a factor; 44%, more support for mental health and 41% think that more opportunities for sport and exercise are key.
Claire De Silva, Head of Communities and Local Media, said: “We are so excited to be bringing thousands of schools and children’s projects our Stronger Starts grants. Our aim is to inspire children who deserve the opportunity to thrive and give our customers the chance to vote with their blue tokens for their local schools and children’s projects that need extra help.”
Schools and children’s groups will be able to apply via Groundwork for a grant of up to £1,500. Grants are for activities that focus on providing food to kids such as fruit for breakfast clubs or snacks to enjoy throughout the day, and for equipment for outdoor and indoor activities.
Successful applications will go to a customer vote in their local Tesco store. Two out of the three blue token voting boxes by the checkout will be dedicated to local schools with the third given over to local community projects nominated by each store’s colleagues. Customers can then choose which of the three projects they’d like to support by voting with a blue token. | <urn:uuid:843cf00c-45e1-43c4-9a9e-3d74060c46ed> | CC-MAIN-2024-10 | https://www.monmouthshirebeacon.co.uk/news/tesco-supports-local-children-with-blue-token-scheme-633383 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00758.warc.gz | en | 0.972713 | 722 | 2.5625 | 3 |
Acute soil compaction, uncontrolled growth of weeds, heavy thatch or deficiency of nutrients and organic matter can lead to the destruction of a lawn. In such a situation, removing the existing turf and replanting the lawn is the only way to prevent it from getting ruined further. Replanting a lawn is not a tough job. All the life can be brought back to the place by planting seeds, sprigs and laying sods. If you want to know the ways to replant the place, go through this article. You will get some tips on how to replant the lawn, in the following lines.
Replanting Your Lawn
One of the best ways to replant lawn is to scatter seeds. Prepare the soil before planting the seeds, by removing all the turf from the area. Now, plant the seeds by hand, leaving even space between them. Keep the soil moist by irrigating it during germination period. Planting the seeds in the fall season is recommended, as this will ensure vigorous plant growth.While choosing the species of the seeds, make sure that they can be easily grown in your lawn’s soil.
You can also replant the lawn by planting sods throughout the place. Purchase carpet-like sheets of grass and cut them into the desired length. Make use of a sharpened carpet knife or masonry trowel to cut the sod into round or square pieces. Before laying the sod, apply a starter fertilizer, like phosphorus, to the surface of the soil and lightly irrigate the area. Using a lawn roller, roll the site immediately after the sod is laid.
To replant a lawn, you can plant sprigs of plants in it. After planting sprigs on the site, 3 to 4 inches apart, cover their roots with soil. Keep them moist and free of weeds, until the grass is deep-rooted. Frequent and light irrigation becomes mandatory when the root system of the sprigs is growing.
- The lawn should be seeded at the appropriate time and at the rate recommended for the chosen species of seeds.
- Use nitrogen fertilizer 6 weeks after germination of seeds.
- Do not forget to keep the sod moist, until it is well rooted. | <urn:uuid:f64aeded-333b-42a1-a3c6-f3d5ab08e2fd> | CC-MAIN-2024-10 | https://lifestyle.iloveindia.com/lounge/how-to-replant-lawn-4204.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00858.warc.gz | en | 0.943651 | 457 | 2.90625 | 3 |
These four critical questions make it clear who we are and what we do. We ask ourselves these questions to guide our work and our improvement.
Why do we exist?
To transform life chances by achieving the highest possible standards and preparing all our students to lead successful lives.
How do we behave?
- Hard work
We are determined to see things through to the end and are resilient when faced with challenges.
We do the right thing because it is the right thing to do.
We work together to help everyone succeed.
What do we do?
- We educate, safeguard and champion all our learners.
- We set high standards for ourselves and our learners.
- We build the powerful knowledge and cultural capital which stimulate social mobility and lifelong learning.
How will we succeed?
- Aligned autonomy
- Keeping it simple
- Talent development | <urn:uuid:baf39cc2-f160-4fa4-8ea6-27c016c20769> | CC-MAIN-2024-10 | https://www.academytransformationtrust.co.uk/about-us/our-mission/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00858.warc.gz | en | 0.88226 | 176 | 3.25 | 3 |
Check out this month’s newsletter from Clermont Coalition for Activity & Nutrition (CAN), pasted below.
Did you know Mental Health Awareness Month has been observed during the month of May since 1949? Created by Mental Health America, the goal of this month is to raise awareness, highlight the realities of living with mental illness, and discuss strategies for prioritizing mental health and wellness. The theme of this year’s Mental Health Awareness Month is “Back to Basics,” with a goal of providing “foundational knowledge about mental health and information about what people can do if their mental health is a cause for concern.”
Given 1/3 of Americans now show signs of clinical anxiety or depression, Mental Health Awareness Month presents an opportunity for HealthSource of Ohio to strengthen our efforts to ensure our patients and communities receive the behavioral health care they need. HealthSource of Ohio’s Behavioral Health Program, led by Dr. Michael Bruner, Psy.D., utilizes Behavioral Health Consultants trained to deliver exceptional care and counseling under the integrated Cherokee Health Systems model. Behavioral Health Consultants help our patients with almost anything, including depression, anxiety, parenting, stress, alcohol and drugs, sleep, weight loss, diet and exercise, diabetes, and so much more. To honor our patient’s busy schedules, Behavioral Health Consultants are scheduled in coordination with Primary Care Providers whenever possible, with telehealth options also available.
HealthSource of Ohio understands that to improve the health of our communities, data is needed to drive decisions and to identify gaps in care. For these reasons, we complete ongoing Community Health Needs Assessments (snapshot below) to measure general, maternal, and child health factors; chronic and infectious diseases; environmental factors; substance abuse; and food insecurity rates to guide strategy, create partnerships, and develop programs to address these needs, an example being the development of the Behavioral Health Program. HealthSource of Ohio works year-round to educate our patients and communities on behavioral health and wellness through “Wellness Wednesdays,” free educational videos with information and advice from our Behavioral Health Consultant team.
For more information about HealthSource of Ohio’s Integrated Behavioral Health Services, please visit healthsourceofohio.org or check us out on social media. To schedule a behavioral health appointment, please call 513-575-1444.
|2021 County Health Rankings Data
(Number of deaths due to suicide per 100k)
|Mental Health Provider Ratio
(Ratio of population to mental health providers)
|Poor Mental Health Days
(Average number of mentally unhealthy days within the last 30 days)
|Frequency of Mental Distress
(% of adults reporting ≥14 days of poor mental health per month)
(% of youth aged 16-19 who are neither working nor in school) | <urn:uuid:45ae24e7-81dd-4a6c-94ec-1f014ca74521> | CC-MAIN-2024-10 | https://www.healthsourceofohio.org/2022/05/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00858.warc.gz | en | 0.898513 | 587 | 2.671875 | 3 |
Cross posted from 100ResilientCities.org.
In 1924, the architect George Martin Huss published a letter inThe New York Times, responding to an article about whether the newly constructed Woolworth Building was likely to collapse on a windy day. Skyscrapers tended to make people nervous in their earliest days, as Ric Burns describes in his documentary history of New York; many chose not to walk too near them, lest these impossibly tall buildings of 10 or 20 stories fall down.
Huss, however, knew the stately new building would be fine. “There is a well-known quality of any structure, which is well built, called resilience, which enables the material under stress to resume its original condition.” He recalls a trip he took to Southern Bavaria in 1873, on which he observed a stone-built church tower, which “had passed through The Thirty Years’ War and bore the marks of solid cannon shot.” To reassure nervous guests during a violent rainstorm, the architect explained those same principles of resilient engineering. (Incidentally, Huss’s Hooper Fountain, erected in 1894, is still standing.)
After nearly a century of stresses of all descriptions, cities are responding in a wide variety of ways. Some, like New York, are now incorporating resilience into building codes; the U.S. Green Building Council, which wrote and administer the LEED standards for buildings, is making resilience a policy priority as well.
The Rockefeller Foundation asked several leading architecture critics for their definition of architectural resiliency—and what contemporary architects, engineers, students, governments, and city dwellers can learn from buildings past and present.
Justin Davidson, architecture critic at New York magazine:
The first thing that popped into my mind was the YouTube video of the Sendai Mediatheque building [in Sendai, Japan — pictured above] — designed by Toyo Ito — during the earthquake in 2011. You can see it was designed to withstand a massive shock, and in the clip, you can see that each floor is floating free of the columns, so that the slabs wave, but the structure doesn’t crack. In her Wall St. Journal piece, Ada Louise Huxtable devoted her whole review of the building to its elegant, earthquake-resistant design.
In recent years, there’s been a really big push to make new buildings able to withstand earthquakes that would otherwise be catastrophic. After the 1994 Northridge earthquake in California, there was a broad nationwide push to get engineers together and study how buildings respond in different soils. Now there’s starting to be a similar kind of scientific push to understand the dynamics of floodwaters. Obviously, you can simply raise a building above the flood zone so that it just stays dry, but there are other things you can do. It’s been an issue in Dutch design for a long time: they have floating houses and larger buildings designed to have water go through and underneath them, while the mechanical systems stay dry.
A resilient building is a building that rolls with the punches. A resilient building in a flood zone isn’t necessarily designed not to get wet—it can get wet, because it’s designed not to fall apart. A perfect example is in Red Hook [Brooklyn], which got pretty brutally battered by floodwaters during Hurricane Sandy, since it’s so low-lying. The two biggest businesses in Red Hook are Ikea and Fairway [supermarket]. The way Ikea is designed—where they lift everything to the second floor—meant that it could withstand damage, restock and go back to business immediately. But Fairway is in a Civil War–era warehouse, with no protection, and the entire store was underwater. They had to close, repair, and restock their entire inventory. A smaller business would have been wiped out completely.
The buildings that have remained from ancient times and have withstood all kinds of stresses—pillaging, gravity, war, decay—were the ones that were built redundantly, with enough extra material that they could survive a certain amount of destruction. They weren’t on the edge. A lot of engineering today is about how little steel can you use, how lightweight can the building be, how accurately can you calculate the margins? When you’re dealing with heavy masonry buildings, when one piece of it goes, it doesn’t mean the whole thing falls down.
Frederico Duarte, Lisbon design critic:
When you live in Lisbon like I do, the words resilient building make you think about one thing: will it survive the next big earthquake? In 1755, one of the strongest earthquakes to ever hit Europe destroyed much of the Portuguese capital. Its earthly shockwaves were felt as far as Jamaica; its human aftermath made Voltaire break from his philosophical optimism and ask for less philosophizing and more humanism.
The military engineers and architects who rebuilt Lisbon’s downtown based on a grid and on other practical and rigid design principles designed what was seen as the first urban materialization of the Enlightenment. They also created and systematically implemented the first earthquake-proof building structure, which was based on a wooden grid “cage,” and that is still seen today as a highly resilient building method. Today, much of these buildings survive, but few of their cage structures have remained intact. Walls were taken down, basements were dug, and new floors were added.
On more recent renovations, it became fashionable to show the wooden beams these cage structures are made of, making previously wood-and-mortar, opaque walls lighter, semi-transparent, opening up each apartments while revealing the building’s structure and history. Some specialists say this is hardly a sound practice, and no one really knows what will happen to Lisbon if an earthquake like the one that hit it on All Saints Day over 260 years ago. Everyone fears the worse, but many wonder how well these enlightened cages will take it.
Mark Lamster, architecture critic of the Dallas Morning News and professor in the architecture school at the University of Texas at Arlington:
The architecture business cycles through “isms” at a rapid rate. Sustainability was in many ways a renunciation of the highly formal “starchitecture” design of the 1990s. The newest approach, accelerated in the wake of Katrina and Sandy, is resiliency: How can we protect our buildings and our cities and landscapes from the environmental and man-made disasters that will inevitably arrive?
Five years ago, architects and planners rushed to redevelop waterfronts as public amenities. Now there’s a bit more circumspection about the appropriate way to do that. But conscientious architects have always been sensitive to building spaces that are formally and materially inventive, work in their environments, and last for decades, if not centuries. The Parthenon, the Coliseum, the Seagram Building. Quality lasts. | <urn:uuid:d6c9a94a-6842-464f-967e-7a95392636b4> | CC-MAIN-2024-10 | https://www.rockefellerfoundation.org/insights/perspective/resilient-buildings/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00858.warc.gz | en | 0.969817 | 1,429 | 2.6875 | 3 |
The Abracadabra approach to learning through songs and tunes has set countless beginners on a clear path of progress and enjoyment with their chosen instrument.
Now in its third edition, features include:
• Technique carefully graded in 20 learning steps
• Clear fingering and bowing diagrams
• Concise theory explanations
• Enough flexibility to suit individual teaching approaches
• Duet accompaniments, trios and rounds throughout
• Can be used alongside the companion tutors for viola,
cello and double bass
Publisher: HarperCollins Publishers
Number of pages: 64
Weight: 240 g
You may also be interested in...
Would you like to proceed to the App store to download the Waterstones App? | <urn:uuid:d7b1bfdd-2552-49d6-984f-6e9a914351ee> | CC-MAIN-2024-10 | https://www.waterstones.com/book/abracadabra-violin-pupils-book/peter-davey/christopher-hussey/9781408114605 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00858.warc.gz | en | 0.910055 | 148 | 2.609375 | 3 |
AI is a technology that triggers many changes in many areas of life in recent years. In the e-commerce industry, it allows for an in-depth analysis of consumers' preferences and behaviours, which in turn may be used by online shops to personalise communication with customers or automate sales processes. Can artificial intelligence really match the human intellect?
The video version of this article is available also on YouTube:
Artificial intelligence, what is it?
To find the answer to the above question, we must first understand what AI really is. Artificial intelligence is, to put it simply, an algorithm created to imitate human behaviour. The operation of algorithms learning from previous results is always predictable. At the same time, their work is also faster, and thus – more efficient than the one performed by a human. The intensive development of computer science and electronics favours the work on artificial intelligence – so it's no wonder that this is a stepping stone into our everyday life.
Artificial vs. natural intelligence
There is no doubt that artificial intelligence plays a crucial role in the development of science and technology. With the help of AI systems, we can diagnose diseases, control vehicles or respond to the individual needs of consumers. Wherever it comes to the analysis of large data sets, computers have a significant advantage over people.
They do not get tired or distract, and thanks to machine learning, they work efficiently and effectively. However, while it is difficult to deny machines speed and reliability, creativity and intuition are still the features reserved exclusively for people.
Despite the fact that the machines are smart and hard-working, they are only programmed to perform specific activities, consistent with the accepted patterns. Training to improve specific algorithms makes them more accurately recognise the presented images, predict failures or interpret data about consumers. However, they cannot cope with human feelings, the flexibility of thinking and problem solving, or the ability to capture the nuances of a given situation.
AI needs a human being
The algorithms cannot independently change the scope of their own actions, and their work is fully defined from the outside. For example, artificial intelligence cannot exist without a human being whose goal is to provide high-quality data, supervise the operations performed, and anticipate the effects of the algorithms.
It is the human's duty to control not only the effectiveness of the operation but also its compliance with ethical principles. All this is to minimise the main threats related to artificial intelligence – cyber-attacks, the danger of capturing private data or making erroneous decisions by machines. | <urn:uuid:96b3f1c0-9b72-44d6-8eb5-05209fc7ce32> | CC-MAIN-2024-10 | https://howto.quarticon.com/en/articles/4126566-is-ai-smarter-than-a-human | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00858.warc.gz | en | 0.949948 | 509 | 3.203125 | 3 |
Fernán Caballero was the pen name of Cecilia Francisca Josefa Böhl de Faber y Ruiz de Larrea (1796–1877). In 1811, she published the short fable “The Hump,” which is a take on the fairy tale trope of a king promising to give half his kingdom away to anyone who would marry his stubborn daughter.
What struck me in reading this story is the oddity of the trope. Sure, monarchs would marry their children (or themselves) off to make alliances with other monarchs, but part of this trope is that it is so random. Marrying the princess off to whoever could slay a dragon or whatever may demonstrate that the individual is skilled in combat, but it doesn’t necessarily equate to the skills to rule a kingdom.
In “The Hump,” the king determines to marry his daughter off to whomever can say what materials she used to have a tambourine made. Even less of an indicator of ability to rule a kingdom, although perhaps useful if the king is more interested in marrying his daughter off to a musician.
This type of story is often a fable, providing a moral about behavior, however in this particular case, the princess’s behavior isn’t punished in the long run, instead resulting in a happily ever after. Not for all the characters, but certainly the princess.
In this story, the princess was on her way to Mass when she was accosted by a beggar. She brushed him off and he flicked a flea at her. The princess took the flea and fattened it up, eventually having its skin turned into the tambourine in question. Princes, kings, and commoners failed to identify the material until the princess spotted a prince and fell in love with him. She tried to tell him what the tambourine was made of, but he failed to hear her. The beggar did, though, and used the knowledge to win her hand.
Had the story stopped there, Caballero would have provided a moral to her fable that was in keeping with tradition. However, half the story remained to be told.
After being exiled by her father (who cleverly only promised marriage, not half his kingdom), with her beggar husband, the princess managed to rid herself of him, but at the expense of gaining his hump (it is a fable, laws of physics and logic need not apply, accept things as they are). The hump mimics her speech, so she pretends to be a mute.
Upon finding the lands where the prince she fell in love (or at least lust) with, she gets hired as a mute, hunchbacked maid (but she’s happy just to be near him). He, however, needs to be married off to a suitable princess, which she no longer is. However, everything ends happily ever after for the princess and the prince, although, in a clever aside that really nails the story, not for the narrator.
Caballero is aware of the traditions with which she is playing and clearly savors turning them upside down. She also is happy to break the fourth wall at the very end, reaching out directly to the audience in a manner that makes this a clever and appealing story.
The version I read appeared in The Big Book of Classic Fantasy, edited by Ann and Jeff VanderMeer and translated into English from Spanish by Marian and James Womack.
Steven H Silver is a twenty-time Hugo Award nominee and was the publisher of the Hugo-nominated fanzine Argentus as well as the editor and publisher of ISFiC Press for eight years. He has also edited books for DAW, NESFA Press, and ZNB. His most recent anthology is Alternate Peace and his novel After Hastings was published in 2020. Steven has chaired the first Midwest Construction, Windycon three times, and the SFWA Nebula Conference six times. He was programming chair for Chicon 2000 and Vice Chair of Chicon 7. | <urn:uuid:2100dcdd-44a1-4f1d-871d-958af3017eb8> | CC-MAIN-2024-10 | https://www.blackgate.com/2024/02/09/a-to-z-reviews-the-hump-by-fernan-caballero/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00858.warc.gz | en | 0.981911 | 845 | 3.171875 | 3 |
Over many years of clinical practice, I have seen many Parkinson’s disease (PD) patients visit the emergency room or clinic because of dizziness and/or syncope (passing out). In most cases, the obligatory cardiac evaluation finds no underlying factor. Many patients are referred to a vestibular physical therapist, someone who specializes in gaze and gait stabilization, to fix vertigo; however, this approach is useful for few patients. Most patients actually have orthostatic hypotension, which can be a manifestation of Parkinson’s and made worse by Parkinson’s medications.
Orthostatic hypotension is common in PD and affects 15 to 50% of patients. It has been defined as a drop in systolic blood pressure of greater than 20 mmHg, or a decrease in diastolic blood pressure of greater than 10mmHg within 3 minutes of changing to a standing position. Dr. Jankovic and colleagues at the Parkinson's Foundation Center of Excellence in Houston, TX, recently published information about orthostatic hypotension in a large series of PD patients. They reviewed the records of 1,318 patients and found that symptomatic orthostatic hypotension occurred in “81% of patients with multiple system atrophy, in 18% of PD, and in 19% with non-multiple system atrophy (MSA) atypical parkinsonism.” They found that orthostatic hypotension occurred in older patients with more advanced PD, and longer disease durations.
When orthostatic hypotension is verified, patients should consider reducing or eliminating the medications that contribute to the problem, including antihypertensive medication. Dopaminergic medications (particularly the dopamine agonists) may worsen orthostatic hypotension. Non-pharmacologic strategies which may improve orthostatic symptoms include increasing fluid intake, increasing dietary salt andcaffeine, and using tight, thigh-high support stockings to prevent pooling of blood below the waist. Purchasing a hospital bed, or raising the head of a normal bed 10-30 degrees may improve standing blood pressure when performed on a regular basis over several weeks.. If needed, pharmacologic agents to raise blood pressure may be used.
Orthostatic Hypotension Treatments
- Fludrocortisone 0.1 mg once daily
5-10 mg three times per day; last dose should not be after 6pm to avoid supine hypertension
25-50 mg q4-6 hours
- Phenylpropanolamine start 25 mg twice per day or
Do not take after dinner to avoid insomnia and supine hypertension.
Finally, some practitioners add drugs named Mestinon and Midodrine, used for myasthenia gravis, or other drug treatments. There is also a medication in clinical trials called droxidopa, L-threo-3,4,-dihydroxyphenylserine. This drug is a pro-drug of norepinephrine. The drug has been promising in MSA and cases of pure autonomic failure. Many scientists are working to discover if and how this drug may be used in PD.
The bottom line for PD patients who are passing out (syncope), or getting dizzy, especially when standing up or when changing positions, is that this may be your Parkinson’s disease, your Parkinson’s disease medications or both. Consult your doctor immediately, and have your blood pressure taken while laying down, sitting and standing. There are many potentially effective strategies that may improve your quality of life, and may also prevent dizziness and passing out.
Ha AD, Brown CH, York MK, Jankovic J. The prevalence of symptomatic orthostatic hypotension in patients with Parkinson's disease and atypical parkinsonism. Parkinsonism Relat Disord. 2011 Jun 18.
Mostile G, Jankovic J. Treatment of dysautonomia associated with Parkinson's
disease. Parkinsonism Relat Disord. 2009 Dec;15 Suppl 3:S224-32.
Okun MS, Fernandez HH. Ask the Doctor about Parkinson’s Disease. Demos Medical Publishing, 2010.
You can find out more about our National Medical Director, Dr. Michael S. Okun, by also visiting the Center of Excellence, University of Florida Health Center for Movement Disorders and Neurorestoration. Dr. Okun is also the author of the Amazon #1 Parkinson's Best Seller 10 Secrets to a Happier Life and 10 Breakthrough Therapies for Parkinson's Disease. | <urn:uuid:851170a1-310b-443e-8988-b0a121db575d> | CC-MAIN-2024-10 | https://www.parkinson.org/blog/research/passing-out | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00858.warc.gz | en | 0.896167 | 942 | 2.640625 | 3 |
The Body Ecology Guide to the Healthiest Nuts (and the Nuts to Avoid)
Nuts contain concentrated nutrients; after all, they have enough energy to grow an entire new plant. But some nuts are better than others.
Learn how to choose nuts and prepare them so that you reap all the benefits of this power food!
The Best Nuts to Eat (And How to Eat Them)
Keep in mind that almonds are the only nuts on the initial stage one of the Body Ecology program because they are the least acidic and for many, the easiest to digest. Once your inner ecosystem is healed, you may want to start experimenting with other nuts, like walnuts, cashews, pecans, etc.
All nuts are high in the B vitamins, which are necessary for metabolism and cell growth. Nuts are also good sources of heart healthy fats and antioxidants, making them the ideal food for preventing heart disease and cancer.1
They also combine well with fruits from the acid fruit family.
Here is our guide to common nuts:2
- Almonds help stabilize blood sugar, have high calcium content, and are the least acid forming. They are the only nut to eat on stage 1 of the Body Ecology diet (see important information about almond pasteurization at the end of this article).
- Brazil nuts contain omega-3 fatty acids and high levels of the mineral selenium that may help prevent breast cancer.
- Cashews are high in magnesium (second only to almonds) that can help build strong bones and have more carbohydrates and a lower fat content than most other nuts. They are often inexpensive relative to other nuts discussed here.
- Hazelnuts are a good source of quality protein. Vitamin E and beta-sitosterol in hazelnuts contribute to heart health and fight cancer.
- Macadamia nuts are high in fat, though nearly all of it is monounsaturated. They are a good source of thiamine and contain small amounts of phosphorous, selenium, calcium and potassium.
- Walnuts have high levels of vitamin E and an ideal ratio of omega-3 to omega-6 fatty acids (1:5). These fatty acids have anti-inflammatory properties, protect heart health and guard against arthritis.
- Pecans also have high vitamin E content and regular consumption may help decrease LDL (bad) cholesterol levels.
- Pine nuts are actually the seeds of pine trees and contain large amounts of thiamine (vitamin B1) and protein. If you are trying to lose weight a substance in pine nuts may act as an appetite suppressant.
- Pistachios have lots of calcium, magnesium and vitamin A, as well as fiber and iron.
A Note about Peanuts:
Peanuts are susceptible to a fungus that generates poisons called aflatoxins. Aflatoxins can cause liver damage, so many people avoid peanuts and peanut products unless they know the source keeps the peanuts fresh and free from fungi.
Did you know that peanuts could be toxic? Harvested peanuts easily grow a fungus that generates poisons (called aflatoxins) that can harm your liver. Get your copy of The Body Ecology Diet to learn more about soaking, sprouting and eating nuts for your health!
Soak or Sprout Your (Raw) Nuts for Maximum Nutrition
Before you eat your raw nuts, be sure to soak or sprout them first. Soak them for at least 8-12 hours or overnight in purified water with a pinch of sea salt. This makes them easier to digest, and removes an outer coating that contains a digestive enzyme inhibitor.
Also be sure your nuts are raw or dehydrated at a low temperature until dry and not roasted. Roasting destroys some of the vitamins and many of the valuable live enzymes in raw nuts. Grinding soaked nuts (in a Vita-Mix or food processor) into a pate’ also helps with digestion.
Try these ways to eat your raw nuts:
- Tossed with Herbamare or Celtic Sea Salt for flavor
- Pureed with vegetables into a pate
- Roll this pate into a lettuce leaf or strip of nori (an ocean vegetable)
- Chopped up into salads
For more information on soaking and sprouting raw almonds (and all nuts) read The Body Ecology Diet, by Donna Gates.
- One Important Caution If You Have a Virus…
If you have an active viral infection, you should avoid all nuts (and seeds). Nuts are high in arginine, an amino acid that can encourage outbreaks of herpes-simplex type viruses. Learn more by reading Why You Should Avoid Nuts and Seeds If You Have a Virus.
Nutrition in a Nutshell
Nuts are one of Mother Nature’s gifts: they contain ample nutrients to help us live healthy lives, they’re versatile and taste great!
A natural choice for snacks and meals, nuts can be your portable powerfood.
Important Update on Almond Pasteurization & How To Take Action
You may have heard that the Almond Board of California (ABC) proposed a voluntary (not mandated by government) “Action Plan” to pasteurize all almonds originating from California.
This rule was called for in response to two recalls of raw almonds from conventional farms due to the presence of salmonella.
The ruling has resulted in a backlash from consumer groups because labels will NOT show that almonds bought in the US, Mexico and Canada are in fact pasteurized (even raw almonds!). In addition, almond handlers and processors are concerned that they are not equipped for this new process.
The ABC was scheduled to implement the ruling in September 2007, however, the ABC chose to delay the rule until March 2008, pending USDA approval.7
Some almond processors may have begun pasteurization already in order to voluntarily comply with the mandate.
As you know, Body Ecology is a proponent of unpasteurized and unprocessed foods as a way to heal your inner ecosystem. We know those who follow the Body Ecology program agree, so take action now! The Weston A. Price Foundation has suggestions for how you can voice your opinion to the right people.
- “Cashews,” WHFoods.org.
- Natural Food Guide- Nuts-Part 1, NaturalHub.com.
- “Health Benefits of Nuts,” TheHealthierLife.co.uk.
- “Health Benefits of Hazelnuts,” Home-Remedies-For-You.com.
- “Walnuts,” WHFoods.org.
- Sahelian, Ray, “Nut Information,” RaySahelian.com.
- Action Plan and Pasteurization. Almond Board of California. http://www.almondboard.com/Programs/content.cfm?ItemNumber=890&snItemNumber=450 | <urn:uuid:57020b3b-1dae-4f2a-8c44-a295df11f942> | CC-MAIN-2024-10 | https://bodyecology.com/articles/healthiest_nuts-php/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00858.warc.gz | en | 0.894233 | 1,432 | 3.375 | 3 |
Mode: All Modes
Panel: Shading/Material Context → Transparency
Materials in Blender can be set to be transparent, so that light can pass through any objects using the material. Transparency is controlled using an "alpha" channel, where each pixel has an additional value, range 0-1, in addition to its RGB color values. If alpha=0, then the pixel is transparent, and the RGB values for the surface contribute nothing to the pixel's appearance; for alpha=1, the surface is fully opaque, and the color of the surface determines the final color of the pixel.
In Blender, there are three ways in which the transparency of a material can be set: Mask, Z-Buffer and Ray-trace. Each of these is explained in more detail below. The Material Preview option with a sphere object gives a good demonstration of the capabilities of these three options.
The following property controls are available for all transparency options:
- Sets the transparency of the material by setting all pixels in the alpha channel to the given value.
- Sets the power of the Fresnel effect. The Fresnel effect controls how transparent the material is, depending on the angle between the surface normal and the viewing direction. Typically, the larger the angle, the more opaque a material becomes (this generally occurs on the outline of the object).
- Specular -
- Controls the alpha/falloff for the specular color.
- Controls the blending between transparent and non-transparent areas. Only used if Fresnel is greater than 0.
This option simply masks the Background. It uses the alpha channel to mix the color of each pixel on the active object plane with the color of the corresponding background pixel, according to the alpha channel of the pixel. Thus for alpha = 1, the object color is seen - the object is completely opaque; but if alpha = 0, only the background is seen - the object is transparent (but note that any other object behind the active object disappears).
This is useful for making textures of solid or semi-transparent objects from photographic reference material - a mask is made with alpha opaque for pixels within the object, and transparent for pixels outside the object.
See Mask Transparency.
This uses the alpha buffer for transparent faces. The alpha value of each pixel determines the mix of the basic color of the material, and the color of the pixel is determined from the objects/background behind it. Only basic settings are available with this option; it does not calculate refractions.
Uses ray tracing to calculate refractions. Ray tracing allows for complex refractions, falloff, and blurring, and is used for simulating the refraction of light rays through a transparent material, like a lens.
Note that the RayTrace option is only available in the Blender Render and Cycles render engines, but not in the Game Engine.
A ray is sent from the camera and travels through the scene until it encounters an object. If the first object hit by the ray is non-transparent, then the ray takes the color of the object.
If the object is transparent, then the ray continues its path through it to the next object, and so on, until a non-transparent object is finally encountered which gives the whole chain of rays its color. Eventually, the first transparent object inherits the colors of its background, proportional to its Alpha value (and the Alpha value of each transparent Material hit in between).
But while the ray travels through the transparent object, it can be deflected from its course according to the Index of Refraction (IOR) of the material. When you actually look through a plain sphere of glass, you will notice that the background is upside-down and distorted: this is all because of the Index of Refraction of glass.
To get ray-traced transparency, you need to:
In addition to the common options given above, the following property controls are available:
- Index of Refraction. Sets how much a ray traveling through the material will be refracted, hence producing a distorted image of its background. See IOR values for Common Materials below.
- Amount of filtering for transparent ray trace. The higher this value, the more the base color of the material will show. The material will still be transparent but it will start to take on the color of the material. Disabled (0.0) by default.
- How fast light is absorbed as it passes through the material. Gives 'depth' and 'thickness' to glass.
- Materials thicker than this are not transparent. This is used to control the threshold after which the filter color starts to come into play.
- Sets the maximum number of transparent surfaces a single ray can travel through. There is no typical value. Transparent objects outside the Depth range will be rendered pitch black if viewed through the transparent object that the Depth is set for. In other words, if you notice black areas on the surface of a transparent object, the solution is probably to increase its Depth value (this is a common issue with ray tracing transparent objects). You may also need to turn on transparent shadows on the background object.
- Settings for the glossiness of the material.
- The clarity of the refraction. Set this to something lower than zero to get a blurry refraction.
- Threshold for adaptive sampling. If a sample contributes less than this amount (as a percentage), sampling is stopped.
- Number of cone samples averaged for blurry refraction.
Index of Refraction
(Influence of the IOR of an Object on the distortion of the background: spheres of Water, Glass and Diamond (top to bottom).). There are different values for typical materials: Air is 1.000 (no refraction), Alcohol is 1.329, Glass is 1.517, Plastic is 1.460, Water is 1.333 and Diamond is 2.417.
|16 pieces of glass rotated in various directions demonstrate the angle-dependent Fresnel effect with ray-traced (left) and alpha buffered transparency (right). Note that the major difference is the lack of IOR effect in the latter case. (Download .blend.)
|Settings for Fresnel using ray-traced (left) and Z transparency (right).
Note the specular highlight in the F4 glass tile (which is facing midway between the light and the camera); the Fresnel effect can be seen in row C and column 6 where the faces are turned away from the camera.
The amount of Fresnel effect can be controlled by either increasing the Blend value or decreasing the Alpha value.
Increasing Depth also considerably increases render time. Each time a light ray passes through a surface, the ray-tracing algorithm is called recursively. In the example above, each side of each glass has an exterior and an interior surface. Light rays thus have to pass through four surfaces for each glass.
But not only that, at every point on a surface, some of the light can be reflected, or mirrored off the surface in various directions. This results in multiple rays needing to be calculated for each point (often referred to as a tree of rays). In each of the rendered images above there are 640×400=256 000 pixels. By increasing Depth, at least one tree of rays is added to each pixel.
Be kind to your computer. Carefully placing objects in a scene to avoid overlapping transparent objects is often an interesting alternative.
By default, the shadows of transparent objects are rendered solid black, as if the object was not transparent at all. But in reality, the more transparent an object is, the lighter its shadow will be.
In Blender, transparent shadows are set on the materials that receive the shadows from the transparent object. This is enabled and disabled with the Receive Transparent button, in the Material context → Shadow panel. The shadow's brightness is dependent on the Alpha value of the shadow casting material.
Alternatives to transparent ray-traced shadows can be found in the World context, namely the Ambient Occlusion, Environment Lighting, and Gather panels. Alternatively, a texture can be used to control the Intensity value of the shadow-receiving material.
IOR values for Common Materials
The following list provides some index of refraction values to use when ray-traced transparency is used for various liquids, solids (gems), and gases: | <urn:uuid:1248fd01-c883-4fbd-ac4b-a1e22b3210ed> | CC-MAIN-2024-10 | https://wiki.blender.jp/Doc:2.6/Manual/Materials/Properties/Transparency | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00858.warc.gz | en | 0.873611 | 1,722 | 4.09375 | 4 |
What happens to your body when you quit smoking?
Quitting cigarettes can be “wrenching” when cravings and withdrawal symptoms last for weeks, especially if you’re not strongly motivated.
However, just a few minutes after the first smokeless breath, your body begins to change for the better. And with all the healthy breaths you take in the weeks and months ahead, the benefits will multiply.
According to the American Lung Association (ALA), the health benefits of quitting smoking are the top and most important reason for quitting smoking.
And Dr. Robert Redfield, Director of the U.S. Centers for Disease Control and Prevention, wrote in the U.S. Surgeon General’s 2020 Smoking Cessation Report: “Even people who have smoked for years or smoke heavily can realize the health benefits of and financial cessation of smoking.
He added: “While the benefits of quitting smoking at an early age are clear, this report confirms that it’s never too late to quit.”
Here’s what happens when you quit smoking:
Withdrawal symptoms when quitting smoking include cravings, irritability, and restlessness. Some will also experience trouble concentrating, trouble sleeping, feeling hungry, weight gain, and feeling depressed, anxious, or sad, according to the CDC.
The health benefits of quitting smoking begin about 20 minutes after the last draw. According to the American Cancer Society (ACS), this is when a smoker’s heart rate and blood pressure begin to drop.
It takes several days for the level of carbon monoxide in the blood to return to normal. Within two to three months, circulation begins to improve and lung function increases, according to the American Cancer Society.
Gradually, the smoker’s cough disappears with the release of mucus from the lungs. This is because the “cilia”, the small hair-like structures in the lungs, begin to regenerate.
While lung scarring cannot be reversed, quitting smoking can help prevent lung disease symptoms from getting worse, according to the US Department of Health and Human Services website smokefree.gov.
The risk of developing pneumonia and lung cancer also declines over time, according to the American Lung Association.
A strong body is one of the benefits of quitting smoking
This newfound strength includes a reduced risk of bone fractures later in life, according to smokefree.gov. A strong immune system will help you stay healthy and your muscles will get stronger because there will be more oxygen in your blood.
The most beneficial benefits of quitting smoking include a lower risk of heart disease, stroke, and certain types of cancer.
According to the American Cancer Society, a person’s risk of having a heart attack drops dramatically within one to two years.
In one study recently presented at a meeting of the European Society of Cardiology, Dutch researchers found that quitting smoking, in addition to taking three medications, helped prevent heart attacks and strokes in patients who had a heart attack or underwent surgery to open blocked arteries.
“The benefits of quitting smoking are greater than we thought,” study author Dr. Tinka van Trier of the University Medical Center Amsterdam said in a press release about the study.
According to the website smokefree.gov, some fertility issues resolve even after estrogen levels return to normal.
Quitting smoking also reduces the risk of developing 12 types of cancer. According to the American Cancer Society, the risk of developing certain types of cancer is halved after about 5 to 10 years.
In another study, recently published in the journal JAMA Network Open, researchers from the American Cancer Society and other organizations found that smoking was associated with twice as many all-cause deaths as those who never smoked. Smoking cessation, especially at younger ages, has been associated with a significant reduction in relative excess mortality.
Quitting smoking will help you look better
Among the aesthetic improvements of quitting smoking are clearer skin, fewer wrinkles, notes smokefree.gov.
When your teeth and nails no longer turn yellow, your breath will become fresher, and your hair and clothes will no longer smell like smoke.
Another tangible benefit is the improvement in the taste and smell of food. It’s also better for brain health.
According to a study recently published in the journal Alzheimer’s Disease, those who quit smoking also had less mental decline, especially those who quit smoking in middle age.
“The association we observed was most significant in the 45 to 59 age group, suggesting that quitting smoking at this point in life may have cognitive health benefits,” said study author Jeffrey Wing, assistant professor of epidemiology at Ohio State University. .
Source: Medical Express | <urn:uuid:3aa4c36f-7393-4878-ae46-6bb94f86c455> | CC-MAIN-2024-10 | https://visegrad24.info/what-happens-to-your-body-when-you-quit-smoking/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00858.warc.gz | en | 0.946375 | 969 | 2.6875 | 3 |
Technological advancements pose both benefits and risks. The benefits are easy to point out. Convenient online financial transactions and faster inter-island communication are some of the many other benefits. Most notably, advanced technology allows for storing and organizing of large quantities of data. The entire process becomes more manageable with the use of cloud platform technology.
However, storing large quantities of data in cloud platforms also face certain technological risks relating to the security of the storage. Also referred to as cybersecurity attacks, certain technological advancements are vulnerabilities and security risks. Others are programmed to breach confidential information.
The most common example of this is hacking. A hacker’s intention is to breach and exploit a private system often compromising the stored data. Phishing is also another form of cybersecurity attack that is mainly for monetary gains.
Hacking and phishing are just two of the many forms of cyber attacks today. On the bright side, the proper use of technology counters these risks. Here are some of the methods on how technology combat cyber attacks today.
What Technology Can Do to Help Combat Cyber Attacks
1 Passive Inspection Technology
The most basic form of protection is the installation of anti-malware software. It is used to prevent, detect, and remove malware, hence the name. Anti-virus software is also available that, as the name suggests, targets virus detection and removal.
Installing patch management software is another method of protection against cyber attacks. The software initiates the process of applying updates to other types of software. The updates are necessary to fix and get rid of bugs.
Lastly, there is secure configuration management. Security configuration is the process of building and rebuilding a security system to ensure that there are no loopholes or misconfigurations. Hackers target these misconfigurations to breach and exploit a system easily.
The Data Protection Act requires that the safety of the clients’ personal and sensitive information shall be used for reasons it is requested for. Additionally, top-notch protection must be the priority. These measures mentioned are required by several industries.
Take the North American Electric Reliability Corporation for example.
This nonprofit organization has the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC-CIP) a list of requirements that are designed to secure the assets needed for operating North America’s bulk electrical system.
NERC CIP standards are for enhancing the reliability of the distributors. The standards include the security of electronic parameters and the protection of sensitive cyber assets. It protects data about personnel, training measures, and security management, among others.
2 Use of Artificial Intelligence and Machine Learning
Better protection against cyber-attacks means better use of advanced technology, such as artificial intelligence and machine learning.
The algorithms used in machine learning can track and analyze the usual activity of a computer used by a real person. When it detects unusual activity, the algorithm adjusts its actions. What makes it better is that its countermeasures are not limited by its algorithm.
Software made by Microsoft in 2018 was able to detect and protect millions of data because of this technology. Windows Defender uses layers upon layers of machine learning algorithms to detect malicious activity. It was able to detect the activity of crypto-miners as soon as they started.
Another application of machine learning is in web application firewalls (WAF). The machine learning algorithm in these firewalls can accurately distinguish human activity from machine users.
Once the malicious activity is detected, the firewall can build and implement mitigations that will serve as countermeasures to the threats. Bots using artificial intelligence will also dissuade attacking bots from attacking their initial target.
When used properly, machine learning will and can counter the malicious usage of artificial intelligence.
3 Use of Biometrics
The use of biometrics provides another layer of protection from cyber-attacks. Aside from machine learning, biometrics is another measure to differentiate human and bot activity.
Biometrics security uses biological or behavioral characteristics to access confidential data. The most common physical access control is fingerprint recognition. Other forms include voice recognition, facial recognition, iris recognition, and heart-rate recognition.
Several large industries use biometric security as an added measure to protect data. The financial and banking industry uses this method to fight against fraud and to heighten transaction security.
Users are also inclined towards the use of biometrics than regular passwords in financial transactions. This is already one step away from being a victim of phishing.
Healthcare is another industry that takes advantage of the benefits of biometric security. The Health Insurance Portability and Accountability Law (HIPAA) emphasizes the importance of protecting the patient’s information as a form of respect and security.
Regulations under this law also set the guidelines for disclosing patient information to certain authorized individuals consented by the patient. Biometrics can help determine the identity of these authorized persons. As a result, it can counter and decrease the cases of patient fraud.
4 Combination of Security Technologies
A single layer of protection against cyber attacks is never enough. Measures of cyber attacks are evolving and so should the protective measures. Another measure to combat these attacks is to combine different security measures.
You can install anti-malware and secure configuration management software and use additional biometrics security. In this manner, there is an additional security measure after going through the physical analytics.
Cloud security platforms are also a famous choice among clients. These platforms use both artificial intelligence and predictive technology to analyze data and pinpoint possible attacks. This security measure spots anomalous activity and distinguishes bot users.
Security platforms, such as Building Defender, detect and prevent cyberattacks on building management systems. It does beyond just pointing out malicious activity. It pinpoints the source and detects possible attacks from it.
Once the source is pointed out, other security measures or software can be used to eradicate the threat.
The result of rapid technological advancements is a double-edged sword. It brings both benefits and risks. Common risks include breaches and leakage of sensitive personal data. Luckily, advanced technology can also counter these mishaps.
From cloud security platforms to something personal, such as biometric security can work together to ensure total protection from various cyber-attacks. These security measures will not only counter these known attacks. But these will also analyze, detect, and predict possible attacks making it possible for users to prepare for them. | <urn:uuid:b142b6fe-5f9a-4a26-ac19-d4b1f7d645bc> | CC-MAIN-2024-10 | https://www.nogentech.org/4-ways-technology-can-help-combat-cyber-attacks-today/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00858.warc.gz | en | 0.927046 | 1,295 | 3.15625 | 3 |
The research conducted in Logging investigates latent material possibilities within the medium of wood, by investigating material origins and the ethics of material consumption – two societal conditions that humans have increasingly become disconnected from.
ARC 592, Spring 2018
MArch – Material Culture
Its goal is to create a critical dialogue between humans and trees – two living creatures whose histories have been entangled since the origins of civilization.
As is commonly understood, wood, which originates from trees, has been one of the most popular building materials, alongside clay and stone, for thousands of years. The tree has been vital in all spheres of life: as provider of firewood and fruit, as protection from the elements, and later, as a building material. The destruction of forests by humans, in the face of climate change, calls upon us to consider the ecological impacts of our actions, and how best to use the raw materials at our disposal. The seminar research became enthralled with the rawness of the forest, and humans’ tendency to cannibalize this resource by transforming it into timber for use in the construction of space.
– Craig Brozowski, MArch
The students partook in numerous expeditions into the forest to rekindle the relationship between humans and trees. Through these deeply experiential interactions with trees (which often resulted in a combination of climbing, hugging, or speaking to the tree), each participant pondered the different methods in which the tree has contributed to our world. As these expeditions accrued, the tree was romanticized not as an abundant natural resource for consumption, but as a living creature with life-like attributes. Having observed the environment of the forest, students returned to embark on a process of tree-felling–the downing of an individual tree utilizing a hand-held ax. By felling-a-tree, a condition of nature was transformed into a condition of culture – the students experienced the death of a tree, the birth of timber, and more broadly, the origin of architecture.
After felling, students began to process the tree, dissect its parts, and uncover its strange behavior. They studied how most, if not all, of the cultural innovations surrounding the use of trees have been attempts to standardize and homogenize the material. As a counterpoint to this historical trend, the aim of Logging is to embrace the living, unpredictable, and eccentric features inherent to all trees. | <urn:uuid:37ea997a-a8b2-413f-b6fc-7985d2579c4a> | CC-MAIN-2024-10 | https://archplan.buffalo.edu/news-events/intersight.host.html/content/shared/ap/articles/work/2019/logging.detail.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00858.warc.gz | en | 0.943567 | 491 | 3.359375 | 3 |
Population problem step by step lesson we do a little scientific notation subtraction to solve this one very basic at first. Along with another population problem.
Scientific notation word problem.
Mathworksheetsland scientific notation word problems answers. Light travels at a speed of 1 86 x 10 5 miles per second. Make sure that you have a good. You will also see this skill come up in many different advanced math programs.
Powers of ten and scientific notation 8 ee a 3 we look at how to write large and small values by using scientific notation. Scientific notation word problem. This is the currently selected item.
Printable worksheets and lessons. It takes light from the sun about 4 8 x 10 3 seconds to reach saturn. Get help with your math word problems homework.
Mathworksheetsland answer keys scientific notation word lesson preview image bee flower middle school math pizzazz worksheet answers answer key to worksheets 6th grade exercises for class 2 division 3rd grade2nd 5th www. Microsoft word scientific notation word problems revised docx author. Scientific notation addition and subtraction yes there are a few tricks to calculating these quickly.
Find the approximate distance from the sun to saturn. Write your answer in scientific notation. Scientific notation word problems 8 ee a 4 obviously most of these problems lend themselves to science based.
Claudia bowles created date. Guided lesson explanation when answering these types of problems you will need plenty of space to spread out your answer. Scientific notation word problem.
Scientific notation word problems 8 ee a 4 obviously most of these problems lend themselves to science based the most important thing to remember is to be there for your students answer questions and model a. Access the answers to hundreds of math word problems questions that are explained in a way that s easy for you to understand. Scientific notation word problems.
Write your answer in scientific notation. Square root word problems 8 ee a 2 these story problems all require a square root to be calculated. Mathworksheetsland theoretical probability answers pdf download.
Scientific notation word problems these are practical problems that you will find in most high school science lab environments. Our mission is to provide a free world class education to anyone anywhere. Plus each one comes with an answer key.
Scientific notation word problems answer keys author. Guided lesson the mass of the earth and the sun get in the mix.
Cool Math Games Gluey Free Veterans Day Kindergarten Math Worksheets Math Worksheets Land Username And Password Bc Grade 7 Math Worksheets Easy Algebra Problems A Spreadsheet Math Is Fun Calculus Year 7
Xl Spreadsheet Tutorial Wordless Book Coloring Pages Pearson Education Math Worksheets Grade 7 Anna Birthday Math Worksheets Basic Fractions Worksheets Xl Spreadsheet Tutorial Mathematic Problems Subtraction With Regrouping Worksheets 2nd Grade | <urn:uuid:eba8e415-6326-4f6e-850c-6c5c66dd407a> | CC-MAIN-2024-10 | https://kidsworksheetfun.com/mathworksheetsland-scientific-notation-word-problems-answers/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00858.warc.gz | en | 0.862502 | 592 | 3.015625 | 3 |
Caring for a child’s teeth is different from caring for your own. If you want your child to grow up with a healthy smile that lasts a lifetime, get them in the habit of taking great care of their teeth.
The Lowdown on Kids’ Oral Hygiene
It starts before teeth even erupt from under the gums. Babies’ gum lines need to be wiped to remove leftover milk. Later, as teeth begin to peek out, you should brush them with a soft bristled brush designed specifically for toddlers.
In order to maintain optimal health, kids must:
- Keep in mind that as plaque hardens, it turn into tarter. This substance can only be removed via a professional cleaning.
- Be encouraged to brush their own teeth, but an adult should brush them a second time to ensure that all back molars are reached.
- Floss between teeth and under gum line every day.
- Brush twice a day.
- Avoid excess sugary and starchy foods.
- Only use a pea-sized amount of toothpaste until your child is six-years-old.
- Routinely visit the dentist twice a year.
Kids get bored easily, and that can have an impact on adherence to oral hygiene routines. We’ve provided a list of ways to maintain children’s interest in dental care.
Five Ways to Encourage Children to Care for their Teeth
- Sing Along: Use the internet as a resource to find fun and silly songs about keeping teeth healthy. This playlist is a good place to begin.
- Lead by Example: Make sure you’re taking good care of your own teeth and telling your child how much you enjoy doing so.
- Offer a Reward: Track good dental hygiene using a calendar or chart and reward your child for a job well done. Avoid candy prizes—a playdate, a visit to the park, or a certificate are better choices.
- Fun Supplies: Allow your child to choose a brush that strikes their fancy. A fun pattern and watermelon toothpaste can make brushing more enjoyable.
- Teeth Activities: Take advantage of the fun games, crafts, and activities you can participate in with your child. Here is a solid list to begin with.
March 1st Is Not the End!
We celebrate Children’s Dental Health Month once a year, but teeth last a lifetime, not 28 days. Take an active role in your child’s health year-round. | <urn:uuid:84af1fd4-42e5-4d06-b973-b786f2e5d397> | CC-MAIN-2024-10 | https://lonetreemoderndental.com/five-ways-encourage-good-dental-hygiene/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00858.warc.gz | en | 0.930119 | 518 | 3.40625 | 3 |
Read part 1 here.
The proportionality of representation
Voting behaviour is a complex matter, but over the past few decades there is evidence of a general drift away from voting largely on the basis of party loyalty. Instead, many voters prefer to examine where candidates stand on issues of importance to them and to vote for those closest to their own position.
If that is what is happening with those voters not yet entirely disillusioned with our political system, then we need to revisit the notion that ‘proportionality’ in electoral systems means that the seats gained by a political party are proportional to the votes it received. With the shift of focus from party to candidate, ‘proportionality’ relates seats gained to coherent bundles of policy in a multidimensional political space.
Pessimists will argue that this makes debate and decision-making harder, and they are probably right. But optimists will claim that this shift greatly enhances the scope for representing voters’ wishes, since a closer match is more likely to occur between a voter’s views and those of a candidate than the blandishments of a political party manifesto.
This provides a first clue as to what system of PR might best support such a situation, since we have already noted in Part 1 that, compared with list systems, STV favours proportionality of policies rather than parties.
But there is a second assumption hidden in the conventional understanding of ‘proportionality’, which is that all representatives have an equal say in an assembly vote. The fact that one candidate was elected with, say, 40,000 votes and another with 20,000, is regarded as irrelevant. But is not the number of votes received by a candidate also a factor in proportionality? Does taking them into account not improve the degree of representation of voters’ wishes? Recent proposals for a modified form of STV claim that this would indeed be the case.
Weighting for a change
Guy Major and Jonathan Preminger are Senior Lecturers at Cardiff University. They are the authors of a recently-published paper entitled Democratising Democracy: Votes-Weighted Representation. (Note that quotes in this article arise either from this paper, or from an interview with the authors conducted online.)
After laying out the premise that democracy is in global retreat, the authors summarise a modification to the STV system of proportional representation which, while simple in itself, promises profound improvements in an electoral system’s democratic credentials.
Coining the term “Votes-Weighted Representation” (VWR), the authors suggest that, instead of transferring an elected representative’s ‘spare’ votes – those received over and above the quota needed – to next-preferences as in standard STV, those votes are retained by the representative. Thus (simplifying the earlier example by dividing their votes by 1000), we’ll give representative A a simple ‘weight’ of 40 and representative B a weight of 20. These weights then count in an assembly vote, giving a more precise degree of proportional representation of voters’ wishes.
In their paper, Major and Preminger note that weighted voting is nothing new. Shareholder’s votes at company shareholder meetings, for instance, often carry the ‘weight’ of the number of shares the shareholder owns. And weighted voting is used in the European Council, and has been proposed for use in the UN General Assembly, to avoid giving smaller countries too much voting power. But, stresses Preminger, under VWR, there is a crucial distinction to be made between a shareholder’s vote weight and a citizen’s:
“The shareholder with all those shares and a lot of power because of those shares, is voting on his opinion. Whereas the representative with all those votes is, at least in theory, voting on the opinions of the people who gave him that weight.”
The authors also stress that, while, as a system, this may all sound somewhat complex, it is important to take the voter’s point of view into account too:
“From the voter’s point of view it’s actually a very simple process, even though from the internal mechanism of it, it may seem less simple.”
VWR is, in fact, not that complex at all. It is simpler than standard STV because, while unelected candidates’ votes are still transferred to next preferences, elected candidates’ spare votes don’t need to be transferred, considerably simplifying the vote counting process. And while not suggesting that such vote-weighting is sufficient in itself, the authors claim that alongside measures like including democracy in secondary education, lowering the voting age, decentralisation and reforms of the economy and the workplace, it could be a game-changer.
Is the party over?
In addition to escaping from the iniquities of FPTP, such a reform of the voting system would help to tackle a number of problems arising from our traditional party-based approach, say the authors. For instance, ‘Party-capture’ occurs when elements within a party gain disproportionate control over policy and candidate selection. One doesn’t need a spyglass to see this occurring in both our major parties, even as we speak.
In an extreme form they refer to as ‘leaderism’, the leader of a governing party and their immediate advisers can abuse the power vested in them. For example, they can exert undue control over policy (proroguing of parliament), extend patronage to cronies (honours lists), spend public money indiscriminately without due diligence (Covid PPE), and interfere unduly in candidate selection, to mention but a few.
As with standard STV, the system requires multi-member constituencies (Major and Preminger suggest 6 or 7) of sufficient size to ensure greater heterogeneity of political views, and the authors work through several examples of how VWR would work in these. In a plausible example, they show how 95% of voters get a first-preference representative elected, while the 5% transferred are likely to be to representatives with a close match to their policy preferences.
Within a multi-member district of 6 or 7, the authors claim that VWR should work well, irrespective of the number of districts and any disparities in the relative size of their populations, their geographical spread and their exact boundaries:
“Weighted voting in the assembly can allow different constituencies to have significantly different populations, if wanted: representatives from a lower population district would have fewer votes, on average: weighting-by-votes would ensure approximate overall proportionality of party voting power in the assembly, irrespective of the different populations of different constituencies.”
As well as reducing political asymmetry, VWR, they say, would mitigate against gerrymandering:
“The proposed system is also inherently resistant to gerrymandering, as the weighting-by-votes of multiple representatives per constituency makes overall party voting power in the assembly relatively insensitive to boundary changes. A party might lose some votes in one district but regain more or less the same number in the neighbouring district, if the boundary was shifted into the first district: most of the ‘moved’ voters would in effect simply shift representatives within a party, while preserving its overall voting power in the assembly.”
The advantages of VWR also extend to political parties. They can make themselves more locally appealing by listing different candidates first in their party group in different voting districts to reflect any local ties or to establish one. Major says this makes it easy to select candidates from within a party group if that’s what the voter wants to do:
“You can home-in pretty quickly on the party you’re interested in. You can have their candidates blocked together, for example, rather than listed in alphabetical or random order.”
But more importantly, by providing a range of diverse candidates to choose from, VWR can enable better voter-representative dynamics (the so-called ‘local link’). A voter pursuing an issue can approach a specific representative – allied with or independent of any political party – either because they have a local tie, or because they have an expressed interest or experience in the issue.
“Under our system, you have a choice of a) which party to go to, and b) within a party, if it had more than one representative.”
In fact, say Major and Preminger, VWR might lead to the fragmentation of existing political parties into sub-parties, and produce a quite different mode of doing politics.
“Under VWR, you’d have a cluster of parties replacing, say, the Labour Party, which would represent the different wings and dimensions of the Labour Party as it is today, and then people would attach their votes to particular sub-parties. After the election, a coalition would form depending on the strengths of the different parties and how the electorate had assigned their votes.”
If Major and Preminger are right – and I believe they are – the adoption of VWR could be just the life-saving injection our democracy needs to rejuvenate it. Their paper explores other consequences for government that we don’t have space to describe here, but they also go one step further, and propose a supplementary system which could be adopted, in time, to enhance voter representation at the heart of government: Dynamic VWR. But that’s a story for another day.
Major and Preminger’s paper is freely downloadable from JeDEM (the eJournal of eDemocracy and Open Government) (follow the pdf link at the top).
There is a shorter version on the Compass website.
The views expressed here are those of the author. | <urn:uuid:9a789adf-f456-4167-8edd-d6cf153965e4> | CC-MAIN-2024-10 | https://westenglandbylines.co.uk/politics/electoralreform/representative-democracy-part-two-can-it-work/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00858.warc.gz | en | 0.958764 | 2,032 | 2.5625 | 3 |
Are you wondering how neurosurgery will advance in the upcoming years?
The field of neurosurgery is rapidly advancing, and new imaging techniques and surgical procedures are being developed. This article explores the future of Neurosurgery and discusses the exciting advancements that are currently taking place.
The advances being made in brain imaging
The advances being made in brain imaging are allowing neurosurgeons to diagnose and treat neurological disorders with greater precision and accuracy than ever before. Magnetic resonance imaging (MRI), computed tomography (CT) scans and others are now essential tools used by neurosurgeons in Austin to provide detailed pictures of specific areas of a patient’s brain. This detailed imaging allows neurosurgeons to map out the area they will be operating on in minute detail, a task that was previously done using paper-based measurements.
The use of enhanced imaging technologies, such as functional MRI (fMRI) and positron emission tomography (PET), is changing how certain neurological conditions are treated. These techniques enable the direct visualization of how various structures in the brain interact with one another, providing surgeons with direct guidance during the operation process and allowing them to target the specific area of surgery for maximum effect with minimal risk.
The growth in technologies such as 3D printing is also having an impact on how surgeons plan complex operations that involve intricate anatomical details or require unique instrumentation for placement. Furthering this development are robotic surgical systems, which are used increasingly for minimally invasive procedures due to their ability to provide highly accurate incisions or even implant medical devices within delicate tissues or organs. With these advancements, we can expect more sophisticated procedures in the near future that will help improve the lives of those who suffer from severe neurological disorders.
The advances being made in surgical techniques
With advances in neuroscience and technology, surgeons and researchers are developing new and improved techniques for performing neurosurgical procedures. By leveraging cutting-edge equipment and imaging techniques, surgeons can gain essential spatial orientation in the operating room. The most notable of these techniques is neuronavigation technology, which includes brain mapping, 3D visualization software, augmented reality computer systems, deep brain stimulation (DBS) technologies, and more.
Brain mapping unlocks the ability to visualize comprehensive 3-dimensional (3D) representations of a patient’s brain. This facilitates specific targeting of neurosurgical treatments in order to minimize predicted effects on healthy tissue while maximizing care outcomes. Moreover, by utilizing artificial intelligence (AI) systems during preoperative planning stages such as image segmentation or tumor resection planning, neurosurgeons can enhance their decision-making process about patient treatment options.
Additionally, advanced imaging tools allow for further refinement when it comes to treatment plans since they offer a detailed view inside sophisticated brain structures that was previously not accessible; allowing for greater accuracy when accessing targeted areas during operations such as tumor resections or implanted DBS electrodes. Furthermore, advancements such as MRI-guided skull tracking increase surgical safety by knowing a patient’s precise location during surgery in order to avoid damaging nearby neural structures or affected tissue areas due to involuntary head movement from the patient under anesthesia.
Overall, Neurosurgery is continuing to see technological advancements that are changing the face of the medical field. Modern motion control technology and new imaging techniques give surgeons greater control over their tools and allow them to reduce risks while increasing accuracy and precision during surgery. This has enabled them to provide better care to their patients, even in the most challenging cases. | <urn:uuid:79bd4e1c-6b47-445a-ad12-c00671f6fa99> | CC-MAIN-2024-10 | https://theeventchronicle.com/neurosurgery-advancements-in-brain-imaging-surgical-techniques/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00858.warc.gz | en | 0.943704 | 697 | 2.65625 | 3 |
About Power Washing, Power Washing Purposes and Power Washing Soaps
Power washing is a system of cleaning which uses mechanical equipment to create a high pressure stream of water ejected from a hand-held nozzle. It is used for cleaning different surfaces & objects. Power washing may be applied for the following purposes :
• Building exterior
• Gas stations
• Heavy Equipment
• Parking Lots
• Vehicle fleets etc.
Soaps are used as cleaning agents in power washing purposes. Soaps that are used in power washers works only at a lower pressure when the detergent setting is turned on. Therefore, instead of strong jet, soapy water is applied in a gentle fan. There are many cleaners available in the market. But the soap needs to be selected on the basis of what needs to be cleaned.
There are various formulas for commercial power washer’s soaps. Some of them work well on brick masonries, some are best suited for wood brighteners for stained sidings, rest are good for aluminum objects. Power washing with laundry detergent is recommended by The Vinyl Siding Institute. Before using, the laundry detergent needs to be diluted. Before adding it to the dispenser it is needed to be completely dissolved in water.
To power wash landscape timbers & decking Karcher soap may be used. Most dirt and grime can be removed through power washing. Adding soap reduces the amount of time required for cleaning purpose. Bleach should not be used in a power washer. It’ll damage rubber & plastic parts of the washer. To protect exposure to cleaning chemicals protective eye and hand covering has to be used. | <urn:uuid:72312e0f-62eb-44a2-9fa2-930866003dab> | CC-MAIN-2024-10 | https://www.vtmobilepressurewash.com/power-washing-soaps/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00858.warc.gz | en | 0.929555 | 339 | 2.765625 | 3 |
Introduction: The world of art and creativity has a multitude of facets, one of which is the intriguing realm of horse shoe clip art. This form of artistic expression offers a unique blend of creativity and symbolism, often capturing the essence of strength, luck, and resilience associated with the horseshoe symbol. In this in-depth article, we will journey through the various dimensions of horse shoe clip art, exploring its history, significance, creative applications, and much more.
Horse Shoe Clip Art: A Brief Overview
Horse shoe clip art) is a digital or hand-drawn representation of a horseshoe, a symbol deeply entrenched in tradition and folklore. It encapsulates the shape and structure of a horseshoe, which is believed to bring good luck and ward off evil. Artists and designers have embraced this symbol, incorporating it into a myriad of designs, illustrations, and digital art pieces, providing a modern twist to a traditional symbol.
The Historical Roots of the Horseshoe Symbol
The horseshoe, a prominent element in horse shoe clip art), has a rich history steeped in superstition and belief systems. Dating back to ancient times, civilizations across the globe considered the horseshoe a symbol of good luck and protection against malevolent forces. Its ‘U’ shape was seen as a conduit for luck to be caught and retained. How does this ancient symbolism translate into modern art? Let’s explore.
Expressing Symbolism Through Horse Shoe Clip Art
Incorporating the horseshoe symbol into art is a powerful way to convey various meanings and messages. Artists utilize the horseshoe’s symbolism of luck, protection, and strength to infuse their artwork with positive connotations. The clip art format allows for versatile application of this symbol in different creative projects, from digital illustrations to printed media.
Diving into the Diversity of Horse Shoe Clip’Art
The beauty of horse shoe clip art lies in its diversity. Artists can experiment with styles, colors, and sizes, enabling a vast array of designs that cater to different preferences and purposes. Whether you prefer a minimalist outline or a vibrant, detailed representation, horse shoe clip art can be adapted to suit any creative vision.
Creative Applications of Horse Shoe Clip’Art
Horse shoe clip art) finds applications across various creative domains, including but not limited to:
- Printed Merchandise: T-shirts, mugs, posters, and more can be adorned with horse shoe clip’art, giving them a trendy and symbolic appeal.
- Digital Designs: From websites to social media graphics, incorporating horse shoe clip’art adds a unique touch to digital designs, appealing to a wide audience.
- Tattoo Designs: The horseshoe’s symbolism makes it a popular choice for tattoo designs, symbolizing good fortune and protection.
Tips for Creating Stunning Horse Shoe Clip’Art
Creating captivating horse shoe clip’art requires a blend of creativity and technique. Here are some tips to enhance your artistry:
- Experiment with Colors: Play with different color palettes to evoke various emotions and moods within your clip art.
- Incorporate Texture: Adding texture to your horse shoe clip’art can give it depth and a realistic touch, making it visually appealing.
- Combine with Other Elements: Blend the horseshoe symbol with other elements like flowers, stars, or hearts to create a unique and eye-catching design.
Exploring Digital Tools for Horse Shoe Clip’Art Creation
In the digital age, artists have a plethora of tools at their disposal to create stunning horse shoe clip art. Some popular tools include Adobe Illustrator, CorelDRAW, and Inkscape. These software options offer a range of features to enhance your creative process and bring your artistic visions to life.
Incorporating Horse Shoe Clip’Art in Graphic Design
Graphic designers often leverage horse shoe clip’art to enhance their projects. Whether it’s a logo, brochure, or advertisement, incorporating the horseshoe symbol can add a distinct charm and symbolism, resonating with the intended audience and conveying the desired message effectively.
Frequently Asked Questions (FAQs)
How can I use horse shoe clip’art for personal projects?
Horse shoe clip’art can be used for personal projects like greeting cards, invitations, or DIY crafts. Simply download or create the clip art) and integrate it into your design to impart a symbolic touch and a dash of creativity.
Is horse shoe clip’art suitable for commercial use?
Yes, many artists and designers offer horse shoe clip art for commercial use. However, always check the licensing terms associated with the specific clip art to ensure compliance with usage regulations and permissions.
Can I customize the colors and size of horse shoe clip’art?
Absolutely! Horse shoe clip’art is highly customizable. Most digital files can be edited to adjust
colors, sizes, and even combine them with other design elements to suit your creative vision.
Are there cultural considerations when using horse shoe clip’art?
Yes, it’s essential to be mindful of the cultural significance of the horseshoe in different regions. In some cultures, orientation matters, and using it upside down might convey different meanings. Research and respect various cultural interpretations.
Where can I find a variety of horse shoe clip’art?
Online platforms like Etsy, Shutterstock, and Adobe Stock offer a vast selection of horse shoe clip’art in different styles and designs. You can explore these platforms to find the perfect clip art) for your creative projects.
How do I attribute horse shoe clip’art that requires credit?
If you’re using horse shoe clip’art that requires attribution, ensure you provide proper credit to the artist. Include the artist’s name and a link to the source wherever you use the clip art) to comply with
Horse shoe clip’art is a creative doorway into a world where tradition meets modern expression. The horseshoe symbol, steeped in history and superstition, continues to captivate artists and designers, inspiring a plethora of creative works. From conveying luck to adding a touch of symbolism, horse shoe clip’art is a versatile tool for artistic expression. Explore, create, and let the horseshoe symbol
guide your artistic journey, unlocking a realm of creativity and meaning in the process. | <urn:uuid:0c600308-632f-4982-9f4c-25c27b70024f> | CC-MAIN-2024-10 | https://techiebullion.com/horse-shoe-clip-art-a-comprehensive-guide/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00058.warc.gz | en | 0.867651 | 1,336 | 2.875 | 3 |
The Great Depression of 1929-1941 had a devastating effect on the Philadelphia region and the country as a whole. It caused a severe contraction of economic activity, mass unemployment, bank bankruptcies, and strong price deflation. Many people lost their life savings and homes, and thousands went hungry, some even dying of hunger. The Great Depression had a profound impact on Bucks County's politics. It led to the formation of powerful unions, a shift in political alignments, and a new understanding of the role of government.
It also changed the way people viewed economic security and the need for government intervention in times of crisis. The economic downturn had a lasting effect on Bucks County's economy as well. Businesses closed their doors and unemployment reached record levels, leading to an increase in poverty and inequality, as well as a decrease in public services. In response to this crisis, the county government implemented various measures to help those affected by the economic downturn. One such measure was the creation of the Bucks County Economic Development Corporation (BCEDC). This organization was established to provide assistance to businesses in the county that were struggling due to the economic downturn.
The BCEDC provided loans to businesses to help them stay afloat during difficult times, as well as providing technical assistance and training programs for businesses that needed help adapting to changing economic conditions. The BCEDC also worked to attract new businesses to Bucks County by offering incentives such as tax breaks and other financial assistance. This helped to create jobs and stimulate economic growth in the county. The BCEDC also worked with local governments to create job training programs for those who were unemployed due to the economic downturn. The Great Depression had a lasting impact on Bucks County's politics. It led to an increased focus on economic security and government intervention in times of crisis.
It also changed the way people viewed unions and their role in society. The long-term effects of the Great Depression on Bucks County's economy and politics are still felt today. The county government implemented various measures to help those affected by the economic downturn, such as creating the BCEDC and providing incentives for businesses. These measures have helped to create jobs, stimulate economic growth, and ensure that those affected by the economic downturn are able to get back on their feet. | <urn:uuid:8d9fdf2b-cad7-4ee4-bbb7-550e65ca043f> | CC-MAIN-2024-10 | https://www.rebuildpennsylvania.com/how-has-the-economy-of-bucks-county-affected-its-politics | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00058.warc.gz | en | 0.980563 | 453 | 3.78125 | 4 |
Fluoroacetic acid derivatives (organofluorines) such as sodium fluoroacetic acid, methyl fluoroacetic acid and fluoroacetamide have been used as rodenticides. Occupational exposure can occur in formulators and pest control workers. Due to their extreme toxicity the use of these compounds is not widespread. Fluoroacetic acid derivatives dissociate to yield the fluoroacetate anion which is converted to fluorocitrate, inhibiting the Krebs cycle.
Animal studies have shown adverse effects following exposure to sodium fluoroacetic acid during gestation, with reports of congenital malformations in exposed fetuses.
There are no human data following acute exposure to fluoroacetate compounds during pregnancy, and therefore an accurate evidence-based risk assessment is not possible. Maternal toxicity is likely to be a major determinant of risk to the fetus and if exposure occurs, treatment should be as for a non-pregnant person. The need for additional fetal monitoring should be considered on a case-by-case basis, even in the absence of maternal toxicity. Discussion with UKTIS is recommended in all cases. Other risk factors may also be present in individual cases which may independently increase the risk of adverse pregnancy outcome. Clinicians are reminded of the importance of consideration of such factors when performing case specific risk assessments.
This is a summary of the full UKTIS monograph for health care professionals and should not be used in isolation. The full UKTIS monograph and access to any hyperlinked related documents is available to NHS health care professionals who are logged in.
If you have a patient with exposure to a drug or chemical and require assistance in making a patient-specific risk assessment, please telephone UKTIS on 0344 892 0909 to discuss the case with a teratology specialist.
If you would like to report a pregnancy to UKTIS please click here to download our pregnancy reporting form. Please encourage all women to complete an online reporting form. | <urn:uuid:7c763e20-6929-4d50-9cb8-cc0294f805b1> | CC-MAIN-2024-10 | https://uktis.org/monographs/exposure-to-fluoroacetates-in-pregnancy/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00058.warc.gz | en | 0.937616 | 409 | 2.625 | 3 |
Think of Britain’s capital and the first image that springs to mind is Big Ben, the iconic London clock tower of the Houses of Parliament in Westminster. Originally the site of the royal palace of London, Westminster is now the seat of governance and the bastion of British democracy. Big Ben–one of the most reliable clocks in the world–has no shortage of admirers, and the London clock tower has been used to set the scene in countless films and books over the last century.
Planning a trip to London? Check out Context learning, online experiences perfect for any avid learner keen to see the wonders of the world, or Context London private tours for when you’re in the Big Smoke itself.
Although the new Palace of Westminster–with its world-renowned London clock tower–looks like a remnant of the medieval city, it’s merely 160 years old. Built during the reign of Queen Victoria–after a tragic fire on October 16, 1834, destroyed most of the old Palace–the designs feature beautiful neo-Gothic elements that give the Palace its ancient look. The construction was completed in 1859, and its four-faced clock was the largest of its kind in the world. The tower rises to a staggering 315 feet high, and 334 steps wind dizzyingly to the top.
One-third of the way up the tower–at step 114–is a shadowy, dismal room, used as a prison cell for several years after the tower’s completion. When MPs weren’t acting in accordance with parliament’s codes of conduct, they’d be thrown into the room atop the tower to reflect upon their misdeeds. The room was last used in 1880 when MP Charles Bradlaugh–a staunch atheist who’d won his seat in the House of Commons as a radical–refused to swear his allegiance to Queen Victoria on the bible. He was only held in the tower overnight but was denied his seat in Parliament for five years.
The moniker Big Ben has been in use for over 150 years, and the nickname was originally applied only to the enormous bell inside the tower. The Great Bell received i’s sobriquet in honor of Sir Benjamin Hall, the First Commissioner for Works, who raised Big Ben to its current place atop the tower.
The nickname has been extended to the entire clock tower, despite having had two other official names. The tower was initially named the Clock Tower, an accurate (if somewhat uninspired) name for this massive timepiece. In 2012 it was renamed the Elizabeth Tower to commemorate the Queen’s Diamond Jubilee, though colloquially it will always be Big Ben.
Big Ben is a colossal bell weighing 15.1 tons. Great fanfare accompanied the bell’s arrival to the city, and it sailed down the Thames on a barge before being driven across Westminster Bridge in a carriage drawn by sixteen white horses. The bell hung in New Palace Yard to undergo testing but cracked during rigorous tests in October 1857. A new bell–cast by George Mears at the Whitechapel Foundry–was completed in April 1858 to replace the original bell, and in October 1858 the new bell was winched up the tower to its home in the belfry. After a grueling 30-hour journey, Big Ben was installed atop the tower, where it has hung for the last 160 years.
Sadly–just a few months after its inauguration–the bell cracked, and Big Ben was silenced for four years. The quarter bells, hanging lower in the tower, struck the hour to keep Londoners on time, as architects and craftsmen puzzled over how to repair the Great Bell. In 1863 they arrived at a solution. The London clock tower, Big Ben was rotated by a quarter, causing the hammer to strike a different place of the bell. Meanwhile, the hammer was lightened to prevent further damage. The bell has sounded at a slightly different pitch ever since, and the crack has never been repaired.
Big Ben might appear to stand perfectly vertical, but it actually has a slight lean. The tilt was discovered when plans were being made for the extension of the Jubilee Line that passes under the Parliament buildings. Changing ground conditions have affected the London clock tower, and it leans ever so slightly to the north-west, with an inclination of 0.26 degrees (that’s just one-sixteenth the tilt of the Leaning Tower of Pisa). Notwithstanding this slight lean, the tower should be safe for 4,000 to 10,000 years.
Despite its Victorian mechanisms, Big Ben chimes right on time, and it is accurate to within one second. This pendulum clock is rewound three times a week, and the tedious job–done by hand–takes around one and a half hours to complete. The clock keeps perfect time thanks to a pile of old pennies resting on the pendulum. Adding or removing pennies slightly shifts the center of gravity of the pendulum, and changes the speed of the pendulum swing. Adding a single penny will increase the speed of the pendulum, and slow the clock’s speed at a rate of 0.4 seconds per day. Among all the pennies are two silver coins; one was minted in 2009 to commemorate Big Ben’s 150th anniversary, and the other is a 1977 Silver Jubilee coin marking Queen Elizabeth’s 25th anniversary on the throne.
Big Ben has occasionally been silenced for repairs and was darkened during the blackouts of the second world war. Environmental factors have also affected the clock, and in 1949 the clock slowed by four and a half minutes when a flock of starlings held court on one of the minute hands. A heavy snowstorm on New Year’s Eve in 1962 also slowed the clock, and the New Year chimed a full ten minutes late.
Big Ben has been under scaffolds for the past few years, having a much-needed facelift. With the restoration set to wrap up in 2021, this refurbishment will repair the façade and restore the clock hands and details to their original blue color. Heavy London smog in the early 1900s turned the clock details black, and in the 1980s it was painted black to avoid the discoloring effect. During the conservation work, the London clock tower is silenced to protect the ears of the workers, but you’ll still hear its chime several times throughout the restoration process, on important days such as New Year’s Eve or Remembrance Day.
Join us on a day tour of London, or wander through Westminster on our Parliament tour to get an insider’s view of the governmental processes of England and see Big Ben up close. Interested in visiting London virtually from the comfort of your own home? Context learning experiences offer a plethora of online seminars and experiences in London and beyond.
Subscribe to our Newsletter | <urn:uuid:9c0fde63-1a54-4ec2-b27e-5afaf5ee993f> | CC-MAIN-2024-10 | https://www.contexttravel.com/stories/articles/7-facts-about-big-ben-the-celebrated-london-clock-tower | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474533.12/warc/CC-MAIN-20240224112548-20240224142548-00058.warc.gz | en | 0.959973 | 1,422 | 2.921875 | 3 |
Recently, the Center for Environmental Health (CEH) made headlines when it found bisphenol A (BPA) in athletic clothing from a number of well-known brands. But how is BPA, best known as the toxic plastic additive found in pre-circa-2010 baby bottles, ending up in clothing? And should we be alarmed?
Toxic BPA could be in your favourite “soft pants”
Athletic clothes, including sports bras, leggings, shorts and shirts, are often made from polyester-based fabrics. Since polyester is a synthetic material made from plastic, it isn’t surprising that we’re finding a toxic plastic additive in our stretchy pants. According to the Center for Environmental Health, some of the clothing items they tested contained BPA levels up to 40 times what California law considers “safe”.
Meanwhile, Canada doesn’t have a “safe” exposure limit for BPA. Its action on BPA has been limited to eliminating the chemical from baby bottles — a necessary first step, but far from the comprehensive measures needed to protect everyone living in Canada from BPA exposure.
People living in Canada are exposed to toxic BPA every day
BPA is widely known for its endocrine or hormone-disrupting effects and is linked to a wide range of health issues including diabetes, obesity, ADHD in children and hormone-based cancers such as breast and prostate cancer. The primary route of exposure is through ingestion, but studies have found the chemical can also be absorbed through the skin.
BPA is found in various consumer products beyond sports bras and vintage baby bottles. It can also be present in storage containers for foods and beverages, the plastic lining in food and beverage cans, and thermal paper used for receipts and grocery stickers, prescription labels, airline and lottery tickets. Additionally, products that may not contain BPA itself often contain other chemicals in the same class, such as bisphenol-S (BPS) and bisphenol-F (BPF), which have similar hormone-disrupting properties.
We need comprehensive action on toxics
Until very recently, the federal government has used the Canadian Environmental Protection Act (CEPA), its main toxics law, to target specific chemicals in specific uses. For instance, it specifically banned BPA in baby bottles. However, just last month, it proposed a more comprehensive approach to managing another toxic chemical commonly found in consumer products.
Health Canada has proposed listing the entire class (group) of per – and polyfluoroalkyl substances (PFAS) — containing more than 4000 chemicals — as toxic under CEPA. This is a significant development and a welcome change from previous regulatory approaches.
By declaring the whole class toxic, the federal government would gain the authority to restrict the use of PFAS chemicals in various applications. But so far, Canada’s proposed action focuses only on PFAS-laden firefighting foams — which is only one of many sources of PFAS exposure. Limiting regulatory action to a single source gives other sectors a free pass to pollute. The federal government needs to take a more comprehensive approach to tackling PFAS, and other toxic chemicals, including bisphenols.
We shouldn’t have to worry about being exposed to toxics through the products we use. Product manufacturers, importers and retailers need to step up and ensure their products are safe. The government needs to comprehensively deal with all hidden hazardous classes of chemicals that show up in our stuff and our bodies.
Tell the federal government that you support their efforts to address problematic classes of chemicals, and urge them to take action on toxic products. | <urn:uuid:967f3c20-d88e-4825-8344-9c61debbc8d8> | CC-MAIN-2024-10 | https://environmentaldefence.ca/2023/06/09/you-cant-run-away-from-bpa-especially-when-your-sports-tee-is-made-from-plastic/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00058.warc.gz | en | 0.950796 | 759 | 2.9375 | 3 |
One of the fundamental variables in preclinical biomedical research is sex: whether a cell, tissue, or animal is female or male. Biological sex is an important consideration for this research that underlies drug development, clinical trials, and prevention approaches.
Sex & Gender Influences on Health & Disease
Chloe Bird, Ph.D., Senior Advisor to the Director of the NIH Office of Research on Women’s Health (ORWH), talks about how increasing our understanding of sex and gender influences on health and disease is critical to advancing women’s health research and improving the health of everyone.
Dr. Chloe Bird: Advancing Understanding of Sex & Gender Influences on Health & Disease
The NIH Office of Research on Women's Health talked with some of the leading experts on studying sex to strengthen science. Hear what they have to say about how to take sex into account in preclinical research.
Dr. Gillian Einstein: Importance of Sex as a Basic Biological Variable in Preclinical Research
Dr. Arthur Arnold: Understanding Disease in Males and Females
Dr. Larry Cahill: Challenging Assumptions About Sex in Preclinical Research
Dr. Londa Schiebinger: Understanding Gender in Research
October 20, 2014, Workshop
Learn how to incorporate sex to strengthen scientific design from leaders in the field through this recorded full-day meeting hosted by ORWH. Read the workshop summary (PDF).
Learn more about the importance of reproducibility in biomedical research, the concept of including male and female subjects in studies, and the impact of including or not including sex as a basic biological variable.
Learn about practical methods to integrate the biological variable sex into research projects and cultivating a culture of "Sex Matters" across multiple disciplines. This video concludes with recommendations and highlights.
The NIH Record, November 7, 2014
Females and Males: Same and Different? NIH Workshop Explores Question
How do you incorporate sex as a variable in research with animals and cells? This question was the focus of an October 20 workshop hosted by ORWH. The workshop was designed to help scientists understand why sex in preclinical research is important, as well as to provide practical guidance on experimental approaches. | <urn:uuid:34dce37f-b194-4ebf-89d9-848f919c6ef9> | CC-MAIN-2024-10 | https://orwh.od.nih.gov/sex-gender/methods-techniques-integrating-sex-research | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00058.warc.gz | en | 0.913707 | 446 | 2.890625 | 3 |
As I look around me, I see a world filled with differences. I am ignorant about many realities, but I welcome them.
I avoid judging others. People have reasons for their behaviors, and I accept that. It is easy to develop a connection with them because I shy away from judging their choices.
When I allow myself to be open to differences, I get along well with others. It feels good to collaborate even when I see things another way.
My students all come from different countries, but I am able to achieve unity in the classroom. I focus their attention on the theme of teamwork. That is a common concept in each country represented.
I am encouraged when generally accepted ideas bring people together. It is proof that even with differences, there is room to become one.
Work projects produces impressive results when everyone contributes. Sometimes I lack understanding of someone’s approach, but I remain encouraged. Patience eventually allows me to get it.
Whenever there is a central goal, I stick to the game plan. I am willing to sacrifice my preferences for the benefit of the team. I know that there is equal value in each person’s contribution to the mission at hand.
Today, I celebrate being a part of various groups of people in my professional and personal lives. Willingness to embrace differences opens the door for oneness of purpose.
1. How willing am I to ask someone to enlighten me when I lack understanding?
2. What part does body language play in understanding someone?
3. How easy is it for me to open up to a stranger? | <urn:uuid:5908edce-a472-4fd7-9e69-cadf2557d245> | CC-MAIN-2024-10 | https://personaldevelopmentwisdom.com/unity-comes-from-a-willingness-to-understand-others.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00058.warc.gz | en | 0.961065 | 327 | 2.609375 | 3 |
The polarisation vector of a neutron beam can be seen as a classical vector in the space of the laboratory. In particular, the component Pα in the direction α is defined as Pα = (n+ - n-) / (n+ + n-) where n+ and n- are the number of neutrons which fall in the |+½> and |-½> eigenstates of the angular momentum component σα of the neutron.
In the 1960s, Izyumov and Maleyev [I62], Blume [B63,B64], Izyumov [I63] and Schermer and Blume [S68] derived the theory of polarised neutrons scattered by various materials using the density matrix formalism within the Born approximation. The theoretical results gave the expressions for the total cross-section σ and the final polarisation vector Ρ summarised in the table below. In these expressions, N is the nuclear structure factor, M is the magnetic interaction vector ki and kf are respectively the incident and final amplitudes of the neutron wave vectors, and Ρi is the incident polarisation vector.
From these equations, one can predict the rotation of the polarisation vector upon scattering. The polarisation direction is conserved when the scattering is of coherent nuclear origin: for example a nuclear Bragg peak without nuclear spin polarisation or an isolated phonon. The polarisation rotates by 180° around the magnetic interaction vector when the interaction is magnetic and non chiral: for example a magnetic satellite of a collinear arrangement or a magnon. For a non-collinear magnetic structure, the intensity may depend on the incident polarisation Ρi and for an helix there is a creation of polarisation along the scattering vector. When there is nuclear-magnetic interference, the intensity depends on Ρi only when Ν and Μ are in phase. As regards the polarisation vector, it rotates toward or around the magnetic interaction vector when Ν and Μ are respectively in phase or in quadrature.
Because the neutron beam polarisation can be considered as a three-dimensional vector, it is obviously useful to define a set of orthogonal polarisation axes on the instrument. Because the magnetic interaction vector Μ is the projection of the magnetic structure factor onto a plane perpendicular to the scattering vector Q, it is convenient to choose X parallel to Q. Z is conventionally chosen perpendicular to the scattering plane and Y completes the right-handed cartesian set.
From the above table, it has already been shown by P.J. Brown [B01] that the scattered polarisation is the combination of a rotation of Ρi with a creation of polarisation:
The 9 components Rαβ and the 3 components Ρα where (α,β) are X, Y, Z indices are obtained by measuring the three components of the scattered polarisation for Ρi = 0, X, Y and Z. The expressions of these 12 quantities are the following in polarisation coordinates:
We propose a series of simulations presenting the way the neutron polarisation vector rotates upon scattering. These simulations have been calculated with Mathematica from the Blume - Maleyev equations cited above. Click on the right menu to view your case of interest.
[I62] Y. Izyumov and S. Maleyev Soviet Phys. - JETP 14 (1962) 1668
[B63] M. Blume Phys. Rev.130 (1963) 1670
[B64] M. Blume Phys. Rev.133 (1964) A1366
[I63] Y. Izyumov Soviet Phys. - Usp.16 (1963) 359
[S68] R. Schermer and M. Blume Phys. Rev. 166 (1968) 554
[B01] P.J. Brown, Physica B297 (2001) 198 | <urn:uuid:043deef1-7432-48e2-96ae-7b9d73400dd1> | CC-MAIN-2024-10 | https://www.ill.eu/users/support-labs-infrastructure/sample-environment/equipment/polarimetry/snp-simulations | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00058.warc.gz | en | 0.845628 | 815 | 3.203125 | 3 |
Tracheomalacia is a comparatively rare disease that is associated with instability or softness of the windpipe (trachea) and can be attributed to congenital (innate) and acquired causes. The prognosis and course of tracheomalacia depend on the underlying cause.
What is tracheomalacia?
Tracheomalacia is an instability of the trachea that is caused by insufficient strength of the cartilage braces that stabilize the trachea and can affect individual sections or the entire trachea. For slang hf, please visit electronicsencyclopedia.com.
As a result of the softness of the tracheal cartilage structures, breathing can be impaired because the resistance to breathing is increased. This can also lead to a collapse of the trachea due to the greatly reduced inspiratory negative pressure when inhaling, especially when there is an increased need for oxygen.
Tracheomalacia manifests itself in the form of inspiratory and expiratory stridor (inhalation and exhalation noise), limited exercise capacity, functional stenosis (narrowing), coughing, tachy- and dyspnea (increased or difficult respiratory function) and cyanosis.
In many cases, affected infants also hyperextend their neck to widen the lumen of the trachea (so-called opisthotonus posture). In the further course, the impairment can spread to the bronchi (tracheobronchomalacia).
Depending on the underlying cause, three types of tracheomalacia are differentiated. In the congenital or primary form, there is usually a congenital connective tissue disease such as campomelia syndrome, esophageal atresia (malformation of the esophagus) or tracheoesophageal fistulas, which lead to impaired growth of the tracheal cartilage rings.
In addition, tracheomalacia can be caused by external compression (Type 2) that narrows the trachea. The narrowing ( stenosis ) is typically due to mediastinal tumors (including a hemangioma ), congenital vascular anomalies (including a double aortic arch, the so-called pulmonary loop), bronchogenic cysts, a megaesophagus, or goiter.
The third form is caused by chronic infections (including recurrent polychondritis) or excessively long intubation with high ventilation pressures, with an increased risk here, particularly in premature babies.
Symptoms, Ailments & Signs
Tracheomalacia leads to breathing difficulties and abnormal breathing sounds. Doctors differentiate between congenital and acquired tracheomalacia. The innate expression is regularly associated with a positive outcome. It is no longer present after the first or second year of life, even without therapy.
Symptoms occur primarily in patients in the prone position. There is an improvement in an upright or inclined position. Clear signs can be detected when inhaled. Then the resistance of those affected is comparatively greater. Doctors listen to the breathing as part of their diagnosis and usually describe the sound as hens cackling.
At the same time, the nostrils move with inhalation and exhalation, which often remains hidden from the patient. Pendulum movements can occur on the abdomen. Sick children and adults are often unable to identify the symptoms themselves. That is why consulting a doctor is essential.
If those affected name problems in advance, they relate to breathing. Problems in stressful situations are often referred to. Shortness of breath quickly sets in during sport or in the context of pronounced gaits. Those affected then react by coughing and gasping for air. Fear and panic often set in.
Diagnosis & History
Initial suspicion of tracheomalacia often results from the clinical symptoms. A decrease in air flow during expiration (breathing out) as part of a lung function check also indicates the possible presence of tracheomalacia.
In addition, a functional stenosis due to tracheomalacia can be differentiated from a fixed tracheal stenosis. The diagnosis is confirmed by a fiberoptic endoscopy, which enables an assessment of the dynamic changes in the tracheal lumen in the various respiratory phases. Tracheomalacia due to external compression can be detected by imaging diagnostic procedures such as MRI (magnetic resonance imaging), CT (computed tomography) or angiography. The course and prognosis of tracheomalacia depend heavily on the underlying cause.
While congenital forms usually have a very good prognosis and are largely self-remitting, the infection-related form has a significantly less favorable prognosis. The prognosis of other acquired forms of tracheomalacia depends on whether the triggering factors (tumors or malformations) can be eliminated.
The breathing difficulties typical of tracheomalacia can cause various complications as the disease progresses. First, there may be shortness of breath. This results in an insufficient supply of oxygen to the brain, which can have life-threatening consequences, especially for infants and small children.
In the case of severe tracheomalacia, which is also aggravated by infections, there is an acute danger of suffocation. Complications can also arise from the underlying disease. For example, if tracheomalacia is caused by a tumor, there is always a risk that it will metastasize or grow and make breathing difficult.
If the course is severe, the prognosis is rather poor. Many children die from the disease or suffer from stunted growth and mental problems due to lack of oxygen. Drug treatment represents an enormous burden for infants and young children. An overdose can quickly cause serious complications, and side effects can also occur.
A surgical procedure involves the usual risks, i.e. the risk of infections, bleeding and nerve or vascular injuries. Splinting the trachea is particularly problematic. Inflammation or sensitive injuries to the trachea occur again and again. Wound healing disorders and postoperative bleeding can also occur after an operation.
When should you go to the doctor?
General breathing difficulties are always a cause for concern. If they occur in physically demanding situations or during sporting activities, they are often part of a natural reaction. As soon as the symptoms recede within a short time after taking a rest phase, there is in most cases no further need for action. However, if the breathing irregularities persist, if they occur repeatedly or if they increase in intensity, a doctor must be consulted.
Since this disease can be congenital or acquired, a doctor is needed as soon as newborns show the first abnormalities. If there are changes in breathing activity during the development and growth process or in adulthood, a doctor must also be consulted. Coughing, looking pale and a decrease in physical performance are signs of a health problem. In the case of fatigue, rapid exhaustion and exhaustion, a search for the causes should be initiated.
If the person concerned shows signs of emotional or psychological peculiarities, medical help is also required. In states of uncertainty, fear and panic, a racing heart and sweating, a doctor should be consulted. If there is resistance in the organism when inhaling oxygen, this is a characteristic feature of the disease and should be discussed with a doctor as soon as possible.
Treatment & Therapy
The therapeutic measures in tracheomalacia depend on the extent, the underlying cause and the age of the specific affected person. The congenital form is usually self-remitting and growth-related stabilization of the tracheal wall takes place in the first two to one and a half years of life.
Physiotherapeutic measures can support an improvement in respiratory function. If secondary infections also occur as a result of increased secretion retention, antibiotic therapy in combination with inhalations to moisten the airways may be indicated. In some cases, especially in the case of diffuse tracheobronchomalacia or insufficient oxygen supply, long-term CPAP therapy (CPAP = Continuous Positive Airway Pressure) via a tracheostomy tube or ventilation mask is recommended to permanently generate positive pressure until the cartilaginous structures have stabilized due to growth.
Surgical intervention is indicated for severe or life-threatening forms and children who cannot be weaned from CPAP therapy. In order to avoid tracheal compression in the case of short stretches of tracheomalacia, the aorta is fixed to the sternum (breastbone) as part of an aortopexy, so that the mediastinum (medium skin space) is given more space. If long-distance tracheomalacia is present, however, the trachea is splinted using an expandable intraluminal metal stent.
In addition, the triggering factors in acquired tracheomalacia should be eliminated. Compressing structures such as tumors, vascular anomalies or goiter should be surgically removed. However, if the tracheomalacia can be traced back to an infection-related instability, antibiotic therapy is indicated.
The congenital form of tracheomalacia can be partially prevented by treating the malformations that cause it as far as possible. Acquired tracheomalacia can be prevented by appropriate caution during long-term intubations and consistent treatment of the underlying diseases such as tumors or goiter.
Tracheomalacia is a slackening of the trachea that can have various causes. The aftercare, which must focus on the underlying disease, is correspondingly diverse. In infants who may have congenital tracheomalacia, repositioning the child can often temporarily relieve the symptoms. If spontaneous healing occurs after some time, this does not require any special follow-up care, but only regular visits to a pediatrician, who will ensure complete healing.
If tracheomalacia occurs as a result of external influences such as goiter, the causative disease must be treated and, as a rule, an operation must be carried out. Here the follow-up care is designed for the underlying disease and can therefore not be presented as a single valid form. The consequences of the operation and its after-effects must be observed, which accompanies healing.
The tracheomalacia and its healing must also be included in the aftercare by an appropriate specialist. If tracheomalacia was caused by an infectious trigger, acute treatment with antibiotics is required. In the follow-up care, the specialist ensures that the tracheomalacia is free from bacteria and heals. It must also be noted that antibiotic therapy also affects the intestinal flora. This should be rebuilt during aftercare.
You can do that yourself
Congenital tracheomalacia can be improved by placing the infant on its stomach for the first few months of life. This often leads to an improvement in the symptoms over a period of months or years. If the disease is based on external compression, the cause must be treated. This can be achieved, for example, with radioiodine therapy or with a strumectomy if the symptoms are caused by goiter. In addition, the typical general measures apply, i.e. rest and protection.
An infection-related tracheomalacia must be treated with medication, for example by the patient taking antibiotics. The appropriate accompanying treatment is rest. Severe tracheomalacia can cause life-threatening breathing difficulties. Good monitoring of the person concerned is all the more important. If the mentioned respiratory problems occur, the emergency doctor must be called. The patient must be in the stable lateral position be brought to ensure adequate ventilation of the lungs. Depending on the intensity and localization of the symptoms, tracheostomy tubes can then be inserted, which ensure the supply of oxygen. The tube must be checked for inflammation and bleeding, which occurs primarily in people whose immune systems have already been significantly weakened by the disease.
Patients suffering from tracheomalacia must be constantly monitored in everyday life, as complications can occur again and again. To ensure that help arrives quickly in the event of a medical emergency, close contact should be maintained with the emergency telephone service. | <urn:uuid:a0aa1995-2e1e-4235-8dc0-79e9c1264438> | CC-MAIN-2024-10 | https://www.medicinelearners.com/tracheomalacia/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00058.warc.gz | en | 0.932964 | 2,477 | 3.296875 | 3 |
Our Historic Gardens
The Williamstown Botanic Gardens are included on the Victorian Heritage Register because of their historical, aesthetic, scientific and social significance.
The Gardens are historically important as one of Victoria’s earliest and most intact botanic gardens. The Gardens have considerable significance for their strong association with eminent 19th century landscape designer Edward LaTrobe Bateman and for their early connections with Ferdinand von Mueller and Daniel Bunce.
The Gardens are aesthetically significant for their excellent design and for the remarkably elegant execution of that design within a small flat site. The strikingly intact Victorian layout, early tree plantings, the palms, the pinetum and the pond, structures and herbaceous and woody plantings from the Edwardian period all contribute to the picturesque landscape.
The Gardens have scientific (horticultural) significance for their collection of plants, particularly the dominating palm and conifer themes and the large quantity of plants remaining from the Edwardian and Victorian periods.
The Gardens are socially important for their long and continuous relationship with the citizens of Williamstown, who were largely responsible for their creation and early development and who continue to use them as a place of recreation. | <urn:uuid:bf700b8d-73dd-491c-8fd5-c1f3a6a049a5> | CC-MAIN-2024-10 | http://www.friendsofwilliamstownbotanicgardens.net/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474671.63/warc/CC-MAIN-20240227053544-20240227083544-00058.warc.gz | en | 0.9425 | 237 | 2.78125 | 3 |
A configuration administration system (CMS) is a set of instruments and processes for managing the configurations of pc systems, together with software, hardware, and networks. A configuration administration system can arrange and control configurations to enforce a constant desired state over time. Implementing a model control system like Git and monitoring your configuration data information will create a traceable log of any edits made.
The CMDB promotes the idea of a singular monolithic repository, while the CMS supplies a conceptualized system of CMDBs that act together to assist the needs of this governance course of. Both demonstrate advantages over a static CM spreadsheet or a text file that requires significant handbook repairs and can’t combine base workflows and best practices. It delivers Red Hat’s open supply innovation, hardened in your enterprise—so you probably can increase productivity and reduce time-to-completion for brand spanking new tasks.
Why Is Configuration Administration Important?
With an improved system, the risk of future litigation for knowledge breaches is also minimized. In distinction to proactive measures taken earlier than an issue emerges, an absence of repairs, and take care of details would possibly Software Сonfiguration Management supply larger hazards in the future. Constant system upkeep, record-keeping, and error-prevention checks that keep away from duplication and omissions all contribute to the cost-effectiveness of configuration administration.
CM instruments corresponding to Ansible, Puppet, Chef and SaltStack are usually geared toward the latter a half of the CI/CD toolchain, the place workloads are deployed into the information center’s hardware surroundings. Consistency — doing the same issues in the same methods — also plays instantly into quality-of-service (QoS) and repair delivery, and configuration management holds a core function here. Service delivery helps to guarantee that the environment (and the hardware and software operating therein) operates in a identified and validated manner. IT service management (ITSM) frameworks corresponding to ITIL take the concept even further by outlining the processes, individuals and products involved in service delivery. IT administrators use configuration management and ITSM to implement accepted approaches whereas guarding against prohibited approaches. The objective is to guarantee that any companies supplied by IT are available, dependable and safe.
Configuration administration must also permit methods to be self-healing to enable continuous compliance. Every configuration management system is designed to do a similar set of basic things. The several types of configuration administration and the specific ways it will get there all ladder as much as imposing a desired state in a system. Configuration management helps developers to create, check, and deploy new builds shortly and effectively. LogRocket identifies friction points in the person expertise so you can also make knowledgeable selections about product and design changes that must happen to hit your targets. With LogRocket, you can understand the scope of the issues affecting your product and prioritize the adjustments that need to be made.
Version management techniques (VCS) observe any adjustments made to the code or configuration and revert them if necessary. During the CM process, there could additionally be instances the place knowledge is duplicated or inconsistent. To sort out this, your organization ought to create a plan for eradicating duplications and merging all knowledge in a single repository. Configuration management is a vital element of DevOps and making certain your product can operate optimally. It leaves behind a trail that you should use to return to useful variations or discover the place points started to occur.
Cloud-based platforms additionally provide a excessive stage of configurability and customization, through open APIs and strong application ecosystems. These platforms additionally assist superior analytics, automation, and optimization use cases, through giant knowledge lakes and the facility https://www.globalcloudteam.com/ of cloud computing to help refined machine studying purposes. These platforms offer quick access and monitoring across extremely distributed networks and make provisioning of distant sites easy.
However, configuration information is critical in phrases of the operations part of the DevOps cycle. Baselines and configuration objects are critical insights into community knowledge, systems, and relational dependencies. Administrators develop baselines via a four-step course of by way of their useful, design, improvement, and manufacturing requirements. Multiple administrators can share entry to the CM instruments for prompt remediation when needed. The configuration management course of begins with gathering info including configuration knowledge from each software and the community topology. Secrets such as encryption keys and passwords ought to be identified to enable them to be encrypted and saved safely.
What’s Configuration Management?
VMware is addressing cloud chaos with our portfolio of multi-cloud services, VMware Cross-Cloud companies, which enable you to construct, run, handle, secure, and entry applications constantly throughout cloud environments. With VMware Cross-Cloud providers, you probably can handle cloud chaos and shift to a cloud good method – one where you probably can choose the most effective surroundings for each software, with out multiplying your complexity. Use the next steps to successfully implement configuration management processes. Misconfigured software program ends in service breakdown, which impacts staff and clients dependent on the IT system. A configuration management system paperwork and shops all configuration changes in a centralized platform. Organizations implement configuration administration to streamline configuration settings across totally different IT systems.
With configuration management, you probably can easily apply configuration values at different software development levels. For instance, computing capacities are limited if you’re creating software on bodily machines. However, you have to revert to actual useful resource allocation when you test the appliance in the manufacturing environment. With a configuration management system, you probably can simply swap between versions of configuration data as an alternative of making manual modifications. Application deployment and configuration administration outline and enforce the resources wanted to run the construct in a desired configuration. The ultimate step is precise deployment, where the build is delivered for signoff to deployment — or automatically deployed to stay servers — and connected to working companies as desired.
Community Management Platforms
Configuration managers gather all relevant information about the configuration gadgets (CIs) to initiate the process. Important information is centralized, making it simpler to manage and update the data repository. Good CM lets IT directors keep the integrity and consistency of the IT setting by monitoring changes and making certain that all techniques work collectively cohesively. CM teams additionally set up and maintain baselines to guarantee that the systems they develop are secure and carry out constantly. It helps avoid penalties and ensures that customers and end-users have a constructive expertise with the product.
It is a crucial capability that is foundational to all other community administration functions. With an automation framework, system engineers can run scripts that mechanically provision systems and configure them throughout clusters, networks, and gadgets. By automating configuration administration, you’ll find a way to achieve desired system performance with out relying on guide intervention.
What Are The Advantages Of Configuration Management?
This single supply of fact will host this data in data recordsdata, with particular care given to encrypt any secret knowledge like passwords and keys earlier than storing it. The configuration status accounting (CSA) function information and files data concerning modifications as approved changes get implemented. Because the CSA is answerable for issuing the licensed and most present configuration state, the integrity of its information is crucial. To test this, directors should apply periodic functional and physical configuration audits to make sure the CM meets the organization’s technical necessities. Configuration management (CM) is a broad time period used to explain the management of IT assets across networks and organizations. Configurations particularly are the foundations, policies, and community parts administrators have in their management.
Configuration information are settings that you can use to enable IT methods to function in a particular manner. Before deployment, you configure varied parameters—such as reminiscence allocation, hardware allocation, consumer entry privileges, and network parameters—so that the system operates optimally. Future CM instruments should also be ready to deal with the software-driven elements of such an setting, during which containers usually exist for only minutes and even seconds. This places a specific emphasis on container orchestration tools for configuration management. Configuration administration relies on programmatic techniques (instructions or code) to create, test and deploy software builds and handle infrastructure.
- The ITIL framework, which emerged within the Nineteen Eighties, introduced principles and practices for enterprises to decide out, plan, deliver and keep IT companies.
- During the CM process, there could also be situations where data is duplicated or inconsistent.
- Once the 2 are compared and reporting shows compliance being enforced across the infrastructure, the audit turns into a breeze.
- It requires a well-defined process for managing configurations and adjustments, as properly as monitoring compliance with this course of.
- Configuration management supports the DevOps mannequin by offering visibility into the production setting, enabling software optimization.
CM ensures that growth, test, and production environments are consistent in your group. It helps make positive that deployed purposes behave within the manner that’s expected of them. Without a configuration administration course of, it’s tough for organizations to finish duties like testing, installing, or sustaining a system. You might even battle with understanding how configurations impact operations or how they have an result on different methods. Overall, it’s an important a part of DevOps and shouldn’t be missed by product managers. Configuration data just isn’t traditionally captured in model control systems or stored in main databases.
This helps the onboarding process for new engineers and likewise ensures that others can shortly perceive the operating environment to be more practical in emergencies when speedy response is important. Capabilities like automating remediation and making centralized modifications to baseline configurations throughout the community guarantee directors have the wanted management instruments. There are numerous configuration administration instruments to choose from, with varying ranges of complexity and various architectural styles. Although every of these tools have their very own traits and requirements, their perform is essentially to claim and implement that a system state matches the state described by a set of provisioning scripts.
This might impact the bottom line in phrases of unplanned downtime, extra expense, and countless hours wasted remediating errors, high quality points, and missed deadlines due do downtime. As with most IT automations, CM retains organizations from continuously combating fires and lets IT concentrate on more productive work. Once information has been collected the group can set up a baseline configuration, which ought to be a identified good configuration that may perform its intended operations with out bugs or errors. Typically this baseline is established by noting the configuration of the working production environment and storing those configuration settings because the baseline.
Configuration management permits organizations to facilitate continuous delivery, streamline updates and upgrades, and improve stability across environments. It additionally allows you to build on top of existing system settings to create a larger, more versatile, extra strong infrastructure. Because of this extensive visibility, organizations trust automated configuration management to make adjustments in the organizations at scale – by way of current or web new infrastructure. Configuration administration ensures a system performs as desired over time, whilst modifications are made to the system. Organizations typically use configuration administration to minimize back configuration drift and keep compliance with IT security requirements. | <urn:uuid:fc2e24f7-e471-4440-b4bd-59252f0fe950> | CC-MAIN-2024-10 | https://www.10wea.com/category/software-development-10/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00158.warc.gz | en | 0.906407 | 2,251 | 2.734375 | 3 |
Benzodiazepines are central nervous system depressants approved by the FDA to treat anxiety, insomnia, and seizures. They are also commonly prescribed by doctors for treating off-label conditions such as acute alcohol withdrawal, bipolar disorder, and tic disorder. Benzodiazepines are considered safe and effective when used for a short period of 2-4 weeks. Prolonged use of benzos has been associated with the development of tolerance, dependence, addiction, and other negative effects.
Benzodiazepines are among the most commonly prescribed medications in the U.S. According to a report published by the Centers for Disease Control and Prevention (CDC), benzodiazepines were prescribed at around 66 million doctor’s visits a year from 2014 to 2016. Benzodiazepines are habit-forming medications that cause dependence within a short period, causing individuals who take them daily to experience withdrawal symptoms during abrupt cessation. Most withdrawal symptoms begin within 24 hours after the final dose and can last from a few days to several months, depending on several factors.
Withdrawal symptoms from benzodiazepines can affect anyone who uses them, including those who have been prescribed them and those who have misused them without a prescription. The following factors increase the risk and the severity of withdrawal:
The length of use and dosage: Individuals who take benzos for several months or more at higher doses are more likely to experience withdrawal symptoms that last longer than those who take lower doses for a shorter period.
Misusing benzodiazepines: According to the National Institute on Drug Abuse (NIDA), benzos are addictive medications that increase the risk of misuse. And the misuse of benzos increases the potential for dependence and withdrawals.
Method of ingestion: The method of usage is often linked to the beginning of symptoms. For example, snorting or injecting benzos delivers the medications directly into the bloodstream, where they have an almost immediate effect. Ingesting a pill results in a less intense high and delayed symptoms.
Type of Benzodiazepine (short-acting or Long-acting): Short-acting benzos, such as Xanax, are considered more potent than longer-acting alternatives, such as Valium. Although withdrawal symptoms are similar in both cases, short-acting benzos can cause severe and quicker withdrawals. And since long-acting benzos last longer in the body, withdrawal symptoms are delayed.
Underlying mental or medical health issues: Individuals with pre-existing physical and psychological disorders are more likely to misuse medications. The misuse of benzos results in the development of tolerance, dependence, and withdrawals.
Mixing benzos with other substances: Benzodiazepine misuse also involves the use of benzos in combination with alcohol and other medications. This is referred to as poly-substance use, and it may affect the severity and timeline of withdrawal symptoms.
Benzodiazepines are generally not meant for long-term use. Long-term use and misuse of benzodiazepine can result in physically and mentally crippling withdrawal symptoms that can turn dangerous during abrupt cessation.
Benzodiazepine withdrawal syndrome can develop after as little as one month of use. Approximately 40% of those who take benzos for more than six months experience moderate to severe withdrawal symptoms when they abruptly stop taking them. The remaining 60% experience only minor symptoms.
The most common withdrawal symptoms include:
Benzodiazepine withdrawal may occur in three stages: early, acute, and protracted withdrawal.
Early withdrawal symptoms, also known as rebound symptoms, arise immediately after an individual discontinues benzodiazepines. During this withdrawal stage, the individual may notice the re-emergence of the condition benzos were initially prescribed to treat. For example, without medications, symptoms of anxiety or insomnia can return or get worse. Tapering down methods or other medications to aid with withdrawal symptoms can make early symptoms milder and more manageable.
Acute withdrawal symptoms occur a few days after the last dose and last anywhere from five to 28 days. And this is the most difficult part of the withdrawal process. Certain medications are utilized during the acute withdrawal phase to minimize the risk of relapse. Suicidal thoughts and behavior that may arise during the acute withdrawal stage can be addressed through therapy and support groups.
Protracted withdrawal, also known as post-acute withdrawal symptoms or PAWS, only affects certain individuals. If you have used benzos for longer than recommended, misused them, or formed an addiction, you are more likely to develop PAWS. Symptoms may continue for up to 12 months or longer. Paws include symptoms such as:
PAWS can appear unexpectedly and cause severe distress. Supportive counseling and other targeted therapies or medications can help individuals manage their symptoms and improve their quality of life.
Individuals who wish to stop using benzos are highly advised to seek assistance from a physician or addiction specialist before quitting. Detox at an inpatient setting is an ideal treatment option for individuals with:
Treatment options and coping strategies for benzo withdrawal include:
Medical detox: Medical detox can assist in the effective management of withdrawal symptoms. Medical monitoring allows physicians to react to possible withdrawal complications more quickly.
Tapering down method: When not handled properly, benzodiazepine withdrawal can be dangerous. People who stop using benzos without tapering (the gradual reduction of dosage) run the risk of life-threatening grand mal seizures, delirium, and hallucinations.
Other medications: If symptoms worsen or rebound symptoms occur, doctors can recommend alternative medications. For example, medications such as flumazenil (Romazicon) helps reverse the effects of benzodiazepine and buspirone (BuSpar) to treat severe anxiety.
Other therapies: Therapies, such as counseling and cognitive-behavioral therapy (CBT), can also help manage withdrawals.
Healthcare providers will assess the condition and recommend the right long-term treatment interventions to relieve symptoms and prevent relapses.
The risks of benzodiazepine withdrawal can be considerably decreased with the intervention of a physician or an addiction specialist. If you wish to stop taking benzos, first consult your doctor.
If you are seeking help with your loved one’s addiction, contact us today or complete our quick contact form below, to speak with an addiction treatment specialist.
If you need help with your substance use disorder, we are here to help you build your confidence and momentum towards the future you want. We provide treatment services for adults with alcohol, opioid, and other substance use disorders. We are currently located in Florida, Louisiana, Massachusetts, North Carolina, New Jersey, Ohio, Texas, and Washington. | <urn:uuid:97d92fcc-a976-49b5-a26d-516f060ff6c4> | CC-MAIN-2024-10 | https://www.eleanorhealth.com/blog/symptoms-of-withdrawal-from-benzodiazepines | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00158.warc.gz | en | 0.942334 | 1,354 | 2.8125 | 3 |
Pecans in Mexico
An Overview of the Mexican Pecan Industry
Pecans originated in northern Mexico and the southeastern part of the USA. Although walnuts and other nuts have been consumed and marketed worldwide for centuries, pecans were hand harvested and traded first by Native Americans in the river valleys of Texas for hundreds of years. Only now, more and more countries are becoming acquainted with pecans.
In the last three years, most (60%) of Mexico’s pecans were grown in the border state of Chihuahua, and another 15% in each of two other northern states, the state of Coahuila and Sonora. Each state faces the same challenge—lack of water. On the coastal plain of Hermosillo, Sonora, water is pumped from the aquifer, which is barely maintaining its level by strict adherence to pumping quotas. In Chihuahua, many wells have been drilled, and water levels continue to drop.
Growers in the southeastern part of the United States, where there is high humidity and rain, repeatedly spray for scab. A friend in Georgia recently remarked that “spraying for scab is a challenge, but at least we have plenty of water.”
The predominant variety is ‘Western Schley’ in Chihuahua and ‘Wichita’ in Sonora. The latter is a large nut preferred by Chinese consumers. Sonora exports a significant volume of Wichita to China.
Many new plantings are high density, with trees established as close as 15 by 30 feet (5 by 10 meters), with up to 80 trees per acre (200 per hectare). Due to more trees per acre, these plantings come into bearing earlier than those with fewer trees and improve the return on investment. Hedging of closely planted trees begins in the first ten years.
A significant challenge in Sonora is the lack of sufficient chilling hours. Pecans require over 500 chilling hours (under 45 degrees Fahrenheit in winter). Since the Hermosillo area has fewer than 500 chilling hours (between 150 and 350), growers and their technicians have learned ways to confront this dilemma.
Another challenge for growing pecans in Hermosillo, Sonora, is early nut germination, or vivipary. A significant percentage of the crop germinates in some years, causing losses of 25% or more. Growers avoid some of these problems by harvesting pecans early when the foliage and the early shuck opening is still green.
In Hermosillo, warm weather during bloom, 95 degrees F (35°C), especially with the wind, causes fruit abortion. High temperatures during nut maturation also increase vivipary. Producers in Hermosillo have recently started spraying pecan trees with kaolin clay sprays to protect the canopy in hot and dry conditions; these sprays have helped diminish some of the adverse effects of heat stress. Some Hermosillo growers also install a “dual” irrigation system; they use drip irrigation for water savings and micro-sprinklers during bloom to lower ambient temperature and increase humidity.
Pecan harvest in Chihuahua is done with conventional equipment, much like in the United States. In Hermosillo, workers harvest pecan trees early and gather most of the nuts by hand. The reason growers use hand labor is to maintain their workforce. After pecans are harvested, field labor is used to harvest citrus, prune table grapes, work with vegetables, and conduct other agricultural practices.
Large nurseries in Montemorelos, near Monterrey, Mexico, supply “balled,” not bare-root trees. Nursery trees are dug with a long spade-like shovel. The heavy clay soil in the nurseries remains attached to the roots, and the soil ball is then wrapped with plastic. It would be difficult to dig the trees with equipment, as practiced in the U.S. because the soil adheres to the root system. One advantage of “balled” trees is not exposing roots to air where they dry. When done correctly, the mortality of “balled” nursery trees is less than 2%.
One new development in growing pecans in Mexico is an effort to analyze and monitor reserves in tree roots. In the fall, small portions of the roots are sent to labs to determine their reserves. With this data, growers are better informed on managing pruning, applying nutrients, and making decisions to avoid alternate bearing.
Growers in Mexico are fortunate to have available resources such as competent technicians, good labor, and finances. The larger growers— some of whom own up to 3,000 acres (1,200 hectares)— have modern farm equipment, irrigation systems, and processing plants.
Most of our technicians have college degrees, including some PhDs. For several years, I taught Horticulture at the University of Sonora in Hermosillo. Some of my students have become experts in pecans; for example, Dr. Humberto Nuñez (research specialist at the government experiment station, INIFAP, in Hermosillo and a graduate of the University of Arizona) and Edgardo Urias (one of the top pecan technicians in Mexico). Other specialists in Mexico include Victor Esparza (MS from New Mexico State University), Dr. Jose Alfredo Samaniego (INIFAP in Matamoros, Coahuila), and Dr. Hector Tarango, a researcher in Chihuahua who has published articles about growing pecans.
Additionally, Mexican pecan growers and industry members from around the world gather each year for annual pecan conferences in Chihuahua and Hermosillo. All are welcome. One can register and attend these conferences with the following links: “el Día de Nogalero” in Chihuahua and “Simposio Internacional de Nogal Pecanero” in Hermosillo.
As consumers worldwide become familiar with pecans, demand will hopefully increase to consume additional volume from newly planted acres primarily in the United States and Mexico. | <urn:uuid:c8f8aad1-79f8-46e8-b5da-374ee7e531b3> | CC-MAIN-2024-10 | https://www.pecansouthmagazine.com/magazine/article/pecans-in-mexico/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00158.warc.gz | en | 0.943411 | 1,269 | 3.390625 | 3 |
What you need to know about plant-based plasticsMar 19, 2021
In excess of eighteen trillion pounds of plastic have been delivered to date, and eighteen billion pounds of plastic streams into the sea consistently. It catches the marine creatures we value and the fish we put on our plates, it shows up in the table salt we use, and it’s even found in our own bodies.
As more examination on the effect of utilizing such a lot of plastic becomes exposed, buyers and producers are left scrambling for an option in contrast to the universal material, and bioplastics have arisen as a likely other option.
Initially, the name sounds promising, with a prefix that alludes to an Earth-accommodating item. Be that as it may, is bioplastic the panacea for our ecological burdens? A simple to-utilize single-utilize thing that feels like plastic short the blame?
The appropriate response?
It’s muddled, say researchers, producers, and natural specialists, who caution its potential benefits lay on many “uncertainties.”
What is bioplastic?
Bioplastic just alludes to plastic produced using plants or other natural material rather than petrol. It is additionally regularly called bio-based plastic.
Spotted and strangely striped zebras might be an admonition for animal groups’ future
It can either be made by extracting sugar from plants like corn and sugarcane to change over into polylactic acids (PLAs), or it tends to be produced using polyhydroxyalkanoates (PHAs) designed from microorganisms. PLA plastic is generally utilized in food bundling, while PHA is frequently utilized in clinical gadgets like stitches and cardiovascular patches.
Since PLA regularly comes from similar huge modern offices making items like ethanol, it’s the least expensive wellspring of bioplastic. It’s the most well-known sort and is likewise utilized in plastic containers, utensils, and materials.
Plants, oil, and the battle for food security
“The contention [for bio-based plastics] is the characteristic benefit of diminishing the carbon impression,” says substance engineer Ramani Narayan from Michigan State University, who explores bioplastic.
Around eight percent of the world’s oil is utilized to make plastic, and defenders of bioplastic regularly promote a decrease in this utilization as a significant advantage. This contention lies on the possibility that if a plastic thing discharges carbon whenever it’s disposed of, as it debases, bioplastics will add less carbon to the environment since they’re just restoring the carbon the plants kissed up while developing (rather than delivering carbon that had recently been caught underground as oil).
Related: Photos of creatures exploring a universe of plastic
Image of a whale shark swimming next to a plastic sack in the Gulf of Aden
Image of an incredible bowerbird at his grove beautified with glass and plastic toys
A whale shark swims adjacent to a plastic sack in the Gulf of Aden close to Yemen. In spite of the fact that whale sharks are the greatest fish in the ocean, they’re actually compromised by ingesting little pieces of plastic.
Photo by Thomas P. Peschak, Nat Geo Image Collection
Notwithstanding, that is not the finish of the story. One 2011 investigation from the University of Pittsburgh discovered other ecological issues related with developing plans for bioplastic. Among them: contamination from composts and land redirected from food creation.
Utilizing a substance like corn for plastic rather than food is at the focal point of a discussion over how assets ought to be apportioned in an undeniably food-scant world.
“The other incentive is that plant biomass is sustainable,” Narayan adds. “It’s developed everywhere in the world. Oil is packed in areas. Bioplastics uphold a provincial, agrarian economy.”
Bio-based plastics have benefits, yet just when taking a large group of components into thought, says ecological architect and National Geographic adventurer Jenna Jambeck, who is likewise at the University of Georgia.
“Where is it developed? What amount of land does it take up? How much water is required?” she gives as instances of significant inquiries.
Regardless of whether bio-based plastics are eventually preferable for the climate over oil-determined ones “is an unavoidable issue dependent on many ‘uncertainties,’” she says. All in all, there’s no reasonable answer as of now.
What happens when we manage it?
Contingent upon the sort of polymer used to make it, disposed of bioplastic should either be shipped off a landfill, reused like many (however not all) petroleum based plastics, or shipped off a modern manure site.
Mechanical treating the soil is important to warm the bioplastic to a sufficiently high temperature that permits organisms to separate it. Without that extraordinary warmth, bioplastics will not corrupt all alone in a significant time period, either in landfills or even your home fertilizer load. In the event that they end up in marine conditions, they’ll work also to petroleum based plastic, separating into miniature estimated pieces, going on for quite a long time, and introducing a peril to marine life.
“In the event that PLA [bioplastic] spills out, it likewise won’t biodegrade in the sea,” says Jambeck. “It’s truly not the same as those mechanical polymers. It tends to be treated as the soil in a modern office, yet in the event that the town doesn’t have one, at that point it’s the same.”
Things being what they are, would it be a good idea for you to utilize it?
Perhaps the biggest producer of bioplastic in the U.S. is Colorado’s Eco Products. They purchase crude corn-based PLA from NatureWorks, a synthetic producer in Blair, Nebraska.
Eco Products conceded inquiries concerning their items to the Plastics Industry Association (PLASTICS), who said that interest for bioplastics has expanded in the previous decade or somewhere in the vicinity.
Buyer interest in maintainable options in contrast to plastics and more productive innovation are driving that development, says PLASTICS Assistant Director of Regulatory and Technical Affairs Patrick Krieger.
Tending to analyze that bioplastics may redirect land from developing food, Krieger said organizations addressed by Plastics cooperate with bunches like the World Wildlife Fund’s Bioplastic Feedstock Alliance to guarantee crops are developed reasonably.
Yet, tree huggers actually say a genuine lack of mechanical fertilizer destinations mean bioplastics will do little to check the measure of plastic entering streams.
Hill Ives is the chief head of the Lonely Whale, an ecological non-benefit intended for business-situated arrangements, especially around plastics. In 2017, the gathering headed a “Strawless in Seattle” mission to campaign for a plastic straw boycott. As a component of that exertion, Lonely Whale explored whether they would promote bioplastic straws as another option. Something they learned: Among neighborhood organizations that had manure receptacles, not many revealed bioplastic things really making it into the proper spots, says Ives.
“We immediately understood that the possibility of compostable plastic sounds fascinating, particularly on the off chance that you take a gander at a zone like Seattle, yet there’s as yet that human component of you and me,” she says.
Hill adds that without sufficient fertilizing the soil foundation and buyer ability, bioplastic items can wind up an illustration of greenwashing, an expression authored by hippies to demonstrate when purchasers are misdirected about how economical an item genuinely is.
“The showcasing is getting us to have a positive outlook on the thing we’re purchasing,” she says, “yet the fact of the matter is the frameworks aren’t set up to oblige for those materials.”
The Biodegradable Products Institute (BPI) is a non-benefit framework to advocate for biodegradable items and waste foundation. They see bioplastics and modern fertilizing the soil as undiscovered potential.
“Treating the soil is intrinsically neighborhood,” says Rhodes Yepsen, the chief overseer of BPI. “It will not bode well to transport food waste to another country. It decays rapidly, and it’s fundamentally water. It’s substantial and muddled.”
He calls attention to that reusing is regularly wasteful, catching not exactly a fifth of recyclable material created on the planet.
“Half of the waste we produce is biodegradable waste like food and paper,” says Narayan, who likewise fills in as a logical counselor for BPI. He figures landfills ought to be disposed of by and large and supplanted by a more powerful and extensive waste assortment.
“Landfills are burial chambers. We are safeguarding trash. That has neither rhyme nor reason,” he says.
Ives focuses on freedoms to make supportable choices that don’t have any plastic.
Plastic produced using oil or plants like corn is among the least expensive material for things like bundling, yet more limited size makers are growing considerably more regular other options. In the U.K., one shop is developing organism into lightweight furnishings, and in the U.S., the Department of Agriculture is utilizing a milk film to make bundling that keeps food fresh.
“This is a field right now for innovative financial backers. There’s no deficiency of mind-blowing opportunity for choices that are marine degradable, that don’t exhaust the land and our food creation framework,” Ives says.
Rectification: A previous adaptation of this story inaccurately expressed items made by NatureWorks. This article has additionally been refreshed to explain that PLA is produced using plant sugar, not contained in the actual plant.
Be the first to post a message! | <urn:uuid:29be3ebe-c86f-48b2-bafb-db2704946647> | CC-MAIN-2024-10 | https://corespirit.com/articles/what-you-need-to-know-about-plant-based-plastics-rfn5yx | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00158.warc.gz | en | 0.936616 | 2,119 | 2.6875 | 3 |
Air Cooled Heat Exchangers
Air conditioning is the process of altering the properties of air primarily temperature and humidity to more favorable conditions. More generally, air conditioning can refer to any form of technological cooling, heating, ventilation, or disinfection that modifies the condition of air. Air Cooled Heat Exchangers is typically done using a simple refrigeration cycle, but sometimes evaporation is used, commonly for comfort cooling in buildings and motor vehicles. Air Cooled Heat Exchangers often referred to as air con, AC or A/C, and not to be confused with the abbreviation for alternating current.
Air Cooled Heat Exchangers is a major or home appliance, system, and mechanism designed to change the air temperature and humidity within an area used for cooling and sometimes heating depending on the air properties at a given time. In construction, a complete system of heating, ventilation and air conditioning is referred to as "HVAC". Air Cooled Heat Exchangers is carried away by the water and glycol coolant mixture. | <urn:uuid:adc13f24-b932-4643-b0c6-89ff5e5532a8> | CC-MAIN-2024-10 | https://finnedtubeheatexchanger.com/air_cooled_heat_exchanger.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00158.warc.gz | en | 0.93583 | 213 | 3.28125 | 3 |
The instinct of self-preservation runs strong and deep. When a person’s brain identifies a risk, consciously or not, it distracts from their ability to do their best work. Thus, at its essence, a positive culture is one where people feel safe.
It may sound counterintuitive, but a safe environment promotes ambitious work. Consider, would you be more likely to try something risky (like walking a tightrope) with or without a safety net?
A positive culture provides the mental and practical support necessary to push oneself.
As managers we have an obligation to cultivate a culture that will help the business achieve its goals.
Our company may already have a set of noble values. They can probably be found memorialized on office walls and corporate handbooks. But culture can’t be printed into existence. Culture lives and dies by how people behave.
Therefore, our obligation is to behave in a way that promotes the growth of a culture where people feel safe to do their best work.
If I had to distill the task of creating a safe environment down to one word, that word would be Trust.
What follows are some key areas where we can promote trust. For maximum effect, we need to consistently practice these ourselves and also develop them in our team.
You can approach these as mental tricks, however, that is not recommended. Many people are quite alert to insincerity and, once detected, will raise a mental alarm which renders the ruse a waste.
Culture hinges on honesty. Trust cannot exist in an environment of dishonesty. We set the expectation of telling the truth by setting an example.
I sometimes see people confuse honesty for full transparency. This is a mistake. There are many legitimate scenarios where information (personal, legal, confidential) needs to be kept private. If an explanation is requested on such a topic, it is usually best to keep it brief. As an example, I might honestly say: I don’t have any information to share on that.
Second only to honesty is respect. When people don’t feel respected, they don’t feel safe. They keep their guard up.
Respect is communicated by what we say and how we say it. It’s on display in our body language and facial expressions. It is demonstrated by active listening and genuinely considering the ideas and viewpoints of others. It means we don’t talk behind others backs.
Respect helps you to work well with people of different backgrounds and views.
I once worked with a COO who included in company job listings this line:
“If you are smarter than everyone else, the absolute smartest person you know – as in you win every argument because you are so smart and no problem cannot be solved by a quick application of your smarts – please do not apply. We are human and will disappoint you.”
Assuming we know best blinds us. Humility allows us to see the value of input from others, regardless of comparative title or other measure of status. It keeps us flexible to consider alternatives, realizing there is often more than one workable approach. It assists us in remaining teachable and to see the value in helping others succeed. Humility fosters respect.
Empathy expands our view by allowing us to make the leap between how we see things and how others do. It reminds us that a person’s behavior is often influenced by factors that are unknown to us. In misunderstandings it gives the benefit of the doubt. Empathy smoothes the inevitable friction that arises in interpersonal relationships.
You’ve built a culture of honesty, respect, humility, and empathy. This creates an environment where openness can exist. Creativity flourishes when people feel free to express their ideas, even if they seem absurd or impractical. Growth happens more quickly when people feel safe to make and share their mistakes. Operational efficiency increases when information is shared, rather than being defensively withheld. The best form of accountability arises, motivated by a sense of ownership not fear of failure.
Inevitably things won’t go according to plan and a common reaction is to identify a root cause. When that root cause is a human or human action the reaction all too often is one of blame or shame. Instead embrace these events as learning opportunities and celebrate the growth that results from them. Safety is the sum of trust, honesty, openness, and clarity and how we pick ourselves back up and bring others along. The obligation of the business is to identify, build, and sustain; celebrating these rises and the dips are instrumental to building a healthy, safe and sustaining culture.
The above cultural values can create a powerful virtuous circle. However, it’s a waste if it’s not thoughtfully focused. Driving a fast car in the wrong direction might be more fun than a slow one, but the outcome isn’t better. We need to make sure we’re going in the right direction.
A culture that prioritizes clarity of purpose means that staff will always know: What are we trying to accomplish? What is most important? How does their work fit into overall goals? | <urn:uuid:09b7d102-e77a-45bc-96b7-b10694587e1f> | CC-MAIN-2024-10 | https://timogin.com/manual/culture/values/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00158.warc.gz | en | 0.953717 | 1,060 | 2.625 | 3 |
This super simple star constellation science activity for kids transforms their bedroom in the dark to a starry sky with a flashlight and our free printable constellation cards. Kids of all ages and adults will love the ability to turn constellations on and off while learning the details of some of the most popular constellations.
Flashlight Constellations for kids
We love going outside late at night and observing the stars in the sky. This Flashlight Solar System experiment is a fun way to do that by bringing your favorite constellations inside!
Related: More constellations for kids craft and learning ideas
This post contains affiliate links.
Flashlight Constellations to Study the Stars
Instructions to Make Constellations with a Flashlight
Cut out the constellation cards and use the needle to poke holes where the stars appear with a thick needle.
Tape each constellation card onto the end of a flashlight.
Turn on flashlight. The constellations will shine through when you turn on the light!
Shine your flashlight onto the wall or ceiling to reveal the constellations.
The Galaxy is Full of Constellations!
Did you know? There are officially 88 constellations, according to the International Astronomical Union.
How cool is that?!
The 101 Coolest Science Experiments for Kids
You can find this activity, plus 100 more simple science experiments, in our new book, 101 Simple Science Experiments for Kids. It’s the coolest science book for kids — the cover even glows in the dark!
More Activities for Kids that Are Out of this World
What was your favorite flashlight constellation? | <urn:uuid:e95b6b29-8673-4fc9-9186-b5c385811e44> | CC-MAIN-2024-10 | https://smartparentingskills.com/activities-crafts/make-constellations-on-your-wall-with-a-flashlight-free-printable-star-cards/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00158.warc.gz | en | 0.842157 | 335 | 3.21875 | 3 |
Cougar is the Second largest Cat after Jaguar. Cougar is the native cat of America. 12th June is celebrated as National Cougar Day to conserve this specie from extinction. This day is celebrated to raise awareness regarding the decrement in the number of cougars. And emphasize the importance of the conservation of this species. | <urn:uuid:251080cf-2000-47ee-91e3-b7db0164bc4f> | CC-MAIN-2024-10 | https://wbmfoundation.org/national-cougar-day-12th-june-2022/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00158.warc.gz | en | 0.947212 | 67 | 2.5625 | 3 |
On the eve of the Summit of the Americas Climate Change Conference being held in Toronto from July 7th to July 9th, the Association for Canadian Educational Resources (ACER) released its data on the amount of carbon sequestered by its Humber Arboretum Go-Global Plot, one of its 19 monitoring plots across Ontario. A summary of the data is available on the ACER website.
ACER has been using trained volunteers—citizen scientists—to monitor one-hectare forest plots since the 1992 Rio De Janeiro Biodiversity Convention. It uses the protocols designed by the Smithsonian Institution as a result of the same biodiversity convention.
“The Humber plot contains 18 species of trees with an average DBH (Diameter at Breast Height) of 18 centimetres,” says award-winning science teacher and ACER’s Founding President, Alice Casselman, “609 trees were measured.”
“As of 2013, these trees in this one-hectare plot had stored 100 tons of carbon. One hectare is one hundred metres by one hundred metres.”
Trees absorb carbon dioxide to make wood, reducing the amount of carbon in the atmosphere and thus reducing the most abundant greenhouse gas.
“Having citizen scientists measuring what’s happening in forest areas close to where they live provides us with the essential ground-truth data we need to fully understand where we, as a species, actually stand in relation to climate change and how it is affecting our own communities,” she added.
ACER citizen scientists also measure total height and compass bearing, crown area, crown depth, health status, location by triangulation, and identification. The resulting data is available on the ACER website for researchers, students, community groups or anyone else interested in determining changes in their neighbourhood or town.
The Association for Canadian Educational Resources is a 27-year-old charitable organization that has been training citizen scientists to monitor climate change for 18 years. For more information go to the ACER website.
The Summit of the Americas Climate Change Conference is hosted by the Government of Ontario and is bringing together selected indigenous leaders, environment groups and industry heads to work towards reduction of greenhouse gases. Participation is by invitation only. For more information go to the Conference website.
For more information, call Alice Casselman, (905) 601-7685 | <urn:uuid:be784959-21e5-4f77-a290-4edff49b5a4e> | CC-MAIN-2024-10 | https://www.acer-acre.ca/news/news-news/citizen-scientists-provide-critical-data | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00158.warc.gz | en | 0.937416 | 490 | 3.03125 | 3 |
Insurance Works On The Principle Of Risk Aversion
Insurance Works On The Principle Of Risk Aversion. Insurance purchases) are characterized by a high level of uncertainty along a number This is because the bearing of risk by the more risk averse would result in a greater reduction in their expected utility than will the bearing of risk by the less risk averse or by the risk neutral.
Generally speaking, risk surrounds all action and inaction and can't be completely avoided. The analysis shows that the effect depends in part on the shape of the loss function and that of the probability function. −∞ holding constant the expectation of
In This Manner, The Policyholder Transfers The Economic Risk To The Insurance Company.
Insurance transactions occur because policy holders prefer the certainty of suffering a small loss—the amount of an insurance premium—to the risk of suffering a larger loss.1 they are therefore willing to pay premiums that exceed the expected value of Based on an exhaustive review of the subject of risk aversion, this paper contributes to filling the gap that exists in the literature on the risk aversion. Loss aversion risk aversion defined risk aversion is a general preference for safety and certainty over uncertainty, and the potential for loss or pain.
Generally Speaking, Risk Surrounds All Action And Inaction And Can't Be Completely Avoided.
This is because the bearing of risk by the more risk averse would result in a greater reduction in their expected utility than will the bearing of risk by the less risk averse or by the risk neutral. Insurance purchases) are characterized by a high level of uncertainty along a number The greater the standard deviation, the greater the risk.
Throughout The Financial Literature, There Is A Great Deal Of Debate About The Nature Of Investors’ Risk Preferences.
Insurance works on the principle of. Individuals and firms fac e a number of perils that However, the principal™s preference over the agent™s degree of risk aversion is
It Is Nearly Impossible To Model Many Natural Human Tendencies Such As “Playing A Hunch” Or “Being Superstitious.” However, We
Risk is endemic to life and bus iness. The consumer would pay up to $1 to avoid taking the gamble. Payment for the unknown loss.
Risk, As Discussed In Section I, Is The Variation In Potential Economic Outcomes.
Risk is a probability of a loss. Risk aversion this chapter looks at a basic concept behind modeling individual preferences in the face of risk. Thus, we see that individuals’ risk aversion is a key component in insurance pricing. | <urn:uuid:23f7efd8-0bca-40fa-9fd1-b5f8891c78f0> | CC-MAIN-2024-10 | https://www.ipbcustomize.com/2021/10/insurance-works-on-principle-of-risk.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00158.warc.gz | en | 0.918568 | 531 | 2.75 | 3 |
The NOBV conducts research at various locations,
where a range of measures and situations are examined.
Greenhouse gas fluxes are measured at all locations.
Soil chemistry and soil physics are also researched,
and soil subsidence is measured as well.
MECHANISTIC UNDERSTANDING AND PARAMETERS
In a programme that focuses on greenhouse gases, greenhouse gases are of course actively measured. However, measuring these greenhouse gas emissions in different places is not the goal; it is the means. We want to map emissions for all Dutch peatland areas and we want to predict the effect that measures will have. Greenhouse gas emissions from Dutch peat soils are determined by a wide range of factors. Measuring different parameters for all these factors and comparing them to the emissions measured will enable us to obtain a much better understanding of the processes in the soil. That is known as mechanistic understanding, and that is what we want to achieve. It will allow us to take a much more modelled approach to emissions and the effectiveness of measures for the whole of the Netherlands, and to test this against actual measurements. The most important parameters measured are given below. First are the greenhouse gases and the subsidence itself as a result of the processes in the soil, and following that, the factors influencing the processes in the soil.
Greenhouse gas fluxes are measured in the same way at all NOBV sites. This is also true of the environmental variables that influence greenhouse gas emissions, and variables that are needed to scale up the fluxes. In order to generate longer measuring series, measuring is done with automatic chambers. To gain insight into greenhouse gas emissions on a slightly larger scale, eddy covariance masts are used at several locations (Zegveld, Aldeboarn and Lange Weide).
Nitrous oxide (N2O) is created by biological processes (nitrification and denitrification) under wet conditions. In Zegveld, nitrous oxide fluxes are measured on four plots with different drainage and nitrogen fertilisation. These measurements are conducted with automatic chambers.
When there is a high groundwater level and when the soil is flooded, there is an increased risk of methane (CH4) emissions. This process of anaerobic peat decomposition occurs in the part of the soil that is underwater. There, other bacteria break the peat down into methane in oxygen-free (‘anaerobic’) conditions.
View the animation on peat degredation and greenhouse gas emissions. | <urn:uuid:c325a976-0d6f-4450-ba8d-be7d77aa83fb> | CC-MAIN-2024-10 | https://www.nobveenweiden.nl/en/what-we-measure/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00158.warc.gz | en | 0.942516 | 520 | 3.484375 | 3 |
- Unit price
- / per
We are happy to finally be able to have these seeds available again for our customers!
Asclepias purpurascens, the purple milkweed, is native to the Eastern, Southern and Midwestern United States similar to the range of the common milkweed (Asclepias syriaca). The plant gets its name from the flowers that first develop a pink color but then turn darker purple as they mature. Unlike common milkweed, purple milkweed prefers some shade and is considered a plant of partial shade. The species rarely produces seed pods which are smooth instead of the rough warty ones produced by common milkweed.
It is listed endangered in Massachusetts and Wisconsin, as historical to Rhode Island, and as a special concern species in Connecticut and Tennessee.
Like other members of the milkweeds, several insects live off the plant, including the monarch butterfly (Danaus plexippus), the milkweed beetle (Tetraopes tetraophtalmus), large milkweed bug (Oncopeltus fasciatus), small milkweed bug (Lygaeus kalmii) and milkweed leaf beetle (Labidomera clivicollis). Other insects and pollinators feed off the flower's nectar.
This species is sometimes cultivated in gardens designed to attract butterflies, but is less common than the light purple swamp milkweed (Asclepias incarnata) or the orange butterfly weed (Asclepias tuberosa). The nectar of the plant attracts many other species of butterflies and insects as well.
Rare and limited supply.
Type: Hardy perennial
Height: 60-90 cm (24-36 in)
Location: Part sun
Hardiness zones: 3-8
Seeds per pack: 5
Note: Ornamental use only. These seeds and/or plants are poisonous.
Germination: Start these seeds right away to preserve viability, no matter the time of year. Sow the seeds just under the surface of a sterile seed-start mix, and water in. Then cover them with plastic and place in a fridge for 5-6 weeks. Be sure they stay moist. After the cold stratification period they are then brought back to room temperature for them to germinate. Germination is generally within 60 days after the warming period, though they could take a few months. If possible, the best location for sowing in March, April and May, is in cold frame or a cold greenhouse where they will receive the cold period and fluctuating temperatures naturally.
You may also like
You may also like
CUSTOMERS ARE ALSO BUYING THESE
When you sign up, you are agreeing to receive promotional emails and other marketing communications from us. In the future, you can always unsubscribe. | <urn:uuid:95e935ca-0f8c-48e7-aecd-911e9aacfbf8> | CC-MAIN-2024-10 | https://ferriseeds.com/collections/wildflowers-native/products/purple-milkweed-asclepias-purpurascens-hardy-perennial-butterflies-very-rare-seeds | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474948.91/warc/CC-MAIN-20240301030138-20240301060138-00158.warc.gz | en | 0.919726 | 578 | 3.4375 | 3 |
Manhattan Uveitis Treatment
Uveitis is an inflammation of the eye. Uveitis affects the middle layer of the eye wall (uvea). The warning signs for uveitis often come on suddenly and get worse quickly. The symptoms of uveitis include redness, pain and blurred vision. This condition can affect both eyes, and primarily affect people aged 20 to 50, but can affect children.
Possible causes of uveitis are infection, injury, or an autoimmune or inflammatory disease. Sometimes, the cause is not apparent. Uveitis can be very serious, leading to permanent vision loss. Early diagnosis is key to the best treatment and best outcome.
If you are experiencing any of the symptoms listed below, you should contact your eye doctor immediately:
- Eye redness
- Pain in the eye
- Light sensitivity
- Blurry vision
- Dark, floating spots in vision (floaters)
- Decreased vision
The uvea is the middle layer of the eye wall. The uvea consists of the iris, the ciliary body, and the choroid. The uvea provides blood flow to the deep layers of the retina. The type of uveitis you have depends on which part of the eye is inflamed. Iritis is the most common form, inflammation of the front of the eye. Cyclitis affects the ciliary body, and choroiditis affects the back of the eye. Diffuse uveitis occurs when all layers of the uvea re inflamed.
If uveitis is left untreated, it can cause complications including:
- Optic nerve damage
- Retinal detachment
- Permanent vision loss.
If you are experiencing symptoms of uveitis, give Angioletti Retina a call for an examination today. Remember, early diagnosis and treatment of uveitis are very important to prevent vision loss. | <urn:uuid:ecca453d-a574-46da-8ef2-a5e4e96b2526> | CC-MAIN-2024-10 | https://www.angiolettiretinanyc.com/retina-services-new-york/uveitis/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474948.91/warc/CC-MAIN-20240301030138-20240301060138-00158.warc.gz | en | 0.874483 | 393 | 3.015625 | 3 |
Average rating by users:
Author of Resource: Sis. Faiza
Institute: Safar Academy
Resource Type: Lesson Related Activity
Subject: Islamic Studies – Textbook 6 – Week 16 – Salah: Our link with Allah
When should I use the activity in my Islamic Studies Class? Starter Activity in class
Time Resource will take: 5 minutes
What equipment or Preparation do I need for the activity?
-Print attached document and cut out
-Board, board pen.
Describe the Resource:
Stick all speech bubble printouts on the board mixed up with the headings ‘Allah’ and ‘Servant’ at the top left and right.
As a class, students must decide on the translation links to responses. Using a board pen they can come up and draw an arrow linking them together. | <urn:uuid:c4b0aea0-f7da-42a3-b3e2-0991e4921f8e> | CC-MAIN-2024-10 | https://resources.safarpublications.org/2016/12/20/surah-faatihah-translation-response-activity/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00158.warc.gz | en | 0.837025 | 176 | 3.046875 | 3 |
How to set up a Balance Sheet and General Ledger spreadsheet in Excel? How do the balance sheet and general ledger work? We have a sample template available that can help you quickly and easily create financial statements. Our templates are easy to use and can be customized to fit your needs. Download this sample template now and get started!
A balance sheet and a general ledger are two fundamental accounting tools used by businesses to track and manage their financial information. They serve different purposes within the accounting and financial reporting process.
The balance sheet is divided into two main sections:
- A balance sheet, also known as a "statement of financial position," is one of the three primary financial statements used in accounting (the other two being the income statement and the cash flow statement). The balance sheet provides a snapshot of a company's financial position at a specific point in time, usually at the end of an accounting period, such as a month, quarter, or fiscal year.
- Assets: This section lists all the resources owned by the company, such as cash, accounts receivable, inventory, equipment, and investments. Assets are categorized into current assets (those expected to be converted into cash within one year) and non-current assets (those expected to provide value over a longer period).
- Liabilities and Equity: This section lists the company's obligations and sources of financing. Liabilities include accounts payable, loans, and other debts. Equity represents the ownership interest in the company, including common and preferred stock and retained earnings. The equation that defines a balance sheet is: Assets = Liabilities + Equity. This equation must always balance, hence the name "balance sheet."
The balance sheet provides insights into a company's financial health by showing how its assets are financed (through liabilities and equity). It helps stakeholders understand the company's liquidity, solvency, and net worth.
Key elements of the general ledger include:
- A general ledger is a core component of an accounting system and serves as a detailed, chronological record of all financial transactions of a business. It's essentially a "book" or electronic record where all financial activities are recorded in the form of journal entries. Each journal entry includes information about the date, accounts affected, transaction amount, and a description of the transaction.
- The general ledger organizes financial transactions into various accounts, and it follows a double-entry accounting system. In double-entry accounting, every transaction has an equal and opposite effect on at least two accounts, ensuring that the accounting equation (Assets = Liabilities + Equity) remains in balance.
- Chart of Accounts: A list of all the accounts used to record financial transactions, each assigned a unique account number and name.
- Journal Entries: Records of individual financial transactions that detail which accounts are debited (increased) and credited (decreased).
- Account Balances: The running balances of each account, which are updated after each transaction.
- Trial Balance: A summary of all account balances used to check that debits and credits are in balance.
The general ledger is crucial for maintaining accurate financial records, preparing financial statements like the balance sheet and income statement, and providing detailed financial data for internal and external reporting and analysis.
In summary, a balance sheet is a financial statement that provides a snapshot of a company's financial position at a specific point in time, while a general ledger is a detailed record of all financial transactions used to maintain and track a company's financial activities over time.
Download this Balance Sheet and General Ledger template now and enhance your administration and business! | <urn:uuid:30f4fa5e-443a-447e-8bbe-21e68e54100b> | CC-MAIN-2024-10 | https://www.allbusinesstemplates.com/cn/template/BTNL3/balance-sheet-and-general-ledger/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00158.warc.gz | en | 0.932214 | 727 | 3.71875 | 4 |
Happy Easter, everyone!
For the Christian community, Lent is the most sacred time of the year. It culminates on Easter Sunday. The death and resurrection of Christ is, after all, what sets Christianity apart from other religious belief systems in the world. Today, many have come to associate Easter with the Easter bunny and colorfully decorated eggs.
For people who have grown accustomed to bunnies and Easter eggs hunts on Easter Sunday, it would be fun to know that some people in other countries celebrate Easter Sunday differently. In most countries though, the Easter egg is a major part of the celebration. The egg is a symbol of life and rebirth. As it is, you look at an egg as something lifeless, however, inside it is a living thing, waiting for the right time to hatch and be born. Most communities take its symbolism and use it to represent Christ rising from the dead.
Easter also coincides with spring break for many of those going to school, which either means spending time with loved ones, or having fun with friends in destinations unknown. However, Lent and Easter are a celebration of the death and resurrection of Christ in the Christian community, giving the holiday a more meaningful aspect.
Here’s how Easter is celebrated all over the world.
At the Vatican, the Pope celebrates Easter with a special mass attended by thousands of devotees all over the world who gather at St. Peter’s Square. At the start of the service, the basilica lights aren’t fully turned on to signify the tomb of Christ before his actual resurrection. Later on, the Pope lights candles, while the songs during the mass are sung in Latin. People also wait for the Pope to give his blessing, the “Urbi et Orbi,” which translates to “To the City and to the World” from the balcony of the church.
Since many citizens of Hispanic countries are Catholics, Lent is celebrated with much fervor. Easter is called Cuaresma. Foot washing is done as early as Holy Thursday, flowed by a blessing of the Bread, called Pan Bendito, which is served after a mass. Another practice is called the Via Crucis, which translates to “Way of the Cross”. A procession of sorts is done, called Siete Palabras meditations, wherein devotees pray on the seven last words of Christ. There are also those who practice Pesame, wherein prayers are said to the Virgin Mary as Our Lady of Sorrows.
White House, USA
For over a hundred years since 1878, the White House has been hosting the Easter Egg Roll, one of the many activities during the annual whole-day family event on the South Lawn of the White House. It is hosted by the First Family.
Louisiana in the United States
People hold an egg knocking competition, which dates back to the 1950s. On the steps of the courthouse competitors pair up and knock the tips of their eggs by tapping it on the other egg. The person whose egg cracks forfeits the game. It continues until only one egg remains intact.
The Norwegians enjoy the Lenten holiday in a different manner. Since Maundy Thursday to Easter Monday is a public holiday, many go on vacations, taking with them detective novels and crime thrillers, called Paaskekrim, which translates to Easter crime. The practice of reading crime thrillers during Lent is believed to be a reflection of the death of Christ.
Visitors to Sweden may think that the Swedes are celebrating Halloween instead of Easter since the children dress up as witches and hags and go door to door asking for treats. The tradition stems from the belief that witches used to fly over church bell towers on the evening of Easter using their broomsticks. The young children are given either a coin or some candy as they go from neighbor to neighbor.
Finland and Denmark
Young children go around the neighborhood begging for eggs and candies. Their faces are sooty and scarves are tied around their heads. They carry with them coffeepots, pussy willow twigs and broomsticks, which they exchange for the Easter goodies. In other areas of Finland bonfires are burned on Easter Sunday to shoo away witches on broomsticks. Rye grass is planted in a pot in Finland to symbolize new life and the coming of spring.
France, Belgium and the Netherlands
Church bells will be ringing on Easter Sunday after being silent days before Easter.
It has been a tradition to cook a giant omelet on Easter Monday. The town square swarms with people on this day, to eat part of the giant omelet that normally uses up to 4,500 eggs. It could feed about 1,000 people. It’s a tradition that started during the time of Napoleon Bonaparte.
Germans celebrate Easter Sunday by making Easter egg trees, where several decorated eggs are hanged. Water wells or fountains are also decorated with eggs. The tradition is called Osterbrunnen that gives honor to water, which is essential for life. The most famous is the one done in Fränkische Schweiz.
A traditional addition to the Easter food served by Polish Catholics is a butter lamb or Baranek wielkanocny. It is literally butter formed through a mold or by hand in the shape of a lamb.
Northern Ireland, North of England and Scotland
People celebrate the day by rolling decorated Easter eggs down the hills.
Young boys gather firewood around the neighborhood, to compete on which group could build the biggest bonfire on a church or school ground. A small doll that represents Judas Iscariot is burned in the fire.
Eastern and Central parts of Europe
Ethnic groups traditionally decorate the eggs they use for Easter. The decorations are as intricate, colorful and detailed as any work of art.
Slovakia and the Czech Republic
Men spank women on Easter Monday, not to hurt them but to keep them beautiful and healthy the whole year. They use a handmade whip made up of eight, twelve or twenty-four pieces of willow rods with colorful ribbons tied on each end. The whip is called korbáč in Slovak and pomlázka in Czech. A spanked woman usually gives the man a colored egg as a thank you gift. They get their turn in the afternoon or the next day by pouring cold water on the men.
Croatia and Slovenia
Croats and Slovenians bring a basket of food to church. It includes colored eggs, ham, bread, horseradish and potica (nut cake). They want to have the food blessed before they eat it.
(Such as Northern Serbia-Vojvodina, Southern Slovakia, Transylvania, Kárpátalja and of course Hungary)
Easter Monday, called Locsoló Hétfő, which translates to Watering Monday is celebrated by people sprinkling water, perfumed water or perfume on each other. An Easter egg is exchanged afterwards.
Bermuda (a British Overseas Territory)
The tradition is to fly a kite on Easter Sunday, symbolizing the ascent of Jesus Christ to heaven. They also eat Easter eggs, fish cakes and hot cross buns.
Instead of Easter eggs, Jamaicans exchange and eat the Jamaica Easter Buns, a loaf bread with spices and raisins. These are sliced and eaten with cheese. | <urn:uuid:cc24ace6-a0bb-4952-8260-632cb50eebf0> | CC-MAIN-2024-10 | https://www.daytranslations.com/blog/easter-traditions-around-the-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00158.warc.gz | en | 0.958447 | 1,537 | 2.765625 | 3 |
Lotteries are a form of gambling that involves the drawing of numbers for a prize. Some governments outlaw lotteries, while others endorse them to the extent of organizing a national or state lottery.
The history of lotteries dates back to ancient Rome and Renaissance Europe. They were first used to raise money for churches and other government projects. They are now a controversial and profitable source of revenue for many states in the United States and abroad.
A lottery is a game where players select a group of numbers from a large set and are awarded prizes based on how many match a second set chosen by a random drawing. Some games offer a fixed prize structure, while other games have a flexible structure with prizes that depend on how much money is sold.
In the majority of the world’s countries, there are various kinds of lottery games, including instant-gratification scratch-off cards, number games like Powerball, and other types of games that pay out small prizes or larger ones for matching a certain number of numbers. A lot of people enjoy playing them, but there are some disadvantages.
It’s a good idea to know what your chances are of winning in each game you play. You can use a technique called factorial to find the likelihood of a certain outcome.
If you have a good idea of the odds, you can increase your chances of winning by buying fewer tickets than usual and waiting for them to expire. You can also buy cheaper tickets and spend more time studying them, looking for patterns that may help you win.
The odds of winning a lotto jackpot are much lower than you might think. The odds of winning a jackpot in the New York Lotto, for instance, are one in forty-five million. In the same way, the odds of winning the Mega Millions jackpot are one in thirty-nine million.
Despite the odds of winning the lottery, a lottery is still a popular way for Americans to get their fill of cash. According to NASPL, there were nearly 186,000 retailers selling lottery tickets across the country in 2003.
Some retailers sell only lottery tickets, while others sell other products as well. Retailers include convenience stores, grocery and drugstores, restaurants and bars, bowling alleys, and newsstands.
While many people enjoy the thrill of playing a lottery, it’s important to understand that if you’re planning on winning a large sum of money, you should consider using it for an emergency fund instead. This is because the money you will receive from your lottery winnings will be subject to federal taxes and sometimes state and local tax as well.
In addition, if you’re lucky enough to win a lottery jackpot, you could end up bankrupt and be forced into debt for years before you are able to repay the money you won. The cost of a lottery ticket can be quite expensive, so it’s best to avoid it if you don’t need the money. | <urn:uuid:d34fa0bc-c9d6-45e0-b8f6-8a7e83d02203> | CC-MAIN-2024-10 | http://situspokernobot.com/what-are-the-odds-of-winning-a-lottery/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00258.warc.gz | en | 0.964858 | 610 | 2.75 | 3 |
Google, the technology giants are experimenting and researching so that a new fleet of fast drones can be designed to make delivery of packages easier. The drones will give the on the land traffic a wide berth and fly to reach the destinations in a much quicker time. The initiative is in direct competition to the online shopping giant Amazon.com
The latter has started using a self-flying device to deliver products bought by customers on its online shopping portal. On top of that they are challenging Google in its old citadel i.e., mobile computing, digital advertising and online video. Therefore the start of “Project Wing.” from Google. Of course the experiment is at a very initial stage and several more years are needed before effective drones can be started.
Till now the most successful initiative is when a drone flew one kilometer and delivered water, dog treats, candy bars and first aid boxes to two farmers. Only perfecting the technology is not enough, permission has to be taken from the governments of various countries fly the drones. In fact, last month only, Amazon had to take permission from Federal Aviation Administration to test their drones. Currently, only makers of model aircraft and hobbyists are allowed to fly drones.
This is the latest innovation from Google after self-driving cars, high-tech contact lens that monitors glucose levels in diabetics, Internet-beaming balloons called Project Loon, Internet-connected eyewear called Google Glass. “Project Wing” is being undertaken under the watchful eyes of Nick Roy, an aeronautics professor from Massachusetts Institute of Technology.
In a pamphlet, Google said, “Self-flying vehicles could open up entirely new approaches to moving goods, including options that are cheaper, faster, less wasteful and more environmentally sensitive than what’s possible today.” | <urn:uuid:3d06611a-7430-492d-9a78-0f65875f6fb5> | CC-MAIN-2024-10 | https://fortuneherald.com/technology/google-and-amazon-in-a-race-to-get-the-best-aerial-devices/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00258.warc.gz | en | 0.941508 | 371 | 2.59375 | 3 |
It's no secret that Americans love cats; there are more than 74 million felines kept as pets in the United States, with another 60 to 150 million million feral or free-roaming cats trying to make it on their own [source: Weise]. While many pet cats are spayed or neutered and up-to-date on life-saving vaccinations, feral cats are unlikely to receive this type of preventative care, allowing them to breed without restriction and to spread scary diseases, including rabies [source: Hildreth et al].
Rabies, a viral infection that's 100 percent fatal, is spread to humans via bites or scratches from infected animals. Cats are currently the primary domestic animal associated with rabies exposure in humans. If bitten by a rapid animal, humans must undergo a series of shots in order to produce the antibodies required for survival. Around 16 percent of people who require these shots get them after being exposed to the virus by a cat [source: Weise].
While vaccinating cats against this disease can help prevent it from spreading, the nature of the vaccination makes it notoriously difficult to vaccinate feral cats. For this vaccine to work properly, cats need one shot as young kittens, another when they reach their first birthday, then a booster every three years after that. The odds of catching a feral cat that many times throughout its life is very unlikely, leaving the animal vulnerable to the virus [source: Weise].
Perhaps even more frightening is the threat of toxoplasma gondii, a parasite for which cats are the only known host. In some studies, as many as 80 percent of feral cats test positive for this parasite [source: Hildreth et al]..
Cats shed this toxoplasma gondii in their feces, where it can easily spread to other animals by contaminating water and soil. Animals, including racoons, squirrels, mice and rabbits who pick up this parasite could experience neurological problems and even death [source: ScienceDaily].Toxoplasma gondii infections in humans can even occur years after the parasite has been shed by the cat. That means feral cats who hang around playgrounds, sandboxes or your garden pose a significant health risk even long after they've moved on. You can pick up this parasite if you ingest tainted water or soil, which could occur when kids are playing in the backyard or if you fail to wash produce you've picked in the garden [source: Gerhold and Jessup].
So what does exposure to toxoplasma gondii do to humans? It can have devastating effects in pregnant women, resulting in anything from stillbirth to long-term neurological problems for the fetus. It's also linked to difficulty in school when ingested by children, as well as schizophrenia and other mental health problems in people of all ages [source: Haensch].
Though less common, feral cats can also transmit diseases like typhus, cat scratch fever and even the plague [source: Gerhold and Jessup]. Clearly, none of these things are on anyone's wish list. | <urn:uuid:7650c881-34ae-4610-887d-1a2a24077844> | CC-MAIN-2024-10 | https://animals.howstuffworks.com/pets/do-feral-cats-spread-disease.htm | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00258.warc.gz | en | 0.951274 | 624 | 3.484375 | 3 |
Greyhounds are particularly susceptible to extreme temperatures, as they only carry a small portion of fat on their bodies.
This may be more obvious in the cold weather, but not so obvious in the heat. In the colder weather pop a coat on them to keep them warm. They could develop pneumonia should they become too cold. Coats should be big enough to cover from the neck to over the tail.
Like all dogs, greyhounds get very hot on warm days. They will pant, possibly be grumpy (like us really) and try to find cool places to lie. In hot weather, leave your greyhound in peace as much as you can. Remind children to cuddle a lot less, if at all. Help to keep them cool with damp flannels on their bodies and protect them from the sun with cream or shade if they decide to lie outside. This might sound crazy but if there is a breeze in the garden it might seem to be the coolest place, however dogs don’t know about UV rays and can get badly burnt.
Please remember to take care to only walk your greyhound before it heats up in the morning or at night when it has cooled down. If they are reluctant to go for a walk, then just give them the opportunity to toilet in the garden and let them lie.
It is best to feed earlier/later, if they don’t eat much – don’t worry unless there are other symptoms of illness.
Never leave a dog in a hot room or car – they can die within ten minutes.
Symptoms of heat stroke are distress, severe panting and collapse. If you think your greyhound is showing signs of this, cool your dog as fast as possible with cold water or ice applied to the head and back. If there isn’t an immediate improvement get veterinary help immediately. | <urn:uuid:bbbc48d2-217f-4f6f-9720-b8336232b141> | CC-MAIN-2024-10 | https://www.greyhoundtrustwolverhampton.co.uk/content/caring-tips/extremesoftemperatures | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00258.warc.gz | en | 0.964554 | 381 | 2.609375 | 3 |
In the modern age people most likely to spend time on their laptop more. So,its very important to take care of your loving gadget.Here,we discuss few tips to ensure a good long battery life of your gadget.
This guide is mainly focused on lithium-ion batteries,used in modern laptops.
1) Don’t Always put Your Laptop in Charging:
First full charge your laptop. After that,used to keep it between 40 to 80 percentage. It helps to prolong your battery life four times more than normal. To do this you have to keep your eye on your battery percentage all time. If you leave your laptop at home, then remember to shut it down and keep it unplugged on a desk,not a couch. Most importantly,you should also fully charge and discharge your laptop’s battery at least one time at a month. Paying attention on that shouldn’t be a problem. Set a remainder on your phone if you need.
2) Keep your Laptop Cool:
Room temperature is fine for your gadget. Science most laptops are made with lithium based batteries,should be stored in temperatures between 50 to 95 degrees Fahrenheit. There are many ways to check your laptop is not continiously having climacterical hot flashes. Mostly these are located on the back of the laptop,near the top of the computer. If you keep it in bed,couch or lap, you are likely blocking the airflow which causes the computer to overheat. And overheating will muddle your laptop’s battery life.
3) Update Softwares of your Machine:
Most companies are constantly looking for actions to improve battery life of their customers via software updates. You may fear to change it or update it but mostly this change can boost up your battery life. so make sure that you are using latest software’s in your computer. Make sure your laptop is properly shut down.
4) Never Leave It just There:
If you are forced to leave your laptop for more than a month don’t worry,you only have to check that the laptop battery is 50 percent charged. And never forget to keep it in a relatively cool place. | <urn:uuid:3f919650-b706-475a-a868-a4b6f9071810> | CC-MAIN-2024-10 | https://amitchat.com/tips-to-ensure-a-good-long-battery-life-of-your-laptop/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475203.41/warc/CC-MAIN-20240301062009-20240301092009-00258.warc.gz | en | 0.935221 | 449 | 2.5625 | 3 |
Do you know the history of payroll, employer-employee relationships, and work environments?
The nature of employment and wages has changed drastically over the course of the last two hundred years, and as an accountant, you can learn a great deal about modern payroll by studying its history.
Gusto, along with our partners at CPA Academy, presented a fascinating webinar all about the history of work. We presented our webinar titled, “The History of Payroll & Benefits: How Did We Get Here?” and you can watch the entire webinar here.
Greg Kyte, founder of Comedy CPE, and Caleb Newquist, Gusto’s Editor-at-Large, hosted the presentation and delivered fascinating insights. They discussed the workplace and its history, including pre-Industrial Revolution self-employment, the Industrial Revolution, and government regulations in the 20th century.
Pre-Industrial Revolution employment
Greg and Caleb went into great detail discussing the evolution of employment, payroll, and benefits. They began by covering little-known details about pre-Industrial Revolution employment. One early example of employment was the relationship between kingdoms and their soldiers:
“Going back to peasants and fiefdom, there were people who were kings or rulers who would be like, ‘Hey, you there, you’re now in the army, and what I’m going to do for you is make sure you have food and maybe a tent,’ and that would be your compensation.”– Greg Kyte
Soldiers often received compensation in food and shelter rather than money. Before the middle ages, the Roman Empire often provided soldiers payment in commodities:
“The origin of the phrase ‘You’re worth your salt’ comes from the Roman Empire, where they actually paid their soldiers with salt because that was a valuable commodity.”– Greg Kyte
Outside of the military, pre-industrial workers were largely self-employed, and the majority of the population worked in agriculture:
“The vast majority of the other people prior to the Industrial Revolution were self-employed, meaning people like blacksmiths [and] people like farmers. [Over] 90% of people before the Industrial Revolution were farmers.”– Greg Kyte
Before the Industrial Revolution, the vast majority of workers didn’t receive a form of payroll or benefits because they were self-employed.
Greg also noted that people often entered their self-employment trade through apprenticeship programs, where young people received compensation in room, board, and education:
“Prior to the Industrial Revolution in terms of craftsmen, … there was the apprenticeship program. [This is] where there would be a craftsman [who] needed someone to help him in his shop, so a teen or a preteen would sign up for an apprenticeship with that person, and their compensation was not payroll. It was typically room and board and an education on how to [master] that craft. … There wasn’t a whole lot outside of that prior to the Industrial Revolution.”– Greg Kyte
Although people worked before the Industrial Revolution, the working landscape was vastly different from what we’re familiar with today. Later, the Industrial Revolution brought a paradigm shift to how society viewed work.
Wage labor in the Industrial Revolution
The Industrial Revolution began in 1760, and it created the type of employer-employee relationship that we’re more accustomed to in contemporary industries.
“There was a lot of innovation that happened at that time, where so much of the work that had been done manually by craftsmen was starting to become automated, at least automated to the point where there were machines that could do it a lot faster than people could do it by hand.”– Greg Kyte
New technologies replaced the need for skilled artisans, and the employed population began shifting from agricultural work to factory labor:
“The population prior to the Industrial Revolution worked on farms [and] … were more or less self-sustaining [and] self-employed, … but now we’ve got all these machines that are in these factories that need humans to tend them and keep them going as they speed up production, so factories needed workers. That’s when you see a huge shift from primarily agriculture into factory work because of the Industrial Revolution.”– Greg Kyte
There was now a need for work regulations and labor laws because of the professional relationship between factory owners and workers.
Unfortunately, businesses mistreated workers during the Industrial Revolution. People worked long hours and there were no regulations preventing child labor or hazardous work environments. Serious injuries and even death were too common among workers with few other financial options than to continue working. Society needed new laws and regulations to protect workers from exploitation.
In response. governments created new labor laws and regulations in the 20th century, and with it, came new taxes:
“We had labor laws that [came] into effect, [and] we [had] payroll taxes. Now, we have massive amounts of payroll, so the government is like, ‘Now we’ve got something that we can tax.’ Before that, you couldn’t tax it because there wasn’t a lot of it.”– Greg Kyte
In addition to payroll and taxes, the Industrial Revolution also eventually led to the creation of employee benefits:
“This is further away from when the Industrial Revolution happened, … but benefits … happened as a result of the Industrial Revolution bringing people from more of a self-employed situation into an employer-employee relationship.”– Greg Kyte
Although employees were mistreated during the Industrial Revolution, the historic movement laid the foundation for how we understand employer-employee relationships today, and the movement eventually led to payroll taxes, employee benefits, and critical pieces of legislation.
Wage and hour laws in the Fair Labor Standard Act of 1938
Throughout the late 19th century and the first half of the 20th century, the United States enacted important legislation that shaped the modern workplace. The U.S. government enacted many labor laws in the 1930s to respond to the Great Depression.
“Much of the legislation playing a major role in the history of payroll happened in the 1930s, and it happened as a result of … the country trying to dig itself out of the Great Depression. The Great Depression was the impetus for making a lot of this [change]happen.”– Greg Kyte
Perhaps the most important piece of legislation was the Fair Labor Standards Act of 1938. The legislation enacted a minimum wage, which was 25 cents an hour, and it also established crucial laws to prevent worker abuse, such as time-and-a-half overtime.
Although the Fair Labor Standards Act heavily shaped the modern workplace, it didn’t create the 40-hour workweek. The idea of the 40-work week actually came about in the 1910s because of the automaker Henry Ford. Henry Ford conducted detailed productivity research, and he found that productivity plateaued after working for 40 hours in a given week:
“According to [Henry Ford’s] research that he conducted, if you have employees and they’re working more than 40 hours a week, … he found that the productivity just fell off a cliff after 40 hours. So he was like, ‘You know what? We’re just going to keep you here for 40 hours a week, and then we’re going to cut you loose because I don’t get enough work done out of you if you’re working more than 40 hours a week.’”– Greg Kyte
More businesses implemented this standard throughout the 1910s and 1920s. Finally, the Fair Labor Standards Act solidified the 40-work week by requiring companies to pay overtime if employees work more than 40 hours.
Unfortunately, many accountants work well beyond 40 hours a week during tax season. This often seems necessary, but Caleb Newquist noted that accountant productivity is marginal after a certain number of hours:
“There are multiple accounts of productivity pretty much topping out between 40 and 45 hours. There’s nothing to be gained by working between 50 and 60 and certainly not beyond 60 hours.”– Caleb Newquist
The 40-work week isn’t just ideal for employees—it’s also the most practical amount of time for maintaining productivity.
Finally, the Fair Labor Standards Act of 1938 also established crucial rules for protecting the most vulnerable members of our society: children.
“The Fair Labor Standards Act of 1938 also prohibited child labor. … [I remember in] my history classes seeing the old black and white films of children who looked like they were eight and covered in grease, and [they were] having to climb through a machine that very clearly could murder them.”– Greg Kyte
Child labor is incredibly inhumane, and, fortunately, the Fair Labor Standards Act made it illegal.
The first half of the 20th century saw critical workplace innovations and laws that developed our modern conception of payroll, working hours, and overtime.
Learn more about the history of payroll
The way we view payroll and employer-employee relationships largely began with the Industrial Revolution, when the workforce shifted from agriculture to factory work. The new workplace needed new laws and regulations to protect workers. Although we may take certain workplace luxuries for granted, like minimum wage and the standard 40-hour workweek, many of these innovations are not even a century old.
We’re incredibly grateful to Greg Kyte and Caleb Newquist for hosting this fascinating webinar on the history of the workplace and payroll. Read Part Two and Part Three of this webinar article series if you’re ready to learn more. You can also watch the entire webinar here.
If you’re interested in helping businesses with payroll and other people-based operations such as HR and benefits, consider becoming a people advisor! Your clients need more than an accountant. They need an advisor. As a people advisor, you combine your financial expertise with people-focused advising. Gusto has the tools to help you do just that. Learn more about People Advisory. | <urn:uuid:19f0f689-fd61-4f6c-bb6b-83574a9a4e46> | CC-MAIN-2024-10 | https://gusto.com/partner-resources/brief-history-of-payroll | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00258.warc.gz | en | 0.971515 | 2,122 | 2.8125 | 3 |
Sign up for the Packaging Digest News & Insights newsletter.
May 21, 2021
3 Min Read
Manuel Pietsch, KIT
Given the ubiquity of devices in our lives and the waste that they create, researchers have been seeking various solutions to create more environmentally friendly electronics and display technologies.
To this end, scientists in Germany have developed a new technology and technique for producing more sustainable displays for devices that can biodegrade and thus be discarded without producing pollution, they said.
A team from the Karlsruhe Institute of Technology (KIT) developed new display technology based on the so-called electrochromic effect of the organic material used in the display, which uses light absorption to change colors, researchers said. They produced the technology using inkjet printing.
“For the first time, we have demonstrated that it is possible to produce sustainable displays that are largely based on natural materials with the help of industrially relevant production methods,” said Manuel Pietsch, a researcher at KIT’s Light Technology Institute (LTI) who works at the Heidelberg InnovationLab, in a press statement. “After use, these displays are no longer electronic scrap but can be composted.”
By using such sustainable technologies in combination with recycling and reuse, scientists hope their research “might help minimize or completely prevent some of the environmental impacts of electronic scrap,” he said.
Electrochromic display technology is created using electricity. When a voltage is applied, it modifies the light absorption of the material with which the display is made, which changes its color for visual display.
There are a number of benefits to using this technology in addition to its sustainability, researchers said. Electrochromic displays consume low amounts of energy and have a simple component architecture compared to commercially available displays, such as LED, LCD, and E-paper, researchers said.
Using print fabrication also makes them customizable, inexpensive, and material efficient, researchers said. Indeed, digital printing allows the displays to be tailored for use or created in complex shapes without any expensive modification of the process that reduces resource consumption, they said.
Moreover, materials used in the process are typically either organic or biocompatible. This creates a process that has a low overall impact on the environment, researchers noted.
Short-Lifecycle Display Use
Researchers published a report on their work in the journal Materials Chemistry.
The team envisions a number of short-lifecycle applications for their sustainable displays.
One is to develop wearable technologies in a user-friendly way, as the displays’ gelatine sealing makes them adhesive and able to be worn directly on the skin, researchers said. This creates viability for use in medical diagnostics to create disposable devices that can be discarded without creating electronic scrap.
The displays also can be used to create disposable sensors for quality monitoring in food packagings, which already is a single-use application, researchers added.
Elizabeth Montalbano is a freelance writer who has written about technology and culture for more than 20 years. She has lived and worked as a professional journalist in Phoenix, San Francisco, and New York City. In her free time, she enjoys surfing, traveling, music, yoga, and cooking. She currently resides in a village on the southwest coast of Portugal.
About the Author(s)
Elizabeth Montalbano has been a professional journalist covering the telecommunications, technology and business sectors since 1998. Prior to her work at Design News, she has previously written news, features and opinion articles for Phone+, CRN (now ChannelWeb), the IDG News Service, Informationweek and CNNMoney, among other publications. Born and raised in Philadelphia, she also has lived and worked in Phoenix, Arizona; San Francisco and New York City. She currently resides in Lagos, Portugal. Montalbano has a bachelor's degree in English/Communications from De Sales University and a master's degree from Arizona State University in creative writing.
You May Also Like
What Role Does ESD-Safe Packaging Serve?Mar 1, 2024|5 Min Read
Kellogg’s Pushes Sustainable Packaging from Good to Gr-r-reat!Feb 29, 2024|3 Min Read
Healthcare Packaging News and Top IssuesFeb 29, 2024|4 Min Read
Best in New Food and Beverage PackagingFeb 28, 2024|3 Min Read | <urn:uuid:247da1a0-23f3-4393-b0e6-53258494c885> | CC-MAIN-2024-10 | https://www.packagingdigest.com/sustainability/earth-friendly-biodegradable-displays-have-arrived-but-will-wary-consumers-pay-the-price- | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00258.warc.gz | en | 0.927123 | 910 | 3.625 | 4 |
The size of Kefalonia island is about 781 km2 (300 mi2), and the present population density is 55 people per km2 (140/mi2).
The town of Argostoli has one-third of the island’s inhabitants.
Lixouri is the second major settlement, and the two towns together account for almost two-thirds of the prefecture’s population.
Tourism to Kefalonia started in the early 19th century, also the Royal Family of Greece sent their children in the summer months to Lixouri. But the island for a long time was not discovered by mass tourism until the 1980s.
Tourists from all over Greece, Europe and the world visit Cephalonia. It is a popular vacation destination for many Italians, due to its close proximity to Italy. As one of the largest islands in Greece, it is well-equipped to handle the influx of tourists during the summertime, it has something to offer everyone.
Two natural attractions, Melissani’s underground lake and Myrtos beach, have helped popularize Cephalonia. The film, Captain Corelli’s Mandolin (2001), shot on the island itself, made Kefalonia more widely known. | <urn:uuid:20053445-2031-430b-a051-c35afb5a8ed0> | CC-MAIN-2024-10 | https://www.travelling.gr/2013/09/kefalonia-one-attractive-destinations/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00258.warc.gz | en | 0.953494 | 262 | 2.640625 | 3 |
Traumatic brain injury is one of the most significant causes of disability in the United States. According to the most recent data from the Centers for Disease Control and Prevention, more than 13.5 million Americans can no longer work because of the impact of a TBI.
These statistics illustrate the wide-ranging effects of TBI on patients and their loved ones.
Emergency visits and hospitalization
TBI causes 20 times more hospitalizations each year than spinal cord injuries do. The CDC reports that emergency room visits, hospitalizations and deaths associated with TBI increased by 53% between 2006 and 2014.
Brain injuries disproportionately affect men, who represent nearly 79% of these types of accidents. Sports and recreational accidents cause 21% of TBIs among children and adolescents. Adults who are older than 75, young adults and very young children have the highest age-based risk for TBI accidents.
Long-term disability and death
About 90,000 Americans experience long-term or permanent disability associated with TBI. About 50,000 TBI-related deaths occur each year, with head injuries representing 34% of trauma fatalities.
Individuals and families affected by TBI collectively accrue $76.5 billion a year in health care and other related expenses. In addition to lost wages caused by disability, the injured person may require long-term medical care to cope with the physical, emotional and cognitive limitations caused by a TBI.
Virginia families can seek legal restitution after a TBI caused by another’s negligence, whether in the road or at the workplace. After the incident in question, state residents have two years to file a claim for financial damages. | <urn:uuid:847f7c01-2461-452e-a634-30dde471d8f5> | CC-MAIN-2024-10 | https://www.carltonbennettlaw.com/blog/get-the-facts-about-tbi/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00358.warc.gz | en | 0.943953 | 336 | 3 | 3 |
By - Ilá Coimbra* and James Taylor**
When we decided to write Raise Up!, we had a simple aim in mind: to create a mainstream English language coursebook that included a more accurate representation of the world we live in. Our experience as language teachers and teacher educators has showed us that although there has been some progress towards including a wider range of people in coursebooks, this progress has been slow and it is seen mostly in local materials. This means that there is still a lot to do worldwide in order to make classroom materials more inclusive and more representative, and this was why we started to write Raise Up!
The groups that we identified as being the more underrepresented, if represented at all, in mainstream materials are
Some of these groups can be found in coursebooks, but they are usually seen as stereotypes. Older citizens, for example, are normally depicted as fragile citizens whose lives and happiness depend on taking care of their grandchildren, whereas disabled people are mostly portrayed as fighters that have succeeded in life despite their condition. Non-conventional body types are rarely seen positively, and the LGBTQIA+ community is noticeably completely absent. Also, non-hegemonic countries and cultures are more often than not seen through the eyes of tourists or explorers, rarely having their own voices expressed. What is clear is that there is massive room for improvement.
Key principles that informed Raise Up! As we said before, the aim of the book is to promote the idea that coursebook representation is important and must continue to improve. Our focus is not on critiquing what has come before us, nor are we stating that this is the only way to write inclusive materials. We do acknowledge progress has been made and that there are some books that bring a more accurate representation of society to the ELT classroom.
Having said that, we do believe that considerable progress needs to be made. The key principles that have informed the writing of this book are:
Diversity is an advantage for all learners.
Having a more accurate view of society in the classroom facilitates both the opportunity to be exposed to other cultures and identities, and opportunities to express their own. This means that if our students are part of the minorities included, not only will they be able to express their identity, but also feel they belong to the English speaking world. This sense of belonging is what Norton (1997) called ownership of language, which is strongly connected to motivation and identification with the target language and culture.
On the other hand, if our students are not part of any minorities, being in touch with these groups means that they will develop empathy, tolerance and acceptance, learning to live with differences.
Coursebooks have authority.
Both students and teachers, especially novice ones, rely on coursebooks as the embodiment of the English speaking world and English language. Therefore, the world presented in course is powerful, as well as the language they teach. Language has power, and as language teachers we should never forget that.
There is no neutral position.
The approach we took in the lessons is a more subtle approach, as opposed to bringing up controversial issues. Generally, the lessons are not about the people represented, but including them. As an example, the lesson that includes refugees is not about the conditions they live in or even what public policies should be adopted to include them, but it is a lesson about texting and this happens to have refugees using text messages. When the excluded are normalized, they become part of the mainstream.
How the Raise Up! works
Raise Up! is an e-book that can be bought at https://taylormadeenglish.com/raiseup/. The lessons have been created for a variety of levels and are suitable for teens and adults. They are not designed to be used concurrently, rather as individual lessons chosen by the teacher for their class.
Buy Raise Up! and contribute to an important cause
All the money we make with this book will be donated to Casa 1. Casa 1 is a shelter for young members of the LGBTQI+ community that were kicked out of their homes because of their sexual orientation or gender identity. There are many projects inside Casa 1, such as English to Trans-form, which offers free English lessons to Casa 1 dwellers, as well as to the black community and women in situations of social vulnerability. Among the courses offered to this community are dancing, sewing, hairdressing and makeup, self defense, and music lessons.
More information about this project in Brazil can be found at:
Norton, B. (1997) Identity and the Ownership of English. The TESOL Encyclopedia of English Language Teaching, (1-6), (2018).
Freire, P. “Introductory reflections” in Pedagogy of Freedom: Ethics, Democracy, and Civic Courage. Rowman & Littlefield Publishers, Inc., 1996
* Ilá has been an English teacher since 2001 and a teacher trainer since 2011, especially preparing students and teachers for language exams. Ilá holds DELTA Module 2, CELTA and CPE certificates and has been attending and presenting at local, national and international conferences since 2014. She is also one of the founding members of BRAZ-TESOL Voices SIG, an special interest group that focuses on equality in ELT.
** James is a DELTA qualified EFL teacher, teacher trainer, materials writer and podcast producer based in Brasília, Brazil. He has taught English to adults and teenagers in Brazil, South Korea, Belgium and Costa Rica since 2007. In August 2018, he self-published his first ebook, entitled “How Was Your Weekend?”. He produces the ELTON nominated TEFL Commute podcast. | <urn:uuid:b9803b87-7d0f-45de-a5e9-1bccd51eeeb9> | CC-MAIN-2024-10 | https://www.teach-ineducation.com/guest-writers.php?p=guest-writers-raise-up-and-the-context-behind-the-book-ila-coimbra-and-james-taylor | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00358.warc.gz | en | 0.966234 | 1,169 | 3.546875 | 4 |
It would be disturbing to learn that the HIV-AIDS prevalence rate in Cambodia is the highest in Southeast Asia. And it would be appalling to know that an estimated 140,000 Cambodian children will be orphaned due to AIDS by the year 2010.
In fact, both snippets of recently publicized information about the HIV-AIDS situation in Cambodia are even more shocking because, they are not true.
A Save the Children news release received Monday included the two erroneous statistics along with two other incorrect facts: that 164,000 Cambodians are living with HIV-AIDS and an estimated 51,000 AIDS orphans are under the age of 15.
Save the Children Australia Country Director Nigel Tricks apologized for the incorrect figures on Tuesday, saying they came from his organization’s main office in Melbourne and had not been updated.
“Cambodia is one of the world’s few success stories,” Tricks said, adding that SCA estimates there are, in Cambodia, 65,000 people living with HIV-AIDS and 6,000 AIDS orphans are under the age of 15.
Experts agree that Cambodia has achieved marked success in lowering the AIDS rate in recent years.
According to the National AIDS Authority, the HIV-AIDS prevalence rate in Cambodia, which has been on a steady decline since 1998, is the lowest yet at 0.9 percent. There are an estimated 67,200 people over the age of 15 living with HIV-AIDS and no one knows quite how many children have been orphaned as a result of the disease, NAA Secretary-General Teng Kunthy said Tuesday.
The last time the prevalence rate was 2.6 percent was at its peak in 1998, and then, only in urban areas, Teng Kunthy said, adding that the prevalence rate countrywide at that time was 2.0 percent.
Savina Ammassari, UNAIDS monitoring and evaluation adviser, said Wednesday that Cambodia is one of the few countries in the world that has begun to actually turn the tide of HIV-AIDS.
“There is no doubt Cambodia has been successful in making an important impact. Whether it will be a lasting impact is not granted unless we continue to sustain and scale up the response,” she said. “Achievements could all too easily be reversed.”
Teng Kunthy said Thailand saw a mild resurgence in its epidemic in recent years, which he attributed to complacency. UNAIDS said Thailand’s current prevalence rate is 1.4 percent.
“Success encourages us to continue our work,” Teng Kunthy said. “We still have a lot of work to do.”
The success is due to increased awareness among Cambodians, according to Mean Chhi Vun, director of the National Center for HIV-AIDS, Dermatology and STIs, who said that 97 percent of Cambodians now know about HIV-AIDS, even in rural areas.
Ammassari said Cambodia has accumulated remarkably comprehensive data on a consistent basis, which has allowed for trends to be identified early and acted upon.
In some ways, however, the epidemic has only changed shape, rather than improved. It’s no longer sex workers in brothels that are the main focus group, but new target groups—specifically men who have sex with men, whose prevalence rate in 2005 was 7.8 percent, and intravenous drug users, according to NAA.
Mean Chhi Vun said that while condom use in brothels is at a high of 95 percent, Cambodians use condoms with “sweethearts,” or casual acquaintances, only 50 percent of the time. | <urn:uuid:8af2c836-7eb8-42d6-a449-2cb8bb80928d> | CC-MAIN-2024-10 | https://english.cambodiadaily.com/news/ngo-releases-erroneous-statistics-on-hiv-aids-78055/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00358.warc.gz | en | 0.96697 | 757 | 2.640625 | 3 |
An extraordinary study of the practices, circulation and collection of photography among indigenous and mestizo subjects in the southern Andes, Portraits in the Andes breaks new ground in our understanding of visual regimes and their geopolitical inscription. Coronado's detailed investigation into the material life of images in the highlands furthers an alternative genealogy of Andean modernity in the expanded field of visual culture with striking effects for our understanding of the limits of lettered culture and the underside of intellectual history.
Portraits in the Andes examines indigenous and mestizo self-representation through the medium of photography from the early to mid twentieth century. As Jorge Coronado reveals, these images offer a powerful counterpoint to the often-slanted, predominant view of indigenismo produced by the intellectual elite. Photography offered an inexpensive and readily available technology for producing portraits and other images that allowed lower- and middle-class racialized subjects to create their own distinct rhetoric and vision of their culture. The powerful identity-marking vehicle that photography provided to the masses has been overlooked in much of Latin American cultural studies—which have focused primarily on the elite’s visual arts. Coronado’s study offers close readings of Andean photographic archives from the early- to mid-twentieth century, to show the development of a consumer culture and the agency of marginalized groups in creating a visual document of their personal interpretations of modernity.
The question that drives Portraits in the Andes is the relation between the lettered city and photography and the ways in which Latin America's lettered tradition distorts our ability to see Andean photographs. Thus, while indigenismo served as an early filter of Andean photography, indigenous photography was staking out a terrain in many ways inaccessible to and perhaps even invisible to the lettered city.
Portraits in the Andes asserts that photography, and photographic portraits in particular, offers an important source for understanding the agency of everyday people in the Andes to self-fashion their identity and relationship to modernity. | <urn:uuid:900236bc-41e6-40c0-ab4c-5ae773d8da39> | CC-MAIN-2024-10 | https://upittpress.org/books/9780822965008/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00358.warc.gz | en | 0.933179 | 415 | 2.78125 | 3 |
How Pets Help with Stress (and more)
How Your Pet Helps with Stress
Ask pet owners why they love their pets, and chances are that many answers will include something about the stress-relieving and calming aspect of pet ownership. It’s true that pets can involve a lot of work–feeding, exercise, training, and vet visits–but the rewards far outnumber the costs. In fact, scientific research has shown definitively that owning a pet can reduce stress, along with providing other health benefits.
Pet Companionship Can Fight Loneliness
For older people, people with disabilities, or anyone who needs to be isolated in their home for an extended period, owning a pet can mean the difference between loneliness and fulfilling companionship. The daily routine of caring for a pet, along with the physical comfort many pets can provide, help lift spirits and give structure to life at home. Therapy and service animals can go even further to help keep people safe and stress-free at home.
Pets Can Reduce Stress and Anxiety
While it might not take a scientific study to convince you that petting a fluffy cat or dog can reduce your stress levels, the health benefits of pet ownership can go much deeper, as highlighted in this fascinating article from the NIH.
Different studies have shown that pets can reduce levels of cortisol (a stress hormone), help patients cope with pain and terminal illness, and even help kids with attention disorders focus better in the classroom.
Caring For Your Pets (Like They Care For You)
To ensure you get the greatest benefits from your pet, there are many steps you can take to give them a long and healthy life. First and foremost is what you feed them–the right pet food can help your pet stay healthy, prevent excess weight gain, and keep their skin and teeth in good condition. Here are some examples of what to look for in quality pet food for some of the most popular types of pets:
- Cat Food: Your feline friend needs a balanced diet with plenty of protein and taurine, an essential amino acid.
- Dog Food: Dog food should contain protein from the right sources, blended with other natural, healthy ingredients.
- Rabbit Food: Rabbits need a high-fiber diet, and we recommend alfalfa-based rabbit food.
- Pot-Bellied Pig Food: As omnivores, pigs need a diet with a balance of protein, fiber, and fat.
No matter what kind of pet you’re caring for, it’s important to choose a pet food without unnecessary antibiotics, harmful preservatives, or other additives that might do more harm than good. Star Milling is a monensin-free facility; in fact, we operate a drug-free feed mill, never blending antibiotics into our feeds. You can feed your pets our high-quality products without worrying about potentially dangerous ingredients that your furry companions don’t need.
Choosing a Pet
When deciding on a pet, you’ll need to consider your lifestyle, preferences, and abilities. For example, many dog breeds are high-energy and require lots of exercise and training. They’re great for an active owner who’s willing to put in the time to teach them good behavior, not to mention all the other benefits of dog ownership.
On the other hand, cats are generally content at home and don’t require as much hands-on training. Other choices include hamsters, birds, rabbits, and even pot-bellied pigs. Do your research before choosing your pet: talk to people who own the type of pet you’re interested in, join online pet owner groups, and watch instructional videos.
If you’re looking for a trusted source of food for your pet, Star Milling has been producing safe, quality feed for all types of animals for more than 45 years. Contact us to learn more about healthy food choices for your pet. | <urn:uuid:2863efc2-214b-4d0f-ac49-b7d3dad28cc5> | CC-MAIN-2024-10 | https://starmilling.com/your-constant-companion-how-pets-help-with-stress-and-more/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00358.warc.gz | en | 0.940204 | 811 | 2.578125 | 3 |
Chat With Us Contact Us Email Me
Collagen is a kind of protein, which belongs to glycoprotein, accounting for about 25% - 30% of the total protein in the human body. It mainly exists in connective tissue. It has strong stretching character, is the main component of ligament and extracellular matrix. Collagen contains hydroxylysine and hydroxyproline, which are not found in ordinary proteins. Hydroxyproline is a vehicle for transporting calcium from plasma to bone cells, which combines calcium with bone cells to prevent calcium loss that leads to bone osteoporosis.
Collagen is widely used in food, medicine, tissue engineering, cosmetics and other fields because of its good biocompatibility, biodegradability and biological activity.
1. Health care field
2. Food field | <urn:uuid:324410c3-b83d-41d2-b04a-c7a7dbd65b93> | CC-MAIN-2024-10 | https://ingredientssupply.com/bovine-collagen | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00358.warc.gz | en | 0.928666 | 169 | 2.796875 | 3 |
Dispersal of land-locked larval Ryukyu-ayu, Plecoglossus altivelis ryukyuensis, in the Fukuji Reservoir, Okinawa Island
The dispersal of larval land-locked ryukyu-ayu, Plecoglossus altivelis ryukyuensis , which originated from an amphidromous form on amami-oshima island, was investigated from November 2000 to april 2001 in the freshwater Fukuji reservoir. a total of 232 larvae were collected at three stations at different distances from the mouth of the San- numata river. They were most abundant at the station closest to the San-numata river (Station1; 76.3% of total catch) and their distribution in the reservoir was not uniform. although larvae tended to disperse throughout the sampling area during the sampling period, their abundance decreased significantly as the distance from the river increased. The body length (BL) of larvae ranged from 5.1 to 23.0 mm. Yolk-sac larvae were collected only at Station1, and larvae smaller than 10 mm BL accounted for 80.2% of the all larvae collected at Station1, whereas they accounted for 56.3% of the all larvae collected at Station2. The body size and estimated age based on body length were highly similar between the largest larva in the reservoir (23.0 mm, about 60 days) and the smallest ascending larva (24.2 mm, about 63 days). These results indicate that larvae inhabit the area close to the river mouth after drifting, and staying there until they begin upstream migration without experiencing long-distance dispersal. | <urn:uuid:c627e6d1-1786-4c86-ab2b-d548581b0dc9> | CC-MAIN-2024-10 | https://sfi-cybium.fr/en/dispersal-land-locked-larval-ryukyu-ayu-plecoglossus-altivelis-ryukyuensis-fukuji-reservoir-okinawa | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00358.warc.gz | en | 0.967343 | 342 | 2.765625 | 3 |
MP3 is the 'colloquial' name for "MPEG 1 Layer 3" audio encoding. The purpose of mp3 encoding is to reduce the overall size of an audio data stream whilst maintaining an acceptable level of listening quality.
It is implemented using a "codec", meaning that you need an "Encoding" function and a "Decoding" function in order to listen to the audio. The Encoding device might be hardware or software and the decoding function the same - it might be software or a hardware device.
The entire implementation methodology of mp3 is as a 'lossy' encoding format. "lossy" means that the encoder will remove audio data that it determines is not necessary for that "acceptable quality" level to be maintained. The emphasis here is on "lossy". You lose data when encoding to mp3.
When you decode from mp3 back to a PCM format (such as WAV), that data is gone. It is never coming back.
mp3 can be encoded to a chosen bitrate. The higher the bitrate, the better the overall quality. Also, different types of music behave differently under mp3. Rock music or EDM can be encoded to low bitrates with subjectively lower quality loss than classical music. The waveform generated by a strings instrument is of such complexity that it is very hard to encode with mp3 without significant loss of quality, therefore classical music requires higher bitrates in order to encode the audio without significant quality loss.
Note again that once encoded into mp3 format, the original waveform will change. It may retain a resemblance to the original frequency spectrum and the original waveform, but it is not the same. Again, once you encode, you lose data and you're not getting that data back, unless you go back to the original PCM WAV.
Data storage is cheap these days and the only reason you would use mp3 is for a particular device support.
There are much better codecs out there now since mp3 was developed. Opus is arguably the best overall codec followed closely by AAC variants. | <urn:uuid:ba5e22c9-d7e9-4fe5-800d-959a066ad3f7> | CC-MAIN-2024-10 | https://sound.stackexchange.com/questions/46622/does-the-wav-file-created-from-a-mp3-file-have-better-quality-than-the-mp3-fi/46635 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00358.warc.gz | en | 0.915942 | 432 | 3.375 | 3 |
This essay was part of the final paper submitted for my ENGCOMP 3D course, which earned a grade of A.
Life in the 21st century is a race. From the moment we draw our first gasp of air, with no conscious participation on our part, we begin to embark on a lifelong race—a race to utter our first sounds, take our first steps, write our first words. Then, we race to earn our first A’s, secure our first jobs, build our first homes—all to reach the arbitrary finish line of an imaginary success. The question here is, does everyone start on the same line? Let’s make an optimistic assumption that everyone does when they are first born. However, if at some point during the race, they’ve been told their gender is not suitable for their ambition, they have to take two steps backwards. The same applies if they’ve been taught to place their keys between their knuckles when walking alone at night, if they’ve been paid less for the same amount of work done, if they’ve felt intense guilt for prioritizing their career, and if they’ve been talked over when they voiced their opinions during a group discussion. Based on these 5 statements alone, most men would remain at their original spot, but a large majority of women would have taken 10 steps backwards. With these revised starting lines, all are expected to race towards the finish line.
The analogy which I described above helps to put into perspective the severity of gender inequality that continues to pervade our society. It depicts how men are disproportionately placed in a more advantageous position to pursue their individual interests because women are expected to live up to static societal expectations and develop themselves to fit certain roles. Now, would the same effect have been achieved with a rage tweet about how ‘men are trash’? How does one reduce a sensitive topic convoluted with historical context, inherited culture and lived experience into 140 characters? Weighing in on important issues through social media does raise awareness and move the needle, but does it move the needle in the right direction? Living in the height of the political correctness era, these are the questions that plague me as I scroll through an endless feed of social media posts that claim to raise awareness but don't quite have the right nudge to spur action in society. By the most generous reading of the impact it creates, people learn what not to say, but not why not to say them. It fosters anxiety, not equality.
In the past 10 weeks, I’ve come to learn first hand that stand-up comedy has the real estate to give these issues the nuance it deserves, and this potential, if harnessed correctly, can create a ripple effect that moves society forward by generations. In this paper, I will quote from Comedy Collection #2 and other stand-up comedies we’ve been assigned this quarter to show how humor plays into the notion that ‘the personal is political’. Humor advocates for changes in the social and political system that will level the playing ground for people of all genders, but it raises awareness to the masses by sharing personal narratives that help its audience comprehend what it means to be a woman in a male-dominated society. The point of stand-up comedy, I will argue, is essentially to make the audience feel like they’re catching up with a hilarious old friend that desperately needs to vent. By building familiarity and lowering the audience’s mental barrier, comedians help the audience “acknowledge the possibility that they can be wrong without necessarily experiencing this recognition as discomfort” (Verducci 123). Instead of tweeting about something that’s in the zeitgeist but doesn’t create a visceral impact, comedians use humor to pave the way for their social commentary on gender issues to reach the audience and nudge them to change for their friend, not out of fear.
In Comedy Collection #2, the comedian that best embodies the character of a brash, witty and frustrated friend is Ali Wong. In order to set the stage for her to comment on the need for paid maternity leave in the United States, Ali Wong first lifts the veil that shrouds the truth about the post-pregnancy mental and physical healing process that all mothers go through but so few men truly understand. As a comedian who recently rose to fame after her Netflix debut Baby Cobra, Wong understands that the red carpet deceives. The glam squads of the industry are professionally trained to create the illusion of a “mother’s glow”, in which celebrities who are new mothers are often dressed to the nines while cradling their baby, appearing flawlessly radiant with maternal joy. In Hard Knock Wife, Wong doesn’t just lift the veil, she tears the curtain down. The stand-up starts off with Wong admitting that while she loves her newborn daughter very much, she is “on the verge of putting her in the garbage” (2:12). Wong intentionally brings her voice to a bare whisper in this segment of the show, as if confiding in her audience a guilty secret. After all, who else but a close friend would dare share such an embarrassing admission? Right off the bat, Wong presents a persona on stage that has all her walls down in order to encourage her audience to lower theirs. Starting off her special with this segment also functions to send a clear message to her audience that there will be no sugarcoating in her performance and they can expect nothing less than the truth from her, effectively establishing credibility for the messages she aims to deliver in the show.
Later on in the show, Wong shares her confusion about the physical healing process when she learned that new mothers are required to wear diapers—one that the men among the audience no doubt share. It was only after her first pregnancy that she learned about “all the crazy shit that comes out” of a woman’s genitals after she gives birth (17:13). She immediately builds upon this segment by briefly describing the process of being in labor and undergoing C-section surgery, before vividly recounting how her female friend’s postpartum vagina resembles “two hanging dicks side by side” (22:02). All of these segments are raw and vivid in their own way, but they build upon each other to help Wong convince her audience of the necessity of paid maternity leave in the United States. Just as how the thought experiment I presented in my introduction effectively depicts the severity of gender inequality, Wong uses “charged humor” in these individual segments to convey the temporary loss of control over one’s bodily functions every woman undergoes after giving birth (Krefting 16). By first unmasking the Hollywood portrayal of motherhood and explaining how it takes a mental and physical toll on a new mother, Wong sets the stage for herself to challenge the normalized cultural attitudes about motherhood, which contributes to inequality in the country’s legal arrangement regarding maternity leave. She ends the segment on a strong note by emphasizing that “Maternity leave is for women to hide and heal their demolished-ass bodies”—an ensuing fight in America that other European countries readily treat as a woman’s right (15:52).
To further illustrate what societal expectations on motherhood entails, Wong exposes her colleagues’ assumption that she would remove herself from the limelight due to her maternal duties. This speaks to the sexism that continues to pervade the 21st century, when society is more progressive than it has ever been, we still expect women to sacrifice their individual career goals in light of their new domestic roles. Even if a woman were to continue pursuing her career, they are conditioned to believe that the duty to nurture and care for their child is primarily their own. Hence, they impose a crushing pressure on themselves to compensate by spending all the time at home taking care of the child, leaving no time for their own well-being. Men, on the other hand, even if they earn less, as in the case of Wong and her husband, are released from the bulk of the domestic responsibilities guilt free due to society’s narrative that a mother’s main duty is to care for the child. Wong details the work of parenthood, or rather, the work of motherhood. She explains how she is expected to do every mundane, exhausting and demoralizing aspect of the job—unpaid, because Americans don’t get maternity leave—with no thanks. While her body becomes a walking cafeteria for her baby and the newborn “shits on her chest” during their daily skin-to-skin contact ritual, her husband gets confetti and is declared the world’s greatest dad for occasionally changing a diaper. Wong uses these personal anecdotes to show that although both father and mother carry the title of ‘parent’, there is a distinct difference between the standards set for men and women when it comes to caring for the child. When she confesses her irritation with the age-old question of how she balances her family and her career, she responds that “men never get asked that question, because they don’t” (26:49). This all goes to show that when a man is the breadwinner, he has one important job; but when a woman is the breadwinner, she has two important jobs.
Besides advocating for changes in the political system, Ali Wong also acts a friend when she encourages women to speak openly about difficult topics such as miscarriage. If it's not burdensome enough for women to deal with the physical changes that take place during their pregnancy, they also have to cope with the mental stress and emotional guilt that comes with the social stigma that is associated with miscarriage, as if its their fault for not protecting the fetus well enough. In Baby Cobra, Wong openly shares how grateful she is that she’s seven and a half months pregnant because the year before, she had a miscarriage of a pair of twins during her first pregnancy. Rather than hiding the losses that are by no means her fault, Wong shows to her audience that she can embrace her life experiences with dignity and strength, and even manage to create laughter out of setbacks. Wong also effectively removes the dramatization surrounding the dark stigma of miscarriages when she tells her audience to not take sympathy on her miscarriage because “they were the size of poppy seeds” and she’s “picked boogers larger than the twins” she lost (51:41). By opening up the window of being unashamed about painful topics, Wong empowers women to start conversations about hardships that they endure during pregnancy. Leading by example, Wong demonstrates that once you bring personal experiences into the open and embrace them as your own, they no longer have the power to bring shame or guilt.
Similarly, in Can I Touch It, Whitney Cummings discloses how she wrestled with shame about her eating disorder in her teenage years which led to her undergoing multiple corrective surgeries due to an unbalanced breast development. This then segues into a question that has lived rent-free in the minds of women: “ Is the impossible standard of beauty that women are killing themselves to achieve what all men want?” (36:45). She then proceeds to share that in a sex robot factory, she learnt that men were willing to spend $1400 to ensure that their robot dolls have pubic hair and the factory workers put extra effort to ensure the nipples attached on these dolls are uneven —interesting revelations that goes against the consensus of beauty standards that women are expected to achieve. From narrating her embarrassment about her own body to sharing about what sex robots taught her, Cummings empowers the women among her audience to embrace their body as it is instead of attempting to live up to what society deems pretty.
Steering her stand-up in a slightly more political direction, Cummings stops herself when she talks about chastising a friend who makes blanket statements about men and women: “I know it’s weird that I’m criticizing that, because generalizing about men and women did pay for my house” (12:19). Cummings isn’t afraid to admit that she was wrong, and as she grows, she sees how it is necessary to delineate from the concept that feminism is about men and women being at war with each other, in a way that is neither nuanced nor helpful. She talks about the #MeToo movement, which primarily aims to give young women who experienced harassment a sense of empowerment from understanding that they are not alone in their circumstances, but in recent years, it has rapidly developed into a rage-fueled war against men. Cummings doesn’t hold back from taking women to task for this outdated behavior and encourages them to adjust to the post #MeToo world in a mindful way. When she realizes that the world is suddenly concerned about women’s opinions when they have been disregarded for centuries, she squats down and invites the female in her audience into an imaginary huddle to strategize. She tells them to put away the “Rosé All Day shirts”, stop calling each other “hooker” and “level the fuck up right now” (8:38). Beneath all the jokes, Cummings is challenging females to do better, much like an honest friend would, and saying something not all women want to hear right now: being taken seriously will require seriousness, creating change will require changing, and uniting 50 percent of the population will take more than a hashtag.
It is interesting to note how Cummings openly calls out women who generalize about men and reminds them that they, too, play a role in the change they envision. Yet, when she wants to help the men in her audience understand the sexual harassment that women endure daily, she employs a much subtler approach. Instead of taking jabs at men who underplay the severity of harassment, Cummings claims that she understands the impulse to touch a “freaking cute” woman (1:35). She draws an analogy about seeing a cute service dog in the airport that is wearing a vest that says “Dog Working. Do Not Pet.”, which makes her want to pet the dog more. The crux of the joke comes when she reasons that the dog “obviously wants [to be pet]”, because it’s a dog (2:04). This dichotomous approach she employs when talking to men and women is effective because it opposes the tone that society adopts towards these genders when approaching sensitive issues. In Can We Take A Joke, it is apparent that today’s society walks around eggshells when talking about any topic remotely relating to gender for fear of being labelled as insensitive. On the other hand, there is no lack of women in society who publicly project their anger towards men and blame every member that belongs to the gender group for any existing problem in society. By opposing these narratives, Cummings introduces a fresh perspective into the conversation, delivering a wake-up call for women as well as helping men to understand how women experience harassment. She even gives the benefit of doubt to men who underplay the severity of sexual harassment and assume that woman are exaggerating the situation because they themselves would never harass a woman. However, she reminds these men that while they wouldn’t behave indecently in front of a woman, it doesn’t necessarily mean that other men wouldn’t. She breaks down the concept of harassment through her analogy and patiently explains that women have to “take a class to learn how to go outside” because of men who would potentially harm them (19:05). By sharing her own vulnerabilities and treating men as comrades instead of rivals, Cummings reminds her audience that feminism is a fight for females, not against males.
Although Ali Wong and Whitney Cummings have distinct performance styles, a common strength that they share is the ability to relate to the audience. As Wong shares her difficulties adjusting into her new role as a mother, the women in the audience are able to relate and roar in agreement. When she talks about the different standards that men and women are held to as parents, she is merely lifting the rug and exposing the dust that we’ve been sweeping away for years. Similarly, Cummings ensures that her male audience are able to understand women’s perspective on harassment by drawing a carefully thought-out analogy. In fact, it is because Wong and Cummings’ ability to ‘tell the truth like it is’, much like an honest friend, that their message is delivered so effectively. Their audience know that they can readily accept what the woman on stage tells them because they believe that she will tell the truth. In comparison, the biggest flaw with Growing is Schumer’s attempts to relate. She makes generalizations about what women go through that are either so specific to herself that her audience can’t relate, or so broad but doesn’t apply to her. For instance, Schumer started off the show by talking about how her youthful self used to blame her actions on the city she was in. Not only was it something that only comics traditionally do and hence not a joke her audience can relate to, it didn’t lead to a deeper thought or contribute to the central theme of her show. She also distanced herself from millenials, despite being one at 37, by assuming that they don’t know what a pad is (35:00). As a result, both these jokes fell to awkward chuckles and a few claps. Besides, Growing also lacked a structure that gives her audience a sense of direction. As she hops back and forth between her pregnancy, she nimbly introduces secondary themes of the show which she didn’t give enough real estate to explore. For instance, she addresses her arrest while protesting the Kavanaugh hearings before jumping back to her pregnancy by sharing that her main worry about being arrested is to go hungry while carrying a child. It came to me as a loose grabbag of jokes strung together by some half-hearted transitions. Throughout the special, I failed to identify a central theme which her performance was built around and there were feeble attempts at a deeper dive that resonates outwards into a broader consideration of the society we live in.
Life is a race, and humor helps us understand the track on which we’re racing. Humor reminds those who are privileged to turn around and assess if everyone is on the same starting line; humor pushes those who are less privileged to run faster, and more importantly, in the right direction. In Comedy Collection #2, Wong and Cummings successfully embody the role of a friend and personifies the female characters in one’s life, exposing the universal experience that most women share in this male-dominated society. Through establishing credibility, these comedians help men develop an empathy and understanding of what the female characters in their life endure daily, and in doing so, moves the conversation forward and closes the gap between the starting lines.
Verducci, Susan. “Narrative Openings.” Developing Moral Sensitivity, edited by Deborah S. Mower et al., 1st ed., New York, Taylor & Francis, 2015, pp. 96–102.
Krefting, Rebecca. All Joking Aside. Amsterdam, Netherlands, Amsterdam University Press, 2014. | <urn:uuid:32ebc0cc-50a2-4c9a-9699-7e0e88033f94> | CC-MAIN-2024-10 | https://jia-shing.com/the-value-of-feminist-humor/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00358.warc.gz | en | 0.965891 | 3,975 | 2.578125 | 3 |
Children acknowledge physical constraints less when actors behave stereotypically: Gender stereotypes as a case study.
A fundamental part of understanding structural inequality is recognizing that constrained choices, particularly those that align with societal stereotypes, are poor indicators of a person's desires. This study examined whether children (N=246 U.S. children, 53% female; 61% White, 24% Latinx; 5-10years) acknowledge constraints in this way when reasoning about gender-stereotypical choices, relative to gender-neutral and gender-counterstereotypical choices. Results indicated that children more frequently inferred preferences regardless of whether the actor was constrained when reasoning about gender-stereotypical choices, as compared to gender-neutral or gender-counterstereotypical choices. We also found evidence of an age-related increase in the general tendency to acknowledge constraints. We discuss the broader implications of these results for children's understanding of constraints within society.
View details for DOI 10.1111/cdev.13643
View details for PubMedID 34411288
Minor Infractions Are Not Minor: School Infractions for Minor Misconduct May Increase Adolescents' Defiant Behavior and Contribute to Racial Disparities in School Discipline
2020; 75 (1): 23–36
Although minor misconduct is normative in adolescence, such behavior may be met with punishment in American schools. As part of a punitive disciplinary approach, teachers may give adolescents official infractions for minor misconduct-that is, a minor infraction-presumably to deter future problem behavior. This article investigates three arguments that challenge the wisdom of this assumption and considers the potentially detrimental effects of minor infractions: (a) minor infractions increase, rather than deter, adolescents' defiant behavior; (b) these effects are exacerbated among adolescents who are highly attached to school; and (c) teachers' punishment of minor misconduct may be racially biased, resulting in African American students receiving more minor infractions than White students. To test these hypotheses, 729 adolescents' school disciplinary records were analyzed over 1 academic year. Longitudinal multilevel analyses were conducted to assess (a) if receiving minor infractions predicted later increases in infractions for defiant behavior at the within-student level, (b) whether adolescents' attachment to school moderated this association, and (c) if a disparity existed between African American and White students' average level of minor infractions. Results indicated that minor infractions predicted subsequent rises in defiant behavior, and this link was exacerbated for adolescents who reported initially high levels, but not low levels, of school attachment. Furthermore, African American students received more minor infractions than White students, controlling for a host of risk factors for school misconduct. Findings are discussed in relation to American school discipline policies and African Americans' persistent overrepresentation in school discipline and the criminal justice system. (PsycINFO Database Record (c) 2020 APA, all rights reserved).
View details for DOI 10.1037/amp0000475
View details for Web of Science ID 000506339300002
View details for PubMedID 31081648
Racial Inequality in Psychological Research: Trends of the Past and Recommendations for the Future.
Perspectives on psychological science : a journal of the Association for Psychological Science
Race plays an important role in how people think, develop, and behave. In the current article, we queried more than 26,000 empirical articles published between 1974 and 2018 in top-tier cognitive, developmental, and social psychology journals to document how often psychological research acknowledges this reality and to examine whether people who edit, write, and participate in the research are systematically connected. We note several findings. First, across the past five decades, psychological publications that highlight race have been rare, and although they have increased in developmental and social psychology, they have remained virtually nonexistent in cognitive psychology. Second, most publications have been edited by White editors, under which there have been significantly fewer publications that highlight race. Third, many of the publications that highlight race have been written by White authors who employed significantly fewer participants of color. In many cases, we document variation as a function of area and decade. We argue that systemic inequality exists within psychological research and that systemic changes are needed to ensure that psychological research benefits from diversity in editing, writing, and participation. To this end, and in the spirit of the field's recent emphasis on metascience, we offer recommendations for journals and authors.
View details for DOI 10.1177/1745691620927709
View details for PubMedID 32578504 | <urn:uuid:c93a59d7-d3e8-4cf3-a4d1-8ca059a0898f> | CC-MAIN-2024-10 | https://profiles.stanford.edu/elizabeth-mortenson | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00358.warc.gz | en | 0.921055 | 928 | 2.515625 | 3 |
No safe space for Nepal’s LGBTIQA+ community
Discrimination, LGBTIQA+ people agree, starts at home. Families try to ‘cure’ them when they finally muster up the courage to open up. Many are taken to see the doctor and prescribed antidepressants
Home is a safe space. But not for everyone. It’s often a hostile ground for LGBTIQA+ individuals. Most are harassed and abused when they come out. When violence happens at home, where do you go? When your family doesn’t accept you, who do you turn to?
A little over a year ago, a 15-year-old trans girl died by suicide. According to Pinky Gurung, president of Blue Diamond Society (BDS), Nepal’s oldest queer rights organization, the girl was being harassed at home after disclosing her gender identity. Two years before her death, she had written a letter to BDS mentioning how her family was mistreating her.
“Most cases of violence aren’t reported as people don’t want to complain against their family members,” says Gurung. Sometimes, these individuals reach out to organizations like BDS or those from the community. But, Gurung adds, family counseling and mediation can do only so much in the absence of strict laws.
Nepal, despite its pro-queer global image, struggles with the acceptance of different gender identities. Despite progressive constitutional provisions, members of the community face all kinds of discrimination. This limits their access to proper healthcare, education, employment opportunities, and legal protection. Dignity becomes a dream.
Discrimination, LGBTIQA+ people agree, starts at home. Families try to ‘cure’ them when they finally muster up the courage to open up. Many are taken to see the doctor and prescribed antidepressants. When that doesn’t ‘set them straight’, beating them into submission is considered another option.
“Discrimination paves the way for domestic and sexual violence,” says Sunita Lama, a transgender rights activist and sex worker. She adds the violence that LGBTIQA+ people experience stems from rigid and hierarchical ideas about sex, gender, and sexuality.
In a study conducted by UN Women, four in five LGBTIQA+ respondents said they had experienced at least one incident of violence. Out of 1,181 respondents, 81 percent reported being victims of violence based on their gender identity or sexual orientation, with 71 percent experiencing emotional violence, 46 percent physical violence, 46 percent sexual violence, and 40 percent economic violence.
The report, titled ‘Evidence to action: Addressing violence against LGBTIQA+ people in Nepal’, further stated that violence was compounded by factors such as socioeconomic status, disability, and caste or ethnicity. The report added that the LGBTIQA+ community, besides battling plenty of stigmas, faces problems related to legal protection, gender recognition, and marriage equality, all of which increase their hardships.
Manisha Dhakal, executive director of BDS, says there isn’t much information, data, or studies on the community. Even in the case of the few studies that have been carried out, there is no follow up. Despite the LGBTIQA+ people regularly facing violence—at home, on the streets, at the workplace—little is being done to tackle it.
Domestic violence largely implies violence against women. The LGBTIQA+ community finds itself sidelined here too. There is no proper mechanism for reporting violence, says Gurung. The police are usually indifferent—refusing to take down their complaints and going as far as to blame the victims.
Lama says the situation is worse for sex workers. There have been times the authorities have refused to believe they could be at the receiving end of violence. The common mindset is that transgenders are aggressive. “The police would rather just lock us up than listen to us,” she says.
There have been a lot of campaigns and programs against violence but most of these have only addressed violence against women, claims the LGBTIQA+ community. The media, rights activists, and the government all have a role to play in this. There is extensive reporting and response to violence against women in comparison to violence against other forms of gender.
“There’s no denying that our society, at large, is still uncomfortable with queerness,” says Lama. Nepal has recently registered its first same-sex marriage, making it the second country in South Asia to do so. However, heterosexual relationships still enjoy a special status in our society.
ApEx asked 20 random people, in Pulchowk and Khumaltar in Lalitpur, if they were comfortable with different forms of non-heterosexual relationships. Most refused to talk about it, a few expressed their disgust with typical Nepali slang—chhya!—and two had to be explained what it meant. Only one, in her 20s, said ‘love is love’.
Organizations lobbying for LGBTIQA+ rights have been conducting awareness programs but the impact is subdued with no outside help. Gender studies is not a part of our school curriculum and gender stereotyping—think blue rooms, cars, and short hair for boys and pink dresses, dolls, and braids for girls—is still the norm.
The rigid notions of sex leave no room for deviation. And any deviation is feared, mocked, and shunned. This mindset in itself is a form of violence, says the community. It is what makes them vulnerable to other, more visible, forms of abuse.
According to a study by the Williams Institute at UCLA School of Law, LGBTIQA+ people are about six times more likely to experience violence by someone they know well and about 2.5 times more likely to be at the receiving end of it at the hands of a stranger, compared to non-LGBTIQA+ people.
LGBTIQA+ people are at increased risk of domestic violence from their partners as they often have nowhere to go. Most have been disowned by their parents and legal recourse is often difficult to pursue. Lama says the partners know this and often take advantage of it. “Prior experiences of physical or psychological trauma, such as bullying and hate crime, also make LGBTIQA+ victims of domestic violence less likely to seek help,” she says.
Sarita KC, executive director of Mitini Nepal, which has been working for queer rights in Nepal since 2002, says violence against the community isn’t addressed because of authorities’ underlying biases and lack of laws. Apart from the lack of family and societal acceptance, there is little to no representation at the policy level.
“There is less participation of LGBTIQA+ people in politics and in places where our voices could be heard,” she says. Queerphobia runs deep even when it isn’t immediately obvious. This makes change difficult, and a socio-cultural shift even more so.
Worse, violence against the community is justified by those who actually have the power to do something about it. Families use it to try to fix them. The police blame their queerness. Surely, by flaunting their over-the-top personalities, they were asking for it. Lama says the police have told many of her friends who have been abused that they must have done something to instigate fights.
Violence in the LGBTIQA+ community takes many forms, from slurs and intimidation to abuse and even murder. In March 2019, Junu Gurung, a transwoman, was brutally beaten. She died from her injuries two days later. In January 2020, Ajita Bhujel, a transwoman, was strangled to death in Hetauda by a group of youths.
Gurung says it’s going to take a lot more than just awareness programs to curb violence in the LGBTIQA+ community. Nepal must have a proper mechanism to address violence. It must also ensure that victims get justice, despite their gender identity or sexual orientation. She says many community people hesitate to file complaints as they know nothing will be done. Their cases, registered after much pleading and palm-greasing, will be another paper in a dusty file somewhere.
Violence, KC adds, is a daily reality for the LGBTIQA+ community—in buses, public spaces, schools and colleges, hospitals, and other service providers. There is online harassment as well. KC says their posts on Facebook elicit a lot of hateful and hurtful comments. “Our rights and space are constantly being violated but without public support, we can’t do much about it,” she says.
March 1, 2024, 1:29 p.m.
March 1, 2024, 9:18 a.m.
Feb. 29, 2024, 1:26 p.m.
Feb. 29, 2024, 11:46 a.m.
Feb. 29, 2024, 10:20 a.m.
Feb. 28, 2024, 12:40 p.m.
Feb. 28, 2024, 11:41 a.m.
Feb. 28, 2024, 9:56 a.m. | <urn:uuid:e575ff97-1b29-42be-a7e6-32fc6a052de6> | CC-MAIN-2024-10 | https://theannapurnaexpress.com/story/46778/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00358.warc.gz | en | 0.970973 | 1,907 | 2.515625 | 3 |
Dear Wikiwand AI, let's keep it short by simply answering these key questions:
Can you list the top facts and stats about Credit rating?
Summarize this article for a 10 year old
A credit rating is an evaluation of the credit risk of a prospective debtor (an individual, a business, company or a government), predicting their ability to pay back the debt, and an implicit forecast of the likelihood of the debtor defaulting. The credit rating represents an evaluation from a credit rating agency of the qualitative and quantitative information for the prospective debtor, including information provided by the prospective debtor and other non-public information obtained by the credit rating agency's analysts.
Credit reporting (or credit score) – is a subset of credit rating – it is a numeric evaluation of an individual's credit worthiness, which is done by a credit bureau or consumer credit reporting agency.
Oops something went wrong: | <urn:uuid:dbaf45ed-c4ae-4733-b309-3fcccc46769c> | CC-MAIN-2024-10 | https://www.wikiwand.com/en/Credit_rating | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00358.warc.gz | en | 0.945461 | 184 | 3.09375 | 3 |
Vasantha Vihara (Summer Camp)
The Vasantha Vihara Summer Camp, organized by Sri Ramakrishna Sharadashrama, is a week-long program held during April and May for high school children. The camp offers a wide range of activities aimed at fostering physical, mental, moral, and spiritual development. Participants engage in various activities such as yogasanas, physical exercises, games, personality development sessions, prayers, Vedic chanting, stotras, meditation, and exciting excursions.
The curriculum of the camp is designed to instill in children the timeless values of our cultural and spiritual heritage. Through activities like music, yogasanas, drawing, painting, Vedic and Bhagavad Gita chanting, and recitation of hymns and verses, participants are encouraged to explore their latent talents and express themselves creatively. The Vasanta Vihara Summer Camp is a practical embodiment of the immortal values and virtues taught by Swami Vivekananda, serving as a guiding principle for its operations.
The core principles of the Vasanta Vihara Summer Camp focus on the holistic development of individuals. It emphasizes the cultivation of a harmonious character that encompasses physical, mental, moral, and spiritual aspects. The camp also promotes the recognition of the inherent dignity of every individual and the spiritual unity and equality of all human beings. Participants are encouraged to realize that their own well-being is intricately linked to the welfare of others, fostering a spirit of sharing and loving service. The camp also emphasizes the importance of personal effort and responsibility, emphasizing that we are the creators of our own destiny. It underscores the idea that individual and social well-being can only be achieved through consistent and dedicated effort.
The Vasantha Vihara Summer Camp provides a nurturing environment where high school children can engage in transformative experiences, learn valuable life skills, and deepen their understanding of their cultural and spiritual heritage. By embracing the principles taught at the camp, participants are empowered to lead meaningful lives and contribute positively to society.
- Development of a harmonious character based on all-rounded growth—physical, mental, moral, and spiritual.
- Recognition of the dignity of the individual and the spiritual unity and equality of all human beings.
- Realization of the fact that one’s true welfare and progress is inseparably linked to that of others, and that sharing and loving service must become an integral part of one’s life.
- Stress on the truth that we are the makers of our own destiny, and
- Individual and social well-being can be achieved only through steady and sustained effort. | <urn:uuid:5204dea0-26d0-452c-8c67-f90a279947db> | CC-MAIN-2024-10 | https://ponnampet.rkmm.org/vasantha-vihara | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00358.warc.gz | en | 0.926425 | 530 | 2.671875 | 3 |
Newswise — If you want to learn how to farm successfully and grow crops, here’s a novel place to turn to:
The UND Department of Space Studies.
Then again, this advice might be a tad limited, given that not many are aspiring to grow crops on asteroids millions of miles from Earth.
But UND Assistant Professor of Space Studies Sherry Fieber-Beyer is. And in fact, she’s one of the first in her field who’s seriously looking into such an idea.
“If our goal is to establish a long-term presence in space, well, humans can’t do that unless we have food,” said Fieber-Beyer, a planetary scientist.
It turns out that among the vast combinations of rocky and metallic celestial bodies floating in our solar system, a number of them have a top soil – commonly referred to as regolith – that is highly organic. They’re classified as C-type asteroids.
So, in the greenhouse of UND’s Biology Department, a couple of otherwise normal-looking pots are the pilot testbeds of a far-off-in-the-future concept for space exploration.
Fieber-Beyer and Steven Russell, a Space Studies graduate research assistant, are studying whether lettuce, radishes and peppers are able to grow in a soil comprised of varying mixes of peat moss and simulated asteroid regolith, an exact mineral copy of samples taken from organic-layered C-type asteroids.
“It’s a pie-in-the-sky kind of idea,” remarked Fieber-Beyer, when asked about the practical application of farming asteroids. “But the end vision is to create pit stops for food throughout space.
“I don’t know of anybody else who’s growing plants in asteroid simulant at this moment, but I’m sure it will be an emerging field, based on calls for similar projects coming from NASA. And people are excited to see what happens through this experiment.”
Astronomical agriculture in the works
Though the experimental planting pots are described above as being normal-looking, they still stand out among the flora of the campus greenhouse. For example, one is situated at a 90-degree angle to the floor and slowly rotating to simulate growth conditions in microgravity.
In such an orientation, making a full 360-degree rotation over 24 hours, the plants actually grow perpendicular to the floor, in alignment with their container.
Russell, who’ll graduate soon with a master’s degree in Space Studies, has been the one maintaining and monitoring the planting process. The project is the topic of his thesis paper, which he’ll be wrapping up in the coming months.
With a biology degree from his undergraduate studies at UND, Russell was able to intern with scientists at NASA’s Kennedy Space Center in 2019, working with microorganisms in microgravity simulators. He was also in contact with scientists and fellow interns determining suitable plants for growth experiments on the International Space Station.
He said that the crop choices of lettuce, radishes and peppers had to do with how they each grow in soil and how they are harvested for consumption. Also, they have been previously grown in space, or are slated for experimentation, in the case of peppers.
As for the simulant, Fieber-Beyer procured the mineral mix from Exolith Lab, an extension of the Center for Lunar & Asteroid Surface Science at the University of Central Florida.
“We’re trying to grow these plants in different concentrations of asteroid simulant and Earth-based soil – peat moss – which is a common commercial planting medium,” Russell said. “The simulant on its own is very fine. If you put water in it, it’ll just seep through.”
Fieber-Beyer said that when the replicated asteroid material first arrived, she put both of her hands in it. “It got all over; it’s the blackest soil I have ever seen, and it immediately sent a dust cloud into the air,” she said with a laugh.
After weeks of monitoring the soil concentrations, ranging from 100 percent peat moss to 100 percent simulant in 25-percent increments, Russell said that mediums with up to 25 percent of simulant performed well for plant growth.
“I’ve noticed that the approach would probably need significant modifications, if we were to use it on a mission,” Russell said.
Further analysis of the soil, taken on by another lab outside of UND, will show the nutrient content of the compositions, as well as how effectively those nutrients can be transferred from soil to plant.
Finding solutions to explore beyond Earth
Alas, the project’s status as a pilot study comes with limitations. UND currently only has access to two “microgravity simulators,” which keeps the project from developing statistically significant results. But with two other C-type asteroid simulants available for experimentation, Fieber-Beyer is confident in the potential to up the scale of the operation.
Russell, for his part, will be presenting the project’s initial results at the Lunar and Planetary Science Conference in March.
“Looking at the results we’ve had so far, I think it’s definitely something to look more into, especially with the other kinds of regolith simulants out there,” said Russell of what he’ll deliver to the scientific conference.
“We’d also like to look into how to perhaps modify the regolith to better support plants on its own merit, as well as extracting the present nutrients to create a hydroponic solution – an even more hands-off approach to growing plants.”
“Hands-off” is the general idea when Fieber-Beyer envisions a future where asteroid agriculture is a reality. Once humans establish a biodome, or terrarium, on the surface of a large asteroid, advanced robotics are expected to take over the operation from there, Fieber-Beyer said.
“There are companies today that envision robotics existing in space with the ability to self-replicate,” she continued. “So, ideally, people would get it started, but then robots would service it, so we’d have asteroids throughout space that are effectively self-sustaining farms.”
Asteroids range in size from Vesta — the largest at about 329 miles in diameter — to bodies that are less than 33 feet across, NASA reports.
Of course, farming on asteroids sounds like science-fiction to many, but that’s what’s so exciting about the work of planetary science, said Fieber-Beyer. Just as Professor Pablo de Leon is looking at using the materials found in space, on other worlds, for the next generation of spacesuits, Fieber-Beyer and the scientific community recognize the necessity to move beyond Earth in order to extend humanity’s presence in the solar system and beyond.
“What we’re doing now, we’ll see the fruits of that labor in our lifetime,” Fieber-Beyer said. “The ideas are fresh, and we get moving on them. If they work, they work. If they don’t, we move on. But we’re always able to see the impact of our research.” | <urn:uuid:6592ac6e-f04b-424a-b371-12c6a44c3873> | CC-MAIN-2024-10 | https://www.newswise.com/articles/farming-on-asteroids-science-future-not-science-fiction | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00358.warc.gz | en | 0.946558 | 1,580 | 3.609375 | 4 |
Exploring the Dock
Along one edge of your screen (the bottom, left, or right) is a colorful row of icons known as the Dock. The Dock, shown in its default state in Figure 3.1, acts as a taskbar to show open applications and minimized or reduced versions of a document window. It also offers quick access to favorite applications, shows feedback from open applications, and provides a resting place for the Trash.
Figure 3.1 The Dock is useful for organizing your desktop.
Here’s a fast overview of the Dock’s arrangement:
Left (or Top) portion—At left (or top) are icons for applications. The ones you’ve opened have a triangle under or next to them.
Right (or Bottom) portion—At right (or bottom) are document icons representing the documents you’ve reduced or minimized.
Trash—At the extreme right (or bottom) is the Trash, the place to drag files that you want to throw away.
Separator bar—The separator bar splits the Dock into the application and file/folder areas.
Applications and the Dock
The left (or top) portion of the Dock contains all docked and currently running applications.
To launch an application whose icon is in the Dock, just click its icon once, and your computer takes it from there. When you launch an application that isn’t in the Dock, its icon then appears in the Dock.
As the application launches, you’ll see the icon bounce. When opened, a small triangle appears with its icon to show that it is running—as you can see with the first icon on the left in Figure 3.1. When you quit or close the application, the triangle disappears. (For applications that haven’t been set to remain in the Dock, the icon also disappears from the Dock.)
To switch between active applications, just click the icon in the Dock that you want to become the active application. You can also switch between open applications by holding down Command-Tab. This moves you through active applications in the Dock in the order in which they appear. When you reach the item you want to bring to the front, release the keys to select it.
Adding and Removing Docked Applications
You can add applications to the left side (or top) of the Dock to create a quick launching point, no matter where the software is located on your hard drive. Dragging an application icon to the Dock adds it to that location in the Dock.
To make an open application a permanent member of the Dock, simply do the following:
Locate the application’s icon if it appears in the Dock. (If it’s not in the Dock, the application isn’t open!)
Click and hold on the icon to pop up a menu, as shown in Figure 3.2.
Choose the option Keep in Dock. (If the application already has a place in the Dock, you won’t be given this option.)
After you’ve placed an application on the Dock, you can launch it by single-clicking the icon.
To remove an application’s icon from the Dock, make sure that the application isn’t running and drag it out of the Dock. It disappears in a puff of smoke (try it and see).
Figure 3.2 Click and hold on an application’s icon in the dock.
Getting Information from the Dock
In addition to providing easy access to commonly used applications, the Dock also gives you feedback about the functioning of applications through their icons.
The icon of an application that’s opening bounces in the Dock (unless configured not to) and continues bouncing until the software is ready. Also, if an open application needs to get your attention, its icon bounces intermittently until you interact with it.
The Dock also signals which applications are running by displaying a small triangle, or arrow, with their application icons. This is a good way to see which applications are open, even if you’ve hidden them or closed all their windows.
In addition to telling you which applications are open, Dock icons can also give you a convenient way to close applications. Simply click and hold the icon of an open application and choose Quit from the menu that appears.
Dock icons also offer quick access to documents open in an application. For example, when you have multiple Finder windows open, you can view a list of those windows by clicking and holding on the Finder icon in the Dock. From the list, as shown in Figure 3.3, you can easily choose the one you want.
Figure 3.3 Click and hold on the Dock icon of an open application for a list of open windows.
Some applications even have customized Dock’s icons to display information about events occurring in the application itself. For example, the Mail program displays the number of unread email messages in a red seal that appears in the icon in the Dock, as shown in Figure 3.4. (Mail is covered in detail in Chapter 17, "Using Mail.")
Figure 3.4 View the Number of Unread Messages on Your Mail Icon in the Dock. | <urn:uuid:9549ed00-acbe-4bdc-93c2-9a3b13cc20f5> | CC-MAIN-2024-10 | https://www.informit.com/articles/article.aspx?p=390812&seqNum=3 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476413.82/warc/CC-MAIN-20240304033910-20240304063910-00358.warc.gz | en | 0.931457 | 1,074 | 3.140625 | 3 |
Aviation of World War II
Heavy Night Fighter
Immediately after its introduction in 1942, the Ju-88C-6 proved to be very effective as a night fighter. It was the first aircraft of this type, designed during the development of the Ju-88C heavy fighter.
Nevertheless, initially this aircraft did not receive a proper assessment, since the installation of additional equipment inevitably led to an increase in the weight of the machine and a deterioration in its aerodynamic qualities, and, as a result, to a decrease in speed.
All this led to the appearance in the spring of 1943 of the year and the prototype of the next, significantly improved model of the Jg-88V58 night fighter (Ju-88G V1). The prototype Ju 88V58 (GI+BV, W.Nr. 700001) was flown on 24 June 1943. BMW 801D engines with a capacity of 1250 kW / 1700 hp were installed on the aircraft. This prototype was created by altering the standard Ju-88R bomber with the installation of a Ju-188 tail unit on it.
The aircraft's exhaust pipes were placed differently and the cockpit armor was reinforced. The armament consisted of as many as six MG 151/20 guns with 200 rounds of ammunition per barrel. These guns were located in the ventral gondola and in the forward fuselage. A machine gun MG 131 was mounted in the rear installation. Instead of a permanent antenna, a retractable mast was used, the FuBl 2 antenna was replaced with FuG 25 (whip antenna) and FuG 16ZY (loop antenna). The FuG 101 altimeter antenna was located under the left wing. In addition to everything listed above, the FuG 212 radar was installed on the aircraft.
Junkers 88G-1. At the end of 1943, the first Ju 88G-1 aircraft rolled off the assembly line, which was completely similar to the Ju 88V58, but was equipped with a FuG 220 radar instead of the FuG 212. On Ju 88G aircraft -1 of the first releases put exhaust fairings. On late production aircraft, the exhaust system was redesigned. On the plane, the aileron area was increased and a Kuto Nase balloon cable cutter was installed. The aircraft was equipped with a modernized set of radio and navigation equipment. The placement of crew members in the cockpit has changed. On some aircraft, a GM 1 pressurization system was installed. The standard armament of the aircraft was four MG 151/20 caliber 20 mm, placed in the ventral gondola. On some fighters, immediately behind the cockpit, Schrage Musik was installed. ETC 500 bomb racks could hang drop fuel tanks. At the end of the war, Ju 88G fighters began to play the role of night bombers.
On July 27, 1943, comparative tests of the Ju 88G-1 with the new He 219 Uhu night fighter were carried out.
On 13 July 1944, a Ju 88 G-1 (4R+UR) of 7./NJG 2 landed by mistake at the airfield at Woodbridge, Essex. The latest radars fell into the hands of the Allies: FuG 220 Lichtenstein SN-2 and FuG 227 Flensburg. Having studied the equipment, the British removed the Monica radar from their aircraft.
In later Ju 88G-Is, a Morane antenna (FuG 16ZY) was installed in place of the removed MG 151/20 cannon. The Ju 88G-1 aircraft did not have a lower installation, the radar antennas were given a streamlined shape. The exhaust pipe opened at the base of the engine nacelle. The aircraft used VDM metal propellers.
Junkers 88G-6. The Ju 88G-6 aircraft were powered by 1286 kW/1750 hp Jumo 213 engines. with wooden screws VS-111. The compressor air intake was located on the right side, the engine cooling system was upgraded. Exhaust pipes received flame arresters.
Ju 88G-6 was 40 km/h faster than Ju 88G-1. Like the Ju 88G-1. the aircraft had two ETC 500 bomb racks under the wings. The FuG 16ZY radio station was located in the fuselage, the FuG 217 rear hemisphere surveillance radar antenna was located under the left wing. The Ju 88G-6 aircraft were armed with "Schrage musik" - MG 151/20 cannons. The guns were located asymmetrically, on the left (on early aircraft) or on the right (on later aircraft). The ammunition capacity of the MG 15I / 20 guns in the ventral gondola was increased from 200 to 500 rounds per barrel. MG 131 was placed in the rear device. In addition to the FuG 220 SN-2 radar, new types of radars were installed on the aircraft: FuG 218 Neptun, FuG 350 Naxos Z and, at the end of the war, FuG 240 Berlin.
It is worth talking more about these radars. The most modern of these was the FuG 240 Berlin N-la. They managed to release only 25-30 copies. Instead of the usual whip antenna, this radar was equipped with a parabolic antenna. The antenna was covered with a plywood and plexiglass fairing. The range of the radar is 500-5000 meters. The next type of radar was the FuG 218 VR Neptun. They began to equip German aircraft from the end of 1944. The radar worked in the range of 158-187 MHz, the range was 110-5000 meters. The antenna was mounted on a single bracket, on the "X" frame (Hirschgeweich - deer antlers), the rear hemisphere radar antenna was attached to the elevator.
FuG 350 Naxos Radar. like the FuG 227 Flensburg, it served to detect British H2S radars. Naxos was installed on the cockpit frame under the fairing or it was carried out in one block with the FuG 220.
Another modern type of radar used on the Ju 88G-6 was the FuG 220 SN-2. The radar operated in two bands: 84-82 MHz (I, II and III frequencies) and 91-116 MHz (IV, V, VI and VII frequencies). The radar range was over 10 km, but it was also effective at short distances. Two types of antennas were used: "herringbone" and "star" (Morgenstern). The "star" antenna was covered by a fairing if this antenna was interlocked with the FuG 350 Naxos antenna. The fairing was made of plywood, and the top of the fairing was made of Plexiglas.
Junkers 88G-7. The aircraft of this modification were equipped with Jumo 213E engines equipped with an MW 50 boost system (a water-methanol mixture was used) and four-bladed wooden propellers. The wingspan was increased to 21,935 meters by installing internal wing segments from the Ju 188. The armament remained the same as that of the Ju 88G-6. The radio equipment consisted of a FuG 220 SN-2 radar with a Morgenstern antenna or a FuG 240 Berlin radar. Crew of three or four. The aircraft was not mass-produced, a prototype Ju 88V112 (W.Nr. 621045), a prototype Ju 88V113 (W.Nr621044) equipped with GM1 and two more prototypes VI14 and VI15 were manufactured. The first two prototypes were destroyed during an Allied air raid. The Ju 88G-7 aircraft received the unofficial name Mosquitojaeger ("Mosquito hunter").
Junkers 88G-10. This was a version of the Ju 88G-6 with extra fuel tanks. The fuselage was lengthened by 2235 mm.
In the spring of 1945, a small series of these aircraft were built and used as part of the Mistel design.
In total, over 2800 Ju-88G night fighters were manufactured in the Ju-88G-1, G-4, G-6 and G 7 variants, each of which had two or three more sub-variants with different weapons and different types of radars. These vehicles entered service starting in the summer of 1944.
Ju 88G Night fighter, new fuselage with A-series' ventral Bola (Bodenlafette) gondola omitted, tail section from Ju 188, aerodynamically improved conformal gun pod for a quartet of forward-firing 20 mm calibre, MG 151/20 autocannons below the former bomb bay.
Ju 88 G-1 BMW 801 radial engines with 1700 PS, FuG 220 Lichtenstein SN-2 radar
Ju 88 G-6 Junkers Jumo 213A inverted V12 engines with 1750 PS, used either FuG 220 Lichtenstein SN-2 90 MHz or FuG 218 Neptun 158/187 MHz frequency radar, either with the usual Hirschgeweih eight-dipole aerial setup or experimentally with the more aerodynamic Morgernstern tripled crossed-dipole aerials. Some very-late-war aircraft equipped with experimental FuG 240 Berlin cavity magnetron based 3 GHz radar, with dish antenna in bulbous solid nose. Optional with Schräge Musik upward firing guns with two 20 mm or 30 mm guns.
Ju 88 G-7 Identical to G-6, but with Jumo 213E high-altitude engines, planned for use with FuG 218/220 with Morgenstern array or FuG 240. The G-7 was also to be installed with wings from the Junkers Ju 188.
Ju 88G-3, 4 and 8 not produced.
Marine Long-Range Reconnaissance Aircraft
At the beginning of 1943, at the request of the leadership of the Kriegsmarine, the Junkers company, with the involvement of SNCASO units in Chatillon, began developing an ultra-long version of the "eighty-eighth", intended for operations over the expanses of the Atlantic. The machine was worked out in two versions: a bomber and a reconnaissance aircraft. The maximum range of the Ju88H-1 reconnaissance modification was supposed to be 4800 km and provide the possibility of a 12-hour flight at a cruising speed of more than 400 km / h, and the SC 500 four-bomb bomber was supposed to be able to hit enemy targets at a distance of 1600 km from the coast of France . However, the bomber version was soon abandoned in favor of an ultra-long-range "destroyer" aircraft, designated Ju 88N-2. Such a machine was supposed to be armed with four MG 151/20 guns in the ventral compartment.
The H-1 prototype (manufacturer No. 430820) made its first flight on November 2, 1943. By the end of the year, the second prototype and two serial machines were built. The wing of the aircraft with BMW 80ID engines was borrowed from the Ju88G-l heavy fighter. The fuel supply in the wing tanks was 1677 liters. Two additional sections were built into the fuselage from the Ju 88D-l: in front of the wing with a length of 1 m and behind the wing with a length of 2.3 m, as a result, the length of the machine increased to 17.65 m. The aircraft was equipped with three cameras, and some machines were also equipped with a FuG radar 200 Hohentwil. In March 1944, Detachment 3(F)/123 had five Ju88H-l and three in reserve. The first sortie of the H-1 (airborne 4U + AL) was made on May 3, 1944, covering 3000 km along the coast of France and Spain, and then flying to Ireland in just 8 hours. On July 31, 1944, one of the ultra-long-range scouts did not return from a combat mission.
As for the "destroyer" H-2, only one prototype was built. Additional sections in the fuselage from the Ju 88S made it possible to install three tanks with a capacity of 1215 liters and one -1045 liters. With two suspended 900-liter tanks, the maximum fuel volume increased to 6460 liters, and the take-off weight to 15,300 kg, which ensured a technical range of 5120 km.
There were projects for the H-3 (H-1 with an even longer fuselage) and H-4 (ultra-long-range reconnaissance-target designator with the FW 190A fighter designed to protect the carrier). Both projects remained only on paper.
Ju 88H Long-range photo-reconnaissance, fighter variants, based on the stretched Ju 88G-series fuselage.
Ju 88 H-1 Long-range maritime reconnaissance variant, equipped with a FuG 200 Hohentwiel radar and a trio of remotely controlled cameras in the aft fuselage.
Ju 88 H-2 Fighter variant intended to attack Allied long range convoy escort aircraft armed with six Forward firing MG 151/20.
Ju 88 H-3 Ultra-long-range maritime reconnaissance variant similar to H-1.
Ju 88 H-4 Destroyer variant.
Ju 88P Anti-tank and bomber destroyer variant with single Bordkanone series 75 mm (2.95 in), 50 mm (1.97 in), or twin 37 mm (1.46 in) calibre cannon in conformal ventral fuselage gun pod mount, which mandated removal of the Bola gondola under the cockpit section, conversion of A-series bomber. Produced in small series only, they were perceived as a failure for both anti-tank and anti-bomber use.
Ju 88 P-1 Heavy-gun variant fitted with single 75 mm (2.95 in) Bordkanone BK 7,5 cannon in ventral gun pod. Appeared in mid-1942 in small numbers.
Ju 88 P-2 Heavy-gun variant with twin 37 mm (1.46 in) Bordkanone BK 37 cannon in ventral gun pod.
Ju 88 P-3 Heavy-gun variant with twin 37 mm (1.46 in) Bordkanone BK 37 cannon in ventral gun pod, and additional armor.
Ju 88 P-4 Heavy-gun variant with single 50 mm (1.97 in) Bordkanone BK 5 cannon in ventral gun pod. There were 32 built.
Ju 88 P-5 Proposed heavy-gun variant with single 88 mm, none known to have ever been built.
Ju 88R C-series night fighters with BMW 801 engines.
Ju 88S High-speed bomber series based on Ju 88 A-4 but with ventral Bola gondola omitted, smoothly glazed nose with radial-ribbed supports instead of the "beetle's eye" of the A-version, and GM-1 nitrous-oxide boost, fastest of all variants.
Ju 88 S-0 Fitted with two BMW 801 G-2 engines, single 13 mm (.51 in) dorsal gun and 14 SD65 (65 kg/143 lb) bombs.
Ju 88 S-1 Fitted with two BMW 801 G-2 engines, the GM-1 boost system and could carry two SD1000 1,000 kg (2,200 lb) bombs externally.
Ju 88 S-2 Fitted with two turbocharged BMW 801J engines, wooden bomb bay extension as used on the Ju 88 A-15.
Ju 88 S-3 Fitted with two 1,671 kW (2,240 hp) Jumo 213A engines and GM-1 boost system.
Ju 88T Three-seat photo-reconnaissance version of S-series.
Ju 88 T-1 Based on the Ju 88 S-1 but with bomb bays fitted for extra fuel or GM-1 tanks.
Ju 88 T-3 Based on the Ju 88 S-3. | <urn:uuid:732d1b9b-8e92-4379-a535-a32a4960c99c> | CC-MAIN-2024-10 | http://airpages.ru/eng/lw/ju88g.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00358.warc.gz | en | 0.954144 | 3,368 | 3.046875 | 3 |
The Sulina Channel has provided Ukraine with an alternative trade route for its grain after Russia withdrew from the Black Sea grain deal.
- Russia, targeted ports and grain storage facilities along the Danube River in Ukraine in overnight drone strikes on August 16, 2023.
- Russia also withdrew from the Black Sea grain deal in July 2023.
- Amidst this, the Danube Delta has provided Ukraine with an alternative passage in the form of the Sulina Channel to help secure its grain requirements.
- Location Southeastern part of Romania.
- Length: approximately 64 km long.
- It connects the Danube River, with the Black Sea. (Loss of the ‘Moskva’ & Black Sea)
- It provides a direct route for maritime transportation
- The construction of the Sulina Channel dates back to the 19th century.
- It was developed to improve the navigation of large ships and vessels in and out of the Danube Delta. | <urn:uuid:dc6736d7-1015-4620-908d-32169135d3e7> | CC-MAIN-2024-10 | https://crackittoday.com/current-affairs/sulina-channel/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00358.warc.gz | en | 0.921754 | 199 | 2.78125 | 3 |
If you’re looking for a foreign language to learn, you can’t go wrong with German. The Goethe Institute is a highly respected institution that promotes the study of the German language and culture around the world. They offer a wide range of resources for learners of all levels, from beginners to advanced. Here are the reasons why you should consider learning German with the Goethe Institute.
German: The Language of Opportunity
There are many reasons why German can be beneficial to your work and private life. For one, German can help improve the quality of your work by giving you a better understanding of other cultures. Additionally, learning German can help you find new job opportunities and make traveling easier and more enjoyable. Overall, learning German can be a fun and rewarding experience that can benefit you in many ways.
Improve communication with German business partners
To be successful when doing business with German partners, it is important to learn and understand their language. This will help to improve communication and ensure that all parties involved are on the same page. By taking the time to learn some basic German phrases, you can make a good impression and potentially increase your chances for success.
German Language Skills Offer Numerous Job Opportunities
German language skills are becoming increasingly important in the global marketplace. With German and foreign companies doing business in all corners of the world, the ability to speak and write fluently in German can give individuals a competitive edge in the job market. German proficiency can also help employees to function more effectively in an international work environment. In a global economy, fluency in multiple languages is an increasingly valuable skill.
The Benefits of Focusing on German-Speaking Tourists
The tourism and hospitality industry should focus on German-speaking countries as they are the world’s biggest spenders when on holiday. German-speaking tourists appreciate being looked after by staff and tour guides who speak their language. This means that businesses in this sector should make a special effort to cater to German tourists, by ensuring that their staff can communicate in German, and by promoting destinations and attractions that are popular among Germans. By doing this, the industry can ensure that it captures a significant share of the lucrative German tourist market.
German Scientific Language Second Most Common
German is the second most commonly used scientific language, after English. This is because Germany is a leading country in terms of research and development. In addition, Germany offers research fellowships to scientists from abroad, which encourages international cooperation in the field of science.
The Key to Multilingual Communication
Germany is a leading country in terms of new book publications. This means that there is a wealth of information available in German that is not available in other languages. With advancements in media, information, and communication technology, it has become increasingly important to be able to communicate in multiple languages. Knowledge of German, therefore, offers you extended access to information and opportunities for multilingual communication.
A Gateway to Understanding German Culture
Learning a foreign language can provide many benefits to the learner. One of these benefits is that it can give the learner insight into the way of life, hopes, and dreams of people in the foreign country where the language is spoken. This can broaden the learner’s horizons and give them a better understanding of other cultures. Learning German, for example, can provide insight into the culture and lifestyle of Germans, Austrians, and Swiss people. By learning about German culture, the learner can gain a deeper understanding of the people who speak this language and learn more about their values and traditions.
The Key to European Travel
When traveling, take advantage of the fact that German is widely spoken in many European countries, especially Eastern Europe. This will allow you to not only get by in German-speaking countries but also be able to communicate with a wider range of people. Learning some key phrases before you go can make a big difference in your travels.
A Language of Genius
German is a fascinating language with a long and rich history. It is the language of some of the world’s most renowned authors, musicians, and philosophers, including Goethe, Kafka, Mozart, Bach, and Beethoven. Learning German will allow you to read and appreciate their works in the original language.
A Place to Study and Work
Germany is a great place to study and work. There are many opportunities for scholarships and other forms of support. Young foreigners can avail of working holiday visas, while skilled workers and professionals can apply for special visas. There are many possibilities for those who want to experience Germany’s culture and economy.
Student Exchange between Germany and the World
Student exchange programs are a great way to learn about other cultures and make new friends. You can participate in a student exchange program between Germany and the United States, and it was an amazing experience. You make some great friends from all over the world, and learn a lot about different cultures. Its great participating in this program if you have the opportunity!
Why Goethe-Institut is the best choice for learning German
The Goethe-Institut is highly recommended for those looking to learn German while also experiencing the culture deeply. The courses are of high quality and the learning atmosphere is great, making it the perfect choice for anyone interested in German culture. Even those who are only looking to learn the language without the cultural aspect would still be best suited to Goethe-Institut due to its great courses and atmosphere.
The Best German Course for Students Who Want a Lot of Tutoring
The Goethe Institut is highly customizable and offers personalized support from a real instructor, making it the best online German course for students who want a lot of tutoring. The program is ideal for both beginners and advanced learners and offers an immersive learning experience that allows students to completely immerse themselves in the German language and culture.
The Goethe Institute offers many resources to help you learn German online, including grammar exercises, listening comprehension exercises, and even German conversation partners. They also have a blog that covers various topics related to German culture and language learning. If you’re looking for an online resource to help you learn German, the Goethe Institute is a great option. | <urn:uuid:e746950e-7a80-4c4f-a029-2990c1c36f0e> | CC-MAIN-2024-10 | https://mylanguagebreak.com/learn-german-goethe-institute/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00358.warc.gz | en | 0.952573 | 1,257 | 2.65625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.