text
stringlengths
1.59k
23.8k
id
stringlengths
47
47
dump
stringclasses
8 values
url
stringlengths
15
3.15k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
5.34
int_score
int64
3
5
Mar 25, 2020 A Scientific approach to Vedic astrology and Sanathana Dharma Samskara! Latest from the Blog. The 2020 roller-coaster ride: Jupiter and Saturn in Tropical Capricorn. According to the Best Vedic astrologer in india, Aditya Shastri Vedic Astrology is an ancient Indian science which explains planetary motions and positions with respect to time and their effect on humans and other entities on earth.Vedic astrology can be traced thousands of years back. Early Vedic astrology was only based on the movement of planets with respect to stars, but later on it. WHAT; ABOUT ASTROLOGY. The Technique of Astrology; The Astrology of Psychology; Horary Astrology; Incredible but True Case Studies; Is Astrology Scientific? HOW AND WHY ASTROLOGY WORKS; VEDIC ASTROLOGY. Introduction to Vedic Astrology. ANCIENT VEDIC SECRETS OF MANTRA AND VIBRATIONAL HEALING; The Nakshatras; Studies in Vedic Astrology. These include Hindu astrology (also known as 'Indian astrology' and in modern times referred to as 'Vedic astrology') and Chinese astrology, both of which have influenced the world's cultural history. Western astrology is a form of divination based on the construction of a horoscope for an exact moment, such as a person's birth. Vedic astrology, Indian astrology and Hindu astrology are the synonym terms for each others. It is solving life's mystery from very ancient time. Vedic astrology can predict about any sphere of your life on the basis of the position of planet in your birth chart. Vedic astrology is the most powerful, stable and scientific astrological system the world has ever seen. It has endured in its original form for thousands of years – just like Yoga and Ayurveda – two of India’s sister sciences. Inseparable from that stability and timeless endurance is the sidereal zodiac, the mapping system used in Vedic astrology, which integrates 12 solar portions with 27 lunar portions, as they (according to Parashara and other Vedic scholars) “occupy the same space”. A Quick History Lessonon Zodiacs The earliest record of the 12, 30° signs is from the Babylonian Empire, from about the fifth century BC, written on their cuneiform tablets. The original zodiac was sidereal, connecting precise ecliptic coordinates to 30° portions. Later, these sidereal 30° portions found their way to Greece, then later to Egypt. At that time, all zodiacs were sidereal. The tropical zodiac did not exist until Claudius Ptolemy proposed to pin them to seasons, by declaring the 1st degree of Aries should be pinned to the vernal equinox around the first century CE. As we now know, the distance between the original sidereal zodiac from Babylon (still used by the Indians) and the tropical zodiac from the Greeks, has now drifted by about 24°. This is because the seasons on earth (measured by the vernal equinox) have nothing to do with the precise, ecliptic coordinates used to measure objects circling the earth. These 2 zodiacs will continue to drift apart by about 1° every 70 years for eternity. Indian Astrology Is Sidereal By contrast the sidereal zodiac, which relies on precise degrees, is the same as it was thousands of years ago. This was a time when Magha was at 0° Leo, showing the “king on the throne” in the sign of Leo, rather than having drifted into Virgo as it has if we use a seasonal / tropical calculation. The Nakshatra of Pushya (the breasts) is still squarely in Cancer, the sign of motherhood, rather than having drifted into Leo, etc. By the way, the Greeks also were very interested in the stars in their ancient texts. Ptolemy has an entire chapter on fixed stars, placing them squarely in sidereal signs. But the stellar tradition in western astrology sadly has been abandoned, probably because their zodiac no longer aligns with the stars. Unlike in India, where the stars are an integral part of the zodiac. In every Vedic astrology text proper, sidereal signs and Nakshatra’s are integrated. Varahamihira states Ashwini (Nakshtra), Aries (Rasi) and the Nakshatra padas are aligned, for example. Parashara declares that the rasis and Nakshtras “occupy the same space”. There are numerous structures in Vedic astrology, like gandantha (rasis and nakshtras both ending where water and fire signs intersect) that make it clear that India settled on the sidereal zodiac to erect astrology charts. No one disputes this, not even those few Vedic astrologers / students who are using the “tropical zodiac” in Vedic astrology in modern times. When we look into some of the texts (after the Greeks pinned the seasons to the zodiac), references to what would become “the tropical zodiac” show up in “astronomy texts” and also in some of India’s secular/non-astrological writings. Vedic astrology zodiac signs. In these instances we see the equinoxes and solstices joined to “astrology signs”, rather than measured sidereally, as we would expect. This has confused some, for good reason. In fact it is so confusing that some have now decided that Vedic astrology should be practiced using the “tropical” zodiac and that the Indians made a mistake by using the Sidereal Zodiac. This is curious to say the least. To me it is like a remedy looking for a sickness that does not exist. What exactly is the problem with Vedic astrology again? What malady does the “tropical zodiac” fix? Regardless, in these “Greek influenced” texts, the Sun is described in relationship to the seasons and other purely “earthbound” events, the length of the year, etc. But there are no astrological methods or techniques in those books. They are not astrology books. So, we should not make hard conclusions about how to “practice astrology” based on these writings, except to take notice that the influence of the Greeks made its way to India at that time. We can see that, in spite of the references to tropical zodiac in astronomical and secular texts, the wise Indian astrologers never conflated the seasonal / tropical zodiac of the Greeks with the accurate sidereal zodiac. So again, the original zodiac of 12, 30° Signs was first seen in Babylon, then was exported to Greece, then migrated to Egypt, then was joined with the seasons (creating what we now call the Tropical zodiac), eventually making it to India, where it was rejected for erecting horoscopes. Why Did the Indians Resist? So, why did the Indians resist using what we now call the “tropical” zodiac? Well, we may never know exactly, but it seems pretty simple. The Indians never used the tropical zodiac. It did not exist until the Greeks and why would it? The Indians already had an extremely precise, sidereal mapping system that had been in place for thousands of years by the time the tropical zodiac showed up. In the ancient (Rig and Yajur) Vedanga Jyotisha, we see the ancient Indians were great astronomers, having calculated the year very precisely, and even measuring out 30° portions of the year (Sidereally). They also measured “five-year cycles”, which were meant to compensate for a sort of “leap year”. Like all ancient cultures of that time, the first “zodiac” is more of a calendar, not used erecting horoscopes or for practicing astrology. That would come later, as the zodiac signs and Nakshatra indicators would eventually be formalized into a chart reading system. This system would revolve around the sidereal portions of sky they were already using. Every calculation in the Vedanga Jyotisha was sidereal. Solstices were measured with Nakshatra’s, which are sidereal. The length of their five-year cycle was measured in Nakshatra’s, 135 Nakshatra’s to be precise. Seasons were measured to be 4.5 Nakshatra’s. There are no zodiac signs mentioned and no evidence whatsoever that the Indians used what would be considered a “tropical zodiac”. Every historian and researcher for thousands of years has come to these same conclusions. There is no mystery here. Tropical Zodiac a Mistake? The tropical zodiac did not exist until after the 1st century AD. To many throughout history, the tropical zodiac itself is considered to be an irrational juxtaposition of things that should never have been put together. Here’s why. An “astrological Zodiac”, used for erecting astrology charts, is a structure that allows us to find a planet in a precise location with exact degrees and micro-degrees. These precise coordinates map the celestial movements of planets as they (apparently) circle the earth. Exact degrees matter with the zodiac. But how are those degrees being calculated? Personally, I do not think the tropical zodiac was a “mistake” for erecting astrology charts. But I see how it very misunderstood thousands of years later. The earth going around the sun / equinoxes / solstices inherently have nothing to do with the band of celestial coordinates that we use to measure planets moving through the sky. The tropical zodiac connects these two things that are not at all connected to each other. Just think about it. If you are trying to find the exact coordinates of a planet circling the earth, what is the most reliable way to find it? By taking your place on earth, which is slightly moving over centuries, and projecting that into space (Tropical) – or by measuring it against a precise coordinate that is fixed and unmoving (Sidereal). This is why the Egyptologist and Western astrologer Cyril Fagan, in the 1940s, completely rejected “tropical” Western astrology, after he realized the nature of the tropical zodiac. Fagan thought it was not a legitimate way to erect horoscopes. This tradition continues today, with thousands of sidereal Western astrologers who have returned to the original zodiac. This original zodiac also connects to the sky as it was when the original western astrology texts were written! Union of the Sun and Moon in One Connected Zodiac Indeed, this rigorous sidereal zodiac system of Rasi and Nakshatra, that underpins Vedic astrology, is the envy of astrological systems the world over. The Indians always used the exact, sidereal coordinates from the Vedanga Jyotisha with Nakshatra’s, then later (and currently) interlaced them with the sidereal zodiac sign portions. With remarkable precision (and probably a sharing of sciences and culture), the 12, 30° divisions of the original Babylonian sidereal zodiac overlaid almost perfectly with the 27 sidereal, Indian portions. Thus, after the Greeks converted the sidereal zodiac to the moving, tropical zodiac by pinning the 1st° of Aries to the vernal equinox, the Indians resisted. This is not an opinion. This is the story. And again, what was the result? The result is the most stable, scientific astrological system the world has ever seen. In fact, it is so stable and solid that even the discovery of new planets and other emergent celestial bodies are not necessary to improve it. Indeed, the Indians obviously knew exactly what they were doing. They were following the accuracy of already established traditions. This is not surprising, as the Indians developed many spiritual sciences that work hand-in-hand with each other. Vedic astrology, and especially its connection to the Cosmology of the sky and usage of the sidereal zodiac, are even further proof of their timeless genius. They were wise enough to resist the conflation of the Greeks, who connected the seasons with the sidereal portions of sky. In resisting this, the Indians preserved the Sun and Moon portions as one integrated system. Is Tropical Zodiac Wrong For Practicing Astrology? The tropical zodiac was conceived at the same time that both the Vedic and Western astrology systems were being developed. Thus, both systems can work for erecting horoscopes. Especially for Western astrologers and that tradition, tropical zodiac works very well. You can see it in their methods, which have changed and developed with the discovery of new planets, asteroids, fluid sign rulership, etc. But even if you are a Vedic astrologer who resonates more with the Tropical Zodiac, and you use it in your practice, I personally will champion your choice and right to do so. This is because each “zodiac” is the organizing principle around which all “methods” work. So, if Vedic astrologers use the tropical zodiac or Western astrologers use the sidereal zodiac or astrologers use the zodiac of their tradition, I am for it all. Our heart and nervous system must first connect with a zodiac, either sidereal or tropical before any astrology practice can take hold. This is why people get so passionate about their zodiac. After our heart connects to one zodiac we gravitate to practices and methodologies (usually with in the tradition of the system itself) in order to go deeper and interpret astrology charts correctly. I think all of that is beautiful and I would never attack a person’s system. As I said, both systems developed at the same time that the tropical zodiac was conceived in Egypt. This led to tropical western astrology and the Vedic astrology practice that was galvanized around the sidereal zodiac and the precise scientific astrology of India. Quick Zodiac Timeline ~ Pre 10th Century BC – 12, 30° solar portions are referred to in Vedanga Jyotisha in India – All celestial portions and events are measured Sidereally. (with nakshatras). ~ 10th Century BC – Babylonians create the Mul.Apin – with several ways to measure the sky, ALL Sidereal ~ 5th Century BC – 12, Equal 30° Sidereal signs (named Aries, Taurus, etc. in their current from) appear from the Babylonian Empire. ~ 2nd Century BC – These sidereal 30° portions find their way to Greece, where Greek astronomer Hipparchus begun mapping stars and eventually discovers the precession of the equinoxes formally. ~ 1st Century CE – Claudius Ptolemy publishes Tetra Biblos which pins the existent Sidereal Zodiacs of Greece and Egypt to the Vernal equinox. This creates the “Tropical Zodiac”, which no longer measures astronomical movements based on precise, Sidereal coordinates, but instead projects the seasonal zodiac into space in order to calculate planetary positions. ~ 2nd Century – 5th Century CE – This newly found “Tropical Zodiac” finds its way into Indian texts, mostly non astrological in nature. The most notable is the Surya Siddhanta which describes the zodiac Tropically (measured by “Signs” not Nakshatras as previously done) in reference to the Solstices. ~ Tropical / Sidereal in Vedic Astrology Texts – In spite of seeing the Tropical zodiac entering India after the Greeks pinned the Sidereal portions to the seasons, the Indians did not adapt this new tropical zodiac to their astrological practice. This is clear and not confusing at all, considering the Indians always used sidereal coordinates AND the original Babylonian sidereal signs fit almost perfectly with their 27 fold lunar zodiac. Many, if not most scholars theorize that the sidereal zodiac was “co-developed” between the Babylonians and Indians due to the obvious sharing of technologies between the 2 cultures. It was also (obviously) the right move, as the Indians created the most stable and powerful astrological system the world has ever seen. Tropical and Sidereal Zodiacs Today – As we now know, the distance between the original, precise sidereal zodiac from Babylon and used by the Indians to this day, and the extrapolated tropical zodiac from the Greeks, that pinned the vernal equinox to the first degree of Aries, has now drifted by about 24°. It will continue to drift about 1° every 70 years for eternity.
<urn:uuid:ef217477-ac47-4141-bbd4-ce1781ac48f9>
CC-MAIN-2021-43
https://viosofas.info/vedic-scientific-astrology-1634/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585405.74/warc/CC-MAIN-20211021102435-20211021132435-00109.warc.gz
en
0.958362
3,585
2.546875
3
Clear and Present Danger by Camille Wilson The 2018 Camp fire in California and the lives it touched will not soon be forgotten. Largely driven by extreme weather conditions—high winds and low humidity on drought-parched fuels—this monster fire consumed 153,000 acres, destroyed more than 14,000 residential structures and took at least 85 civilian lives. Beyond that, it offered another proof point toward a conclusion most fire professionals have drawn in recent years: record-breaking fires are the new normal. In Boulder County, Forest Service records show few fires between 1920 and 1988. However, in the last 30 years, fires—including Black Tiger, Olde Stage, Fourmile Canyon, Cold Springs and others—have destroyed more than 260 homes, burned more than 16,000 acres and threatened thousands of Boulder County residents’ lives and property. As unprecedented fires challenge the abilities and resources of agencies that fight them, many residents—especially those who don’t live in the mountains—still don’t acknowledge the threat to their homes from wildfire and don’t know the steps they should take to reduce their risk of loss. Changes in Fire Frequency and Behavior Across the West, fire suppression, forest management and climate changes have led to conditions that are more conducive to extreme fire behavior, according to Chris Wanner, forest ecology supervisor for the City of Boulder Open Space and Mountain Parks. Most of Boulder County, particularly the land immediately west of Boulder, lies in an ecosystem dominated by low-elevation ponderosa pine forest that historically burned as often as every 15 to 30 years, he explains. These regular fires cleared the forest floor of fuels (pine needles, dead grasses, etc.) and killed most new small trees. Larger ponderosa pine trees have thick bark and self-prune their branches, so fires would burn at a low intensity and stay on the ground, leaving forests open with 20-25 large trees per acre. For the past 100-plus years, foresters had a policy of aggressive fire suppression, putting out most natural or human-caused wildland fires. “As we’ve suppressed fire, forest densities have changed dramatically. We now have areas in the county with 1,000-plus trees per acre,” Wanner says. “When the forest does burn, it can often be at a much higher intensity…spread very quickly, and can be very difficult to control.” Further contributing to the severity and complexity of wildfires is Boulder County’s growing population—census data shows an 8% increase during the last census interval, compared to 1.7% statewide 0.7% nationally—and a lengthening fire danger season thanks to climate change. Brian Oliver, wildland fires division chief with the City of Boulder Fire-Rescue, agrees that there are several factors at play. While he and many of his colleagues stop short of pointing to climate change as a primary cause, he says multiple studies and statistics do show clear patterns that things are getting worse. Specifically, the Boulder County Climate Change Preparedness Plan, a comprehensive document developed for the Sustainability Office, signals weather changes and an increased size of future fires. All 16 climate models used in the 2013 plan indicate rising temperatures, some more than others, with a median predicted increase of 2.7 degrees Fahrenheit by 2030 and 4.8 degrees by 2050. The 2018 plan uses the well-respected Keetch-Byram Drought Index paired with historic fire data to estimate an increase of 38 to 48% in total fire burn areas between 2020 and 2050. “For those of us in the fire world, the cards are stacked against us,” says fire management officer Seth McKinney of the Boulder County Sheriff’s Office. Risks Not Just for Mountains McKinney says a recipe for red flag fire warnings from the National Weather Service includes drought conditions and low humidity for several days with a forecast of high wind. He compares these conditions to the Santa Ana winds in his home state of California acting like a hot electric blow-dryer being pointed at the hills, and says it sets up the highest potential for catastrophic fire. Jamie Carpenter, wildland fire operations specialist with Boulder Fire-Rescue, says a fire threatening homes in Boulder is not a matter of if, but when, and warns the entire west side of Boulder is at an especially high risk for fire. The leading cause of home ignition is from an ember rather than the flaming front in a large fire, and embers could land on homes if timber burns in the foothills above Chautauqua or Shanahan Ridge, for example. Carpenter says his team has robust plans for protecting west Boulder should one of these scenarios occur, but fire and embers are unpredictable. “Just one ember coming in could cause more and then snowball,” he says. “We hope people will change their perspective if they think wildfire isn’t their concern just because they’re a few blocks removed from the hills.” In changing conditions, there is no guarantee any town is safe from a large fire, though risks are quite low in some areas, says Oliver. The Camp Fire in California burned uphill through timber and chaparral, but Boulder is surrounded and buffered from its neighboring towns mostly by grass, resulting in completely different fire behavior. Additionally, urban areas naturally have more barriers from wildfires, such as roads, creeks and green lawns. With the wind patterns and potential for Chinook wind events, however, a problem could arise if a fire couldn’t be stopped before reaching homes. “Once a house or two get involved on a wind event day, the bets are off,” laments Oliver. “What could then be the issue is home-to-home ignition, or multiple spot fires occurring before we get enough resources to handle them. It is then no longer a ‘wildfire,’ but an urban conflagration.” The Colorado Wildfire Risk Assessment Portal shows detailed map layers related to different risk factors. Review your area’s wildfire risk at www.coloradowildfirerisk.com. What is Being Done to Prevent Catastrophic Fire? There are 23 different fire protection districts that have a role in preventing and responding to fires in Boulder County, including volunteer and municipal fire departments and federal agencies. They collaborate and cooperate on planning, suppression efforts, public education, land management and more. Wanner says responsible management plays a central role for both public and private land. He calls prescribed fire one of the most important tools in the management toolbox, but says it is difficult to pull off for a variety of reasons. “Safety is always our number-one consideration, and if for some reason we don’t think we can meet our safety objectives due to weather, fuel conditions, moisture levels or any number of other factors, we are quick to shut down a burn,” he explains. “It’s often especially difficult in an area like Boulder where we are in such close proximity to homes and private property.” Wanner says both prescribed burning and mechanical thinning (cutting and removing flammable material) are designed to mimic the natural role of fire by removing fuels (both large fuels like trees and smaller stuff like needles and grasses) and restoring more “natural” conditions. “Forest restoration work can be time-consuming and expensive, but we focus…where there is a direct risk of wildfire impacting the community,” says Wanner. “In addition to our efforts, there’s lots of great forest management work happening on county and federal land, within the fire protection districts, and by dedicated private property owners.” Emergency Preparedness for Evacuation • Be sure you have signed up for emergency 911 notifications at www.boco911alert.com. • Create a disaster plan that includes all family members, pets and livestock and discuss its details. Check out www.ready.gov/wildfires to get started. • Check your homeowners insurance to ensure you have proper coverage. Designate a meeting spot outside your fire area and know how you’ll contact one another if necessary. • Create a “go bag” and emergency supply kit to include things such as car keys and important family documents, extra eyeglasses and prescription medications. • Secure the house and consider leaving lights on to make your home more visible. Leave hoses accessible. • Leave as soon as you can or when you are told. Go directly to the meeting spot in your emergency plan or to shelters designated by Office of Emergency Management if appropriate. Don’t forget your go bag! Today’s New Normal: What Should Homeowners Do? The work individual homeowners put into preparing their home and loved ones in advance of a fire is often the deciding factor in whether a home survives. With fire conditions becoming more frequent and devastating, arrival of emergency response organizations may be limited by the amount of equipment or personnel available, the location of water sources, difficult access, or the number and types of structures in the area. The Boulder Fire-Rescue Wildland Fire Preparedness Guide reminds readers it is ultimately the responsibility of residents to prepare themselves for an event like this. Resources are available online or through many city and county organizations. (See below for specific suggestions.) Justin Bukartek, MPA, CO-CEM is the deputy director at the Boulder County Office of Emergency Management and says it is a common misconception that if someone is in danger, help is on the way. “Yes, someone is coming,” says Bukartek, a former logistics officer in the U.S. Army before starting his career in emergency management. “Depending on the scope and scale of the emergency, it just might be a long time and you may only have a few minutes to get to safety. It’s difficult to have a clear-thought process in those circumstances, so have it planned out.” Private Property Fire Mitigation - Every homeowner can reduce the ignition potential of their home by taking action. Working with your neighbors and community will further increase the effectiveness of your home’s defensible space. - Understand that each home is different and no single checklist can mitigate risks for all properties. The guidelines below represent only a brief overview. Install an address marker in white reflective lettering on a nonflammable post at the edge of your driveway. - Use fire-resistant materials to build, renovate or make repairs. - Remove combustible litter on roofs and gutters and trim tree branches that overhang the roof and chimney. - Create a fire-resistant zone that is free of leaves, debris or flammable materials for at least 30 feet from your home. This includes eliminating all combustible materials such as fire-prone vegetation, combustible patio furniture, umbrellas and lumber decking. - Place wood piles and propane tanks away from the house. - Unincorporated Boulder County residents should contact Wildfire Partners to learn about and apply for their innovative, award-winning home mitigation certification program. Other residents, contact Boulder Fire-Rescue or your local municipal fire department for a free on-site evaluation of your property.
<urn:uuid:0b59635b-517c-4cc7-8d48-600578965ea3>
CC-MAIN-2021-43
https://getboulder.com/with-unprecedented-wildfire-events-the-new-norm-could-boulder-county-see-more-loss-of-homes-and-lives/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587608.86/warc/CC-MAIN-20211024235512-20211025025512-00670.warc.gz
en
0.938347
2,347
3.484375
3
The man who murdered a young mother in central Illinois eluded investigators for nearly a decade. When they finally caught him in August 2018, they discovered he’d repeatedly dodged attempts to put his DNA into a criminal database. The killer, Michael Henslick, had grown up in the same neighborhood and attended high school with the 22-year-old victim, Holly Cassano. He’d been arrested several times since the November 2009 attack, and twice a judge ordered him to provide a DNA sample. Henslick blew the orders off. “If he’d given his DNA, we wouldn’t have had to wait nine years,” said Champaign County Sheriff’s Office Investigator Dwayne Roelfs, who worked the case from day one. The break finally came when Roelfs and his colleagues turned to genetic genealogy, a technique that allowed them to expand their search to direct-to-consumer DNA websites. When they found Henslick, who was later convicted of murder, they also exposed a weakness in the government’s vaunted national system of criminal DNA databases. Similar revelations of missed opportunities to solve crimes sooner have occurred across the country, as new investigative methods have led authorities to suspects who should have had their DNA collected and uploaded years ago. The national DNA database, known as CODIS, is arguably the most powerful crime-fighting tool in modern history. It holds more than 18 million people’s profiles and has produced more than 500,000 hits since it went fully online in 1998, according to the FBI. The database has also been used to reveal the true suspects in cases of wrongful conviction. But the system lacks thousands of profiles from convicted offenders and suspects — information that could hold answers to innumerable unsolved crimes, researchers and law enforcement officials say. Authorities in several states are now trying to go back and collect this missing DNA, a lengthy and expensive undertaking that has already led to arrests in dozens of cold cases. But expanding criminal DNA databases — many of which include people arrested but not necessarily convicted of crimes — also comes with risks. Black people are far more likely than white people to have their DNA profiles collected and stored in government databases — a reflection of a justice system that disproportionately targets people of color, researchers say. Rather than amplify those disparities by expanding the databases, they say, the government should spend more money on providing support to victims and improving police investigations. Holly Cassano’s mother, Toni Cassano, doesn’t blame anyone in particular for failing to collect Henslick’s DNA. But she wants federal law changed to prevent convicted offenders from dodging similar orders in the future. “I don’t believe anyone messed up,” she said. “I believe the system sucks. If I had to put the blame on something, I would put blame on the system.” ‘A wake-up call’ On the morning of Nov. 2, 2009, Toni Cassano was expecting an early visit from her daughter, who lived three streets away in a Mahomet, Illinois, mobile home park. Toni had been babysitting Holly’s 17-month-old daughter since the night before, and Toni needed to leave for work. But Holly didn’t show up or answer her phone. Assuming she’d overslept, Toni went to get her. “I wanted to get her out of bed,” Toni recalled. “So I went to her house. And that’s when I found her.” Holly had been stabbed to death on the bedroom floor. Toni sat beside her and put a hand on her leg. Then she said a brief prayer and called 911. There was blood all over. Some of it was the killer’s. Investigators obtained a DNA profile that went into the state’s criminal database, but there were no matches. Nor were there any for the dozens of potential suspects police questioned in the months and years that followed. Leads dried up. The case went cold. Toni became an outspoken voice on her daughter’s behalf, staying in regular contact with detectives, handing out bumper stickers with Holly’s name and doing media interviews. She adopted Holly’s daughter. Henslick lived with his parents in the same mobile home park and had gone to high school with Holly. They did not know each other well, but had common friends, Toni said. He avoided suspicion, even after getting charged with other crimes. In 2015, Henslick was caught during a traffic stop with pot and cocaine, according to court records. If convicted, he’d have to provide his DNA. But Henslick failed to show up for court hearings. Eventually he pleaded guilty and was put on probation, a sentence that required him to give a DNA sample. But he never went to the probation office to provide it. He continued to miss court dates, and was arrested again, sentenced to more probation and ordered to give his DNA. Again, he ignored the order. A request to revoke his probation — along with domestic violence charges related to an alleged 2017 attack on a woman — were pending in court when detectives working the Cassano murder caught a break. Police in early 2018 turned to a Virginia company, Parabon NanoLabs, which specialized in a newly available investigative technique that was used to crack the Golden State Killer case. The method, combining consumer DNA databases and traditional genealogy research, allows investigators to find relatives of a suspect, then build family trees to identify the person. Parabon’s chief genetic genealogist, CeCe Moore, tried the technique with the Cassano murder and identified Henslick as a likely suspect. Investigators followed Henslick, picked up a cigarette he discarded and sent it in for testing. The DNA from the cigarette matched the profile from the murder scene. Detectives took him in for questioning, and he confessed, according to authorities. Henslick went to trial anyway, arguing that the confession had been coerced. He was convicted in February, and at sentencing, Champaign County State’s Attorney Julia Rietz cited Henslick’s skipping DNA collection, saying it had allowed him to hide “in plain sight here in our community.” A judge sentenced him in June to life without parole. Rietz considers the case a lesson in how easy it is for offenders to avoid giving their DNA. Now, when people in Champaign County are sentenced to probation, they are ordered to go straight to the office to give their DNA, she said. “This was definitely a wake-up call as to how we need to be on top of whether we are collecting DNA or not,” Rietz said. ‘A national disgrace’ Henslick’s is one of a growing number of cases in which investigations have revealed suspects with criminal histories who could have been caught earlier if their DNA had been taken. They slipped through the cracks for a variety of reasons: miscommunication among agencies, paperwork errors, lack of resources, flawed protocols. Many are already in prison, doing time in states that collect DNA from offenders when their terms are complete. Some are out on parole or probation. Some are no longer under any kind of law enforcement supervision. Robert E. Koehler, an electrician and handyman from South Florida, pleaded guilty to a sex attack in 1991. That was the year after Florida began collecting DNA from people convicted of sex-related crimes. He was put on the state’s sex offender registry, and had been there for decades. But his DNA was never collected. That’s how things remained until last year, when Koehler’s adult son was arrested on a domestic violence charge, prompting the collection of his DNA. The younger Koehler’s profile was uploaded into CODIS, where it triggered a partial match with a series of sexual assaults in South Florida in the 1980s by an unknown attacker dubbed the “pillowcase rapist.” The partial match was the result of familial DNA searching, a relatively new technique that allows investigators to scan criminal databases for people related to someone whose DNA was found at a crime scene. Investigators examined the son’s family tree, then focused on his father, secretly obtaining his DNA from a grocery store he visited. That DNA matched a 1983 rape — and linked him to more than two dozen others attributed to the pillowcase rapist, authorities said. Koehler was charged in the 1983 case and is awaiting trial; he has pleaded not guilty. In another case, in Vancouver, Washington, authorities announced in April 2019 that they’d used genetic genealogy to solve the 25-year-old rape and murder of a young mother. They also revealed that the suspect, Richard Knapp, had served time in prison for rape years before the murder, and had given a court-ordered “biological sample” that was destroyed in 2000 without anyone uploading his DNA into a criminal database. The list also includes James Otto Earhart, who was executed in Texas in 1999 for murder, without ever giving a DNA sample. Two decades later, after he was identified through genetic genealogy as a suspect in a second killing, his remains were exhumed for DNA testing, which confirmed a match. These cases point to systemic failures that leave victims and their families without justice and criminals free to commit more crimes, said Rockne Harmon, a retired California prosecutor. “I think it’s a national disgrace,” Harmon said. The successes of genetic genealogy and familial searching in solving cold cases should prompt examinations of missteps that prevented the cases from being solved earlier, he said. Instead, “the celebrations drown that out.” Closing DNA loopholes Lindsey Wade has been trying to draw attention to the problem for years. Wade was a homicide detective in Tacoma, Washington, in 2010 when she started working on a case that had gone unsolved for 50 years: the 1961 abduction of an 8-year-old girl named Ann Marie Burr. Investigators speculated that Ann Marie had been an early target of Ted Bundy, the serial killer who lived in Tacoma at the time. But Bundy denied responsibility before he was executed in 1989 in Florida. Wade assumed that Bundy’s DNA was in the national criminal database. She called around and learned she was wrong. “That’s when it hit me: We’re talking about one of the most notorious serial killers in American history, how in the hell is he not in the DNA database?” Wade recalled. “He’s the poster child for CODIS, a cross-country serial killer from the 1970s who flew under the radar.” Wade pressed Florida authorities to find a sample of Bundy’s DNA, which was uploaded into CODIS in 2011. The profile did not connect Bundy to Ann Marie’s case, but may provide answers in other unsolved crimes. For more of NBC News’ in-depth reporting, download the NBC News app Wade uncovered another collection gap after checking for DNA taken from sex offenders committed to a state mental health facility. She was told that the state’s policy was to collect DNA at the time they were released. She lobbied for their DNA to be taken immediately, and got a hit matching one of those men, Michael Allan Halgren, with DNA found in the bedroom of Susan Lowe, a 19-year-old woman raped and murdered in 1980 in Bellevue, Washington. Halgren pleaded guilty in 2014. Wade pressed Washington authorities to close loopholes in its DNA collection laws and to collect DNA from people who should have provided theirs already. She shared her concerns at a 2013 meeting with the National Center for Missing and Exploited Children, where a forensics specialist, Angela Williamson, took up Wade’s crusade. Together they spoke about the CODIS gaps at law enforcement conferences. “People would stare at us like, ‘What do you mean there are guys in prison who didn’t have their DNA taken?” Wade recalled. Wade now works for the Washington Attorney General’s Office, where she is guiding the state’s collection of DNA from offenders who have slipped through the cracks. Williamson became a supervisor in the forensics unit at the Bureau of Justice Assistance, an arm of the Department of Justice, where she oversees federal grants for state and local agencies to close backlogs of rape kits and add missing DNA profiles to CODIS. The bureau has so far awarded eight grants of about $1 million each for the “lawfully owed DNA” program, with more expected to be announced in September. Williamson estimated that most states are missing 40,000 to 50,000 lawfully owed samples. The meaning of “lawfully owed” varies by state. New York, for example, requires collection of DNA from people convicted of all felonies, from murder to drug possession, while California law covers not just felony convictions, but also people who’ve been arrested for suspicion of committing a felony. If a person refuses to provide their DNA, authorities can seek a court order, depending on the circumstances. Washington state, one of the recipients of the DNA collection grants, estimates that more than 30,000 convicted criminals owe their DNA. “To say that CODIS is not being used to its potential, which is vast, would be a significant understatement,” Washington Attorney General Bob Ferguson said. “We can catch bad guys based on their DNA, but only if we are putting that DNA into CODIS.” A model for this effort is Cuyahoga County, Ohio, which includes Cleveland, where authorities have identified more than 15,300 missing DNA profiles. Authorities started with the easiest group, those still locked up or on probation. So far, they have collected more than 2,300 of those missing profiles and have gotten 87 hits in CODIS on unsolved crimes, including six homicides and 38 sexual assaults. One of those profiles was of Marquice Miller, who was arrested for theft in 2014, pleaded guilty and was put on probation, said Richard Bell, chief of the special investigations division at the Cuyahoga County Prosecutor’s Office. At any of those steps authorities should have taken his DNA, but did not. When that finally happened in 2017, there was an immediate hit in CODIS to DNA taken from the 2012 rape of a 14-year-old girl, Bell said. Miller pleaded guilty last year and is serving an eight-year prison sentence. “These CODIS hits are only going to grow,” Bell said. “And that, to us, is pure gold.” ‘Racially skewed from the beginning’ If more hits in CODIS is gold, then what is the cost? Over the years, as CODIS has expanded from a repository of people convicted of serious felonies to those accused of committing a wider range of offenses, privacy advocates and civil liberties groups have warned that the database increasingly reflects the racial disparities of the criminal justice system. If police are more likely to pursue cases that include a hit, then they may be more likely to pursue cases against Black suspects than white ones, these critics say. They point out that a reported match in CODIS is not proof that someone committed a crime; their DNA may have been left at a scene earlier or been inadvertently transferred by someone else — or there may be a processing error. The risks of disparate treatment rise in the 31 states that collect DNA from people who are arrested but have not been convicted of a crime, the critics say. Those concerns have heightened with the spread of familial DNA searches, which scan criminal databases for people who may be related to someone who left genetic material at a crime scene. That puts Black communities at greater risk of increased genetic surveillance, experts say. “Because of the huge disparities and injustices in the way in which criminals laws are enforced, like rampant racial profiling by police, collecting DNA is a racist practice,” Dorothy Roberts, a professor of law and sociology at the University of Pennsylvania, said. “It embeds within it the racist practices for arresting people and charging them with crimes.” Some scholars say that the money and resources used to find people who owe their DNA to solve a relatively small number of cold cases would be better spent expanding services for crime victims, particularly those who’ve been sexually assaulted, and training police to investigate rape accusations more thoroughly. Erin Murphy, an NYU law professor who researches the expanding use of DNA testing in the criminal justice system, recently completed a study that showed that DNA profiles from Black people, who make up about 13 percent of the U.S. population, are collected and stored at more than twice the rate of white people. To change that, Murphy said, authorities should focus reform where those discrepancies begin: on the streets, where people are policed and arrested, and in the courthouses where they are prosecuted. Murphy acknowledged that the lawfully owed DNA project presents a conundrum. DNA, and the effort to process more rape kits, has solved crimes against many victims who otherwise may have been ignored, she said. But there has been no cost-benefit analysis of expanding DNA databases. “I want to hear more about why this is an efficient use of resources at a time of unprecedented austerity,” Murphy said. “I’m not sure it’s enough to outweigh the actual and perceived injustices of collecting dues on something that was racially skewed from the beginning.” Finally, an answer For most of the nine years that it took to find her daughter’s killer, Toni Cassano struggled with how to bear the weight. She started going to church regularly, and had many conversations with her pastor about the importance of forgiveness. But Toni could not bring herself to do that for the murderer who’d gotten away. Then, in the summer of 2018, she decided that if God forgave her for her sins, she, too, could find a way. It felt as if that burden had lifted. Less than two weeks later, investigators knocked on her door to tell her they’d arrested Henslick. She felt grateful for CeCe Moore and genetic genealogy. But it was painful to learn that Henslick had always been so close — and that he had eluded capture by exploiting loopholes in the system. “The way that the judicial system collects DNA from felons is a big problem,” Toni said. “That’s where the failure was.” The experience has made her an advocate for broader DNA collection. She wants to see a federal law, named after her daughter, that requires convicted felons to provide their DNA in the courtroom immediately after the judge orders it. “I want to see stories about how to prevent this from happening again,” Toni said. “How putting your DNA in a database is helping in the future, helping in the present too, to solve these cases that have gone unsolved.”
<urn:uuid:8022a499-79af-4973-9258-2f1a9f9cfebf>
CC-MAIN-2021-43
https://cbdnews24.com/index.php/2020/08/16/a-national-disgrace-holes-in-dna-databases-leave-crimes-unsolved-for-decades/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00589.warc.gz
en
0.974807
4,026
2.546875
3
How do you promote scientific thinking in the classroom? We have all heard the shrewd maxim about craftsmanship: It's not the item but rather the costs." The equivalent can be said about science. In the youth years, kids are mastering the interaction abilities of science as they apply to various topic. The abilities notice, analyze, sort and coordinate, foresee, try, assess, and apply are the seven fundamental strides to logical reasoning. This bit by bit way to deal with science is adaptable, permitting you to follow kids' inclinations and revelations. On the off chance that this year youngsters are captivated with a stone assortment a kid brings to class, you may decide to utilize rocks and stones as your subject of study. In any case, if one year from now a youngster gets her seed assortment, you may decide to zero in on seeds and plants for your science educational program. When this interaction approach is set up, kids will find that they can apply it to any point they need to research. Have No Fear! A few educators don't feel good with science. Yet, when you approach science as a cycle in which you learn alongside the kids, there isn't anything to fear. The objective in building up an effective science program is to keep a receptive outlook and have the option to see science all over the place. By giving kids numerous intuitive encounters, you'll be showing them how to apply the "means to science" to all that they experience. Follow the means illustrated here for a dynamic, intelligent science program. Utilizing the Seven Steps "Formula" The fundamental strides for making extraordinary science examines are like those in the logical strategy, yet extended, with accentuation on the abilities that are generally pertinent to little youngsters. We should investigate every one: Notice This is the way toward looking carefully, seeing from changed perspectives, and discreetly watching and holding up without much "doing." By their tendency, kids frequently need to hop in and "do" the trial. We need to remind them to set aside the effort to utilize every one of their faculties when they approach a movement. Take the perceptions to various levels and regions. Request that kids assemble more data and perspectives. What do you notice about these plants? What happens when you take a gander at them from above, far away, or extremely, close? We should watch out for what comes next when the breeze blows them or the daylight shifts. What do you see now? Contrast Making examinations welcomes kids with move past determining what they saw about something and to start communicating connections between things. How are these plants the equivalent as well as various? Where have you seen comparative plants? Various plants? How do a few plants feel not the same as others? Shouldn't something be said about their smell? Sort and Organize This is the way toward gathering things by conspicuous characteristics. Kids match, gathering, and sort out materials from various perspectives. They start to comprehend that articles can have a place with more than each gathering in turn. This is an incredible chance to welcome youngsters to record their discoveries in pictures and charts. Alluding to these photos and charts, they can make further correlations. What number of ways would we be able to sort the plants? (with and without blossoms, tall and short, large leaves and little leaves) what number ways would we be able to sort out the leaves? (round, since quite a while ago, pointed, two-lobed, three-lobed, etc) Foresee This is the way toward addressing and estimating, in light of earlier information acquired in the initial three stages. Kids improve and better at forecast through experience, so make certain to give loads of freedoms to this interaction expertise. What will occur in the event that we put some in a storeroom? Will daylight radiate through a leaf? This progression likewise assists kids with making speculations regarding things. In the event that they notice that light appears to radiate through the leaves of a greenery however not through an elastic plant, they may sum up that daylight won't radiate through thick leaves. Trial This is when kids try out their expectations and evaluate their thoughts. The way in to this progression is to give a lot of various materials and TIME to investigate. Give materials to free investigation in your science region so kids can visit and return to them all alone which is how kids direct their own rendition of an "autonomous examination." How would we be able to test if light will radiate through a leaf? What number of various leaves would we be able to test? What spots would we be able to put plants to check whether they will develop? What else would you like to think about plants? Assess This is the place where kids impart the discoveries of their tests with others, taking their solid experience, expressing it, and addressing the data conceptually with diagrams, drawings, outlines, and field books. For instance: On accordion-collapsed paper, would you be able to make an attracting every day of the plants your investigation? Utilize dim paper for the dim spots the plants are kept and white or yellow for the light places. Which were the best places to develop plants? Which spots were bad for developing plants? What number of leaves could you focus light through? What number of could you not focus light through? How might we show this data on a diagram? Apply This progression includes applying the understandings acquired from the test to a bigger field of involvement, urging youngsters to widen the extent of their trials, attempt them again with new materials, and check whether their understandings are reliable. This is the ideal opportunity for incredible, open-finished inquiries and exercises to help youngsters think past the case! What might occur if the plants were covered with dull paper, light paper? Could they develop? How might they respond? Science All Around the Room When you show up at the application stage, you can take the understandings and investigations outside of the science community and into other learning habitats. Here are a few instances of how you can take plant concentrate all around the room: - Gather books from the library that show lovely photos of the regular world. All week have an exceptional piece of the earth as a focal point in the homeroom - a bloom, a lovely branch, or a bonsai tree. - Recount a ceaseless story. Have a huge drawstring sack or bin brimming with natural product, nuts, and seeds. Now pass the pack and proceed with the senseless story. - Make an image word reference of the new science words learned and utilized in this unit. Add drawings and photographs to outline each word. Spot this in the proficiency place to aid youngsters' science diary composing. - Hang a sign in the workmanship territory asking kids, How would you be able to utilize seeds and bulbs in a craftsmanship project? - Add seed and plant artworks by incredible specialists for motivation at the easel. - Remove the paintbrushes and supplant them with nature things at the easel. How might you paint with a leaf, a bloom, pine branch, and a corncob? - Give math manipulatives to kids to utilize so they can record the development of seedlings, bulbs, and plants in a wide assortment of ways. - Make a wide range of games. Make an "inside/outside" coordinating round of products of the soil utilizing photographs cut from seed inventories or downloaded from the Internet. Welcome kids to help you make a "portions of a plant" puzzle showing the plant from roots to blossom. They can cut the pieces from banners or indexes or draw them themselves. Make a seed succession game utilizing photographs taken of the development of the new bulbs. - At the water table, hang a sign perusing: Do seeds skim? Give an assortment of nuts and seeds for testing and an outline for recording discoveries. - In the sand table, cover various enormous seeds and nuts in the clammy sand. How might you use water to discover the seeds? Allow every kid to keep one thing. - What nature articles can be utilized to make instruments? Acquire gourds, bean cases, coconuts, and different things for youngsters to investigate. Utilize these to add audio cues and organize main tunes and books! Follow Children's Interests The best method to pick a science subject is to begin with something kids are keen on. Notice what they notice. In the springtime, one kindergarten class got entranced with the rust that had created on the open air play gear. The educator welcomed kids to notice and notice the rust and afterward conceptualize what they think about it. At the following social affair, kids made a buddy graph of what they needed to get some answers concerning rust. For certain compartments of water and an arrangement of extraordinary "garbage," youngsters occupied with a progression of examinations to discover what will rust in water and what won't. Later they chose to test different fluids to check whether the "known" rust things would rust in them too. They needed to know: Would a screw rust in milk, fluid cleanser, or soft drink a similar route as it did in water? Surely rust was not on the class schedule or even a weak chance in the educator's psyche as an exercise plan, however by taking their lead and utilizing the means to science together, they made an astonishing science study! Youngsters are characteristic authorities. Simply look inside their pockets, knapsacks, or cubbies and you will locate the most stunning arrangement of "extraordinary stuff." You can utilize youngsters' assortments as a beginning spot for science contemplates. Welcome youngsters to share their assortments and examine what they think about them. Check whether they have any inquiries regarding their assortments that they'd prefer to investigate. Think about the tests, utilizing the means to science, that should be possible with these things. Make sure to begin with perception and examination. What do you notice about the things in your assortment? How are the things the equivalent as well as various? You should introduce a science apparatus, for example, a magnifier or skillet adjust and ask, How would we be able to utilize this device to discover more about the things in your assortment? At that point follow the means to science and see where they lead!
<urn:uuid:56f78d82-58ab-407d-ab88-d946f6f1a654>
CC-MAIN-2021-43
https://www.blogsetu.co.in/how-do-you-promote-scientific-thinking-in-the-classroom
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585405.74/warc/CC-MAIN-20211021102435-20211021132435-00110.warc.gz
en
0.955688
2,114
3.296875
3
Your child should not receive a booster vaccine if he or she had a life-threatening allergic reaction after the first shot. That bacteria get into the nose and throat and attach to tiny, hair-like extensions (cilia) lining. Anyone who has not had pertussis previously or who has not received the pertussis vaccine can get the disease. They also get better on their own in a few days. Before, only young children could receive the pertussis vaccine. Older children, adolescents and adults can become susceptible to pertussis five-to 10-years after their last dose of pertussis-containing vaccine. Despite a high coverage of vaccination, pertussis continues to be of public health concern as a re-emerging infectious disease. Although whooping cough usually produces milder symptoms in adults, it can cause severe. Also, your health care professional may be able to tell you about ways to prevent or reduce some of these side effects. In this study, we showed pertussis after effects that the interaction of B. Side effects requiring immediate medical attention. More serious side effects are very rare but with DTaP can include: A fever over 105 degrees. Common side effects Pain, redness, or swelling at the injection site. Bordetella pertussis is a gram-negative, strictly human pathogen of the respiratory tract and the major causative agent of whooping cough. More severe complications can include. These spells pertussis after effects can last for weeks and can lead to pneumonia, seizures (convulsions), brain damage, and death. 4ºF (38ºC) following vaccination. Every vaccine comes with a chance of side effects, and the Tdap vaccine is no exception. Background: Ten years ago, we formulated two hypotheses about whole-cell diphtheria-tetanus-pertussis (DTP) vaccination: first, when pertussis after effects given after BCG, DTP increases mortality in girls and, second, following DTP there is an increase in the female/male mortality rate ratio (MRR). Whooping cough vaccines became widely available in the 1940s. People receiving the tetanus vaccine can experience a pertussis after effects mild fever of up to 100. However, the chance of a life-threatening reaction is small. pertussis after effects Seizures (jerking, twitching of the muscles, or staring). 11, 30 After studies raised concerns about a temporal relation between pertussis-containing. Blood in the urine bloody or black, tarry stools blurred vision burning, crawling, itching, numbness, prickling, "pins and needles", or tingling feelings chest pain or discomfort chills cough dizziness dizziness, faintness, or pertussis after effects lightheadedness when getting up suddenly from pertussis after effects a lying or sitting. Pertussis (whooping cough): a respiratory illness with cold-like symptoms that lead to severe coughing (the "whooping" sound happens when a child breathes in deeply pertussis after effects after a severe coughing fit). The cough from pertussis has been documented to cause subconjunctival hemorrhages, rib fractures, urinary incontinence, hernias, and vertebral artery dissection. The classic symptoms of pertussis are a paroxysmal cough, inspiratory whoop, and fainting, or vomiting after coughing. pertussis after effects The lower-case "a" in each vaccine indicates that the pertussis component is acellular, or cell-free, which reduces the incidence of side effects. When the child receives a booster dose, you will need to tell the doctor if the previous shots caused any side effects. It usually takes about seven to 10 days after being exposed to the infection to start showing symptoms. Along with its needed effects, dextromethorphan (the active ingredient contained in Pertussin DM) may cause some unwanted effects. Blood in the urine. pertussis, or whooping cough, is an extremely contagious respiratory infection that can lead to severe breathing problems, especially in infants. 2% will have pertussis after effects seizures. Pertussis (whooping cough) causes coughing so severe that it interferes with eating, drinking, or breathing. Whooping cough (pertussis) is caused by a type of bacteria called Bordetella pertussis. Mild to moderate. After that long, the bacteria have already left your body, and the drugs won&39;t have any. Learn about age restrictions, side effects, use during pregnancy, and more. whooping cough, or pertussis, can be spread when an infected person sneezes or coughs. Nonstop crying for 3 hours pertussis after effects or more. Boostrix is a vaccine for the prevention of tetanus, diphtheria, and pertussis. Full recovery from whooping cough may take two to three months. These side effects may go away during treatment as your body adjusts to the medicine. Pertussis vaccines. Keep track of any and all side effects your child has after receiving this vaccine. Fortunately, reported side effects with Tdap are generally mild and go away on their own. Coughing fits can be long and frequent. This includes, runny nose, sneezing, tiredness over several days and after this a pertussis after effects cough develops. 4% will have encephalopathy (as a result of hypoxia from coughing or possibly from toxin) Other complications can include anorexia, dehydration, difficulty sleeping, epistaxis, hernias, otitis media, and urinary incontinence. Most side effects are mild, meaning they do not affect daily activities. "Possible Side Effects of Vaccines. Diphtheria and pertussis pertussis after effects are spread from person to person. pertussis first appears like an ordinary cold, but the. The CDC says the dangers of developing pertussis, tetanus, or diphtheria far. The mechanism by which vaccine-elicited anti-pertussis antibodies mediate direct bactericidal effects is poorly understood. A study, published in the journal Pediatrics, explained why. Potential side effects include: redness, tenderness, pain, and swelling at the injection site body aches headache fatigue nausea vomiting diarrhea mild fever chills rash. Check with your health care professional if any of the pertussis after effects following side effects continue or are bothersome or if you have any questions about. Some pertussis after effects side effects of diphtheria pertussis after effects and tetanus toxoids / pertussis, acellular may occur that usually do not need pertussis after effects medical attention. Typically, your cough won’t last as many days and coughing fits, whooping, and vomiting after coughing fits won’t occur as often. Before then, about 200,000 children got sick and about 9,000 died from whooping cough each year in the United States. pertussis after effects If you&39;ve had whooping cough for 3 pertussis after effects weeks or longer before you treat it, antibiotics are less likely to pertussis after effects help. Headache or other body aches. Pertussis is the only vaccine-preventable disease that continues to rise in the U. Pain at the injection site is one of the most common side effects from. The infection causes violent, uncontrollable. The pertussis vaccination is highly recommended for infants, children, and pregnant women. Whooping cough pertussis after effects often starts with a cold or flu pertussis after effects like illness. Whole-cell pertussis vaccine in combination with diphtheria and tetanus toxoids was introduced in 1948. Like all medicines, vaccines can have side effects. pertussis after effects Following the introduction of pertussis vaccination during the 1950s – 1960s, a dramatic reduction (>90%) in pertussis incidence and mortality was observed in the industrialized world. sleepiness (unusual and continuing) swelling of the eyes, face, or inside of the nose. The pertussis component of pertussis after effects the original DPT vaccine accounted pertussis after effects for most of the minor local and systemic side effects in many vaccinated infants (such as mild fever or soreness at the injection site). Although it is rarer than the other common side effects, some people may develop a low-grade fever in response to the tetanus vaccine. Redness, swelling, or pain where the shot was given. Tetanus enters the body through a cut or wound. However, ACIP recommends that children age 7–10 years who are not fully vaccinated against pertussis (defined as 5 doses of DTaP or 4 doses of DTaP if the fourth dose was administered on or after the fourth birthday) and who do not have a contraindication to pertussis vaccine should receive a single dose of Tdap to provide protection against. Side effects not requiring immediate medical attention. Immunity following disease or vaccination is not lifelong. bloody or black, tarry stools. Whooping cough, or pertussis, is a highly contagious bacterial infection that affects the respiratory tract. The most common side effects from the Tdap vaccine pertussis after effects include Redness, swelling, pain, and tenderness where you got the shot. The fever should subside without intervention, but, again, OTC. A: If you get pertussis after getting pertussis vaccines, pertussis after effects you are less likely to have a serious infection. Side effects of the vaccine are usually mild and may include a fever, crankiness, headache, fatigue or soreness at the site of the injection. The cough often starts to improve after 2 to 6 weeks, but it can take months for the cough to go away completely. Serious complications can affect children under 1 year old, and those younger than 6 months old are especially at risk. Pertussis pertussis after effects vaccine has thus been part of the WHO Expanded Program on Immunization since its inception in 1974. Intro: The Power of Vaccines. This highly contagious disease is especially severe in infants and remains a major cause of infant illness and death worldwide, predominantly in industrialized countries ( 1 ). Whooping cough, also called pertussis, is a serious respiratory infection caused by a type of bacteria called Bordetella pertussis. most often, it spreads among family members and other people in the house, like babysitters. Unfortunately, this caused the antibodies in pertussis after effects pertussis after effects the pertussis vaccine to wane pretty rapidly. Although not all of these side effects may pertussis after effects occur, if they do occur they may need medical attention. unusual tiredness or weakness (sudden and severe) vomiting (severe or continuing) Incidence not known. After vaccine introduction, whooping cough cases reached an all-time low in the 1970s. -> How to crop video in after effects -> Push transitions premiere pro
<urn:uuid:3a7d506c-de51-48e8-b501-0c1c1a2c8974>
CC-MAIN-2021-43
http://sgsd.chuckfood.ru/631f4b02
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585209.43/warc/CC-MAIN-20211018190451-20211018220451-00510.warc.gz
en
0.930698
2,304
2.984375
3
« PreviousContinue » sense, a great aversion to extremes, and much historical research, the fruits of which were skilfully applied to illustrate and confirm his doctrines, were displayed in the only portions of this extensive work which ever saw the light; that is, in some political essays which were published in 1836, as the first volume of his Studies in the Social Sciences. His original design was very comprehensive. “In the first two books were contained the exposition of my principles of liberty and government, in the third the analysis of the British constitution, in the fourth that of the French republic, in the fifth the ancient constitutions of Spain, in the sixth those of the Italian republics ; the four following, on Sweden, Poland, the Hanseatic towns, and the United States of America, were scarcely sketched out.” We may well suppose that a person engaged in such speculations became an object of suspicion to the despotic government of Austria, then wrestling with the athletic young democracy of France for the preservation of her power in Italy. But her fears were unfounded ; so temperate an exhibition of political doctrine, not gilded by rhetorical ornament or fervid declamation, nor seasoned by appeals to popular prejudices, need not have alarıned either the legitimatists or the radicals. Sismondi would have been too soon, by at least a quarter of a century, in setting forth his calm and philosophical view of the matter; it was well that the publication even of a part was deferred till the storm had subsided. The labor bestowed on this unpublished work, in one respect at least, was not without results ; it gave a new direction to his studies, and finally led him to undertake one of the two great histories with which his name is inseparably connected. In 1798, he writes, “ My inquiries into the constitutions of the Italian republics obliged me to study their history, and from this period are dated my endeavours to become master of it, and my resolution to write it.” But his appearance before the public as the historian of the Italian republics was still long delayed from the difficulty of finding a publisher, and from the extent and intricacy of the inquiries which formed the necessary preliminaries to so great an undertaking. Meanwhile, his pen was not idle, and his thoughts recurred to those great problems in the social condition of man which were ever the leading objects of his attention. His taste and feelings ever inclined more to political and economical speculations than to narrative and historical research ; if he did not always excel in them, perhaps the only reason was that he felt too strongly ; the warmth of his heart sometimes blinded his judgment. About the year 1800, Sismondi returned to Geneva, where he was appointed secretary to the Chamber of Commerce. For this restoration to his native place he was indebted to the discernment and clemency of the First Consul, who quickly saw that there was nothing to be feared from one of his temperament. When he became very intimate with Madame de Staël, however, there is reason to believe that Bonaparte watched his conduct with some suspicion. At Geneva, after the essay on the Agriculture of Tuscany, the appearance of which has been already mentioned, Sismondi published, in 1803, his work on Commercial Wealth, in three volumes octavo. Upon this treatise he set little value afterwards ; at the time of its publication he was a zealous disciple of Adam Smith, and wished to apply the whole theory of political economy to France, of which the canton of Geneva was now a department. He advocated entire freedom of trade, and the destruction of monopolies, of the protective system, and of all restraints upon industry. Afterwards, when he began to suspect that the mere production of wealth did not always tend in an equal ratio to promote the well-being of a community, he recalled many of the opinions he had hurriedly expressed in this work, and in fact substituted doctrines for them which went to place the whole science of political economy on a new footing. When this work came from the press, however, it was favorably received, and added considerably to the reputation of its author. The professorship of political economy was then vacant in the university of Wilna, and it was offered to him with a handsome salary. The narrowness of his present means inclined him to look favorably on this proposition, and it is probable he would have accepted it, if he had not been checked by a regard for the wishes and health of his mother, who was still at Val Chiusa. She, indeed, besought him to listen only to his own interests, reminding him that foreigners, scholars, and men of letters are better received in the North than in other parts of Europe, that they find more roads to fortune open to them, and that they often make rich marriages.” But the alarm and depression of spirits of the poor mother, frightened at the prospect of a long separation from her son, were easily seen through this mask of composure ; and Sismondi, rightfully considering his duty to her as first in importance, declined the professorship. Obliged to seek occupation of some kind as a means of support, Sismondi now thought of entering upon public life, and of finding employment under the administration of the First Consul, for which he was well fitted by early training in the habits of business, and by facility in the use of his pen. " But the prudence of Madame de Sismondi turned him from this design. She knew her son better than he knew himself. His bold convictions, which he would never have been able to bend to the varying exigencies of politics ; his generous senti. ments, which it would have been as difficult for him to sacrifice as to satisfy ; an absolute love of right, which would not easily admit of temporizing or delay; that deep pride, which causes embarrassment in the presence of others when it does not give the power to govern them ; the enthusiasm of a thinker, the awkwardness of a recluse, the candor of an upright man, little flexibility, no address, but a strong intellect, high talent, constant meditation on right and useful things, rendered M. de Sismondi less suited for public affairs than intellectual labor. His mother persuaded him to become an historian. He followed this advice, which was also in accordance with his own taste, and also because he had not found it possible to publish his manuscript on the Constitutions of free nations, of which he had brought the first part to Pescia. Theories did not meet with the same favorable reception which they had formerly done. Their time seemed to be gone by,— that of history was come.” p. 8. The great defect of the subject which he had chosen, the history of the Italian republics, was its want of unity ; Sismondi was aware of this, and exerted all his art, by tracing out the common features of their origin, progress, and fall, to weave together their intricate annals, and the effects produced on each by local peculiarities and the characters of their distinguished citizens, into one consistent and uniform whole. Of course, the thread of his inquiries was the progress and decline of liberty in these active and turbulent civic communities, and its general effect on the social condition of the Italians. Portions of the subject were splendid, and required but little skill on the part of the historian to make the exhibition of them produce a strong effect on the mind of the reader. But there were many obscure dissensions and unimportant wars, many intricacies of local politics, which occupied much room on the canvas without contributing to the magnificence or impressiveness of the picture as a whole. These needed to be but lightly sketched and thrown into the background, so that the attention of the observer should not be diverted from the grand features of the story. Sismondi's patient and long-continued study of the subject exalted every portion of it in his estination, and led him to spend too much labor upon its unimportant details. It might have been expected, then, that the portion of his task which he was obliged to pass over with the widest generalizations, crowding the events together, and bringing out into full relief only the principal characters and most striking features of the age, would be the most successfully executed. This was the case with the first six chapters, in which he gives a rapid sketch of the history of Italy, from the reign of Odoacer, its first barbarian monarch, in the latter part of the fifth century, up to the peace of Worms between the Church and the Empire, which was made six hundred years afterwards. This period was only the introduction to the history of the Italian republics, the proper task of Sismondi, which begins late in the tenth century, and extends to the early part of the sixteenth, when Charles V. was crowned at Bologna. The earlier period, to which the preliminary chapters relate, is an obscure one, especially towards its close ; profound darkness seems to rest over the whole peninsula, broken only by faint gleams of light from the expiring Roman civilization, and by an uncertain dawn that preceded the revival of letters by the moderns. At its commencement, says Sismondi, “the nation had reached the last stage of degradation to which despotism can reduce a civilized people ; at its close, it had recovered all the energy, all the independence of character, which the struggle with adversity can give to a barbarous nation.” His object was to give a brief view of this transition, to show how the infusion of fresh and vigorous blood from the North had resuscitated and strengthened the lifeless remains of Italian greatness, after the Roman empire in the West had rather died out than suffered conquest. - P. 32. “ His introduction had satisfied both Madame de Staël, who heard it read with lively interest, and Madame de Sismondi, who mixed with her praises the counsels of the most delicate taste. • Take care,' she wrote to her son, to avoid every thing which approaches at ever so great a distance the manner of the philosophical haranguers of 1789, who thunder as soon as they open their mouths ; warmth must come from development. It is agreeable to perceive the fire under the ashes before the explosion, and the reader more willingly shares the opinions of the author when they come to him by degrees. The beginning of his history Sismondi wrote and rewrote with great ardor and rapidity ; his enthusiasm was kindled by the novelty of his task, and by the inspiring views which he gained of the destinies of the race from this turning-point in the annals of mankind. But as he went deeper and deeper into the obscure chronicles of these dark ages, as he traced with difficulty the course of petty wars and confused politics, his ardor cooled, his task seemed feebly done, and he began to despond. " His father and grandmother had listened coldly to the first chapters of his history, and Madame de Staël, so delighted with the introduction, treated what followed as dry and wanting life.” He repeated his attempts with unwearied perseverance, going over the ground again and again, but remaining still uncertain as to the success of his efforts ; a young and sensitive author, if really possessing taste and talent, usually finds it more difficult to satisfy himself than to please the public. His mother, from whom not one of his feelings or thoughts was hidden, tried to divert and sustain him, mingling excellent advice with her encouragements. " These exhortations were seconded by less sedentary habits, by excursions to Coppet, where Sismondi often staid several days, by journeys to the glaciers, and lastly, by the lively and animating conversation of Madame de Staël, and of the chosen society that she attracted around her.” He commenced writing his history in 1803, but the first two volumes were not published till 1807, when they appeared both in French and German, from the press of Gessner at Zürich. They do not seem to have had brilliant success, but worked their way gradually to quite a high place in the public favor, so that the author was encouraged to persevere. The third and fourth followed in the course of the next year ;
<urn:uuid:6e4a3a35-7520-44a4-8a99-a7c2d7d8ffef>
CC-MAIN-2021-43
https://books.google.com.bd/books?id=2UHHoHxPbZoC&pg=PA45&focus=viewport&vq=Sismondi&dq=editions:UOM39015033828693&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00030.warc.gz
en
0.987073
2,567
2.53125
3
Why Was It Called the Lunatic Express? In the last story I shared recollections of my first ride on the Lunatic Express— memories that will resonate with others who experienced it, especially during the mid eighties to early nineties. Now we turn our attention to some key events surrounding this railroad, in particular the role it played in the story of colonialism, racism, and plunder in colonial East Africa, and the struggle for freedom. The Lunatic Express (also known as the Uganda Railway) got its name from lawmakers in the House of Commons who queried the astronomical financial burden it imposed on the British taxpayer as well as its rationale and logistical woes. Charles Miller’s aptly titled book, The Lunatic Express: An Entertainment in Imperialism, ensured that the phrase was forever associated with the story of British empire in East Africa. The financial cost (more than half a billion pound sterling in today’s money) prompted the Foreign Office to develop Kenya as a settler colony as this was seen as the only way to recoup the massive investment. The logistics required for the railroad were monstrous. 200,000 individual rails, 1.2 million sleepers, 200,000 fish plates, 400,000 fish hooks and 4.8 million steel keys had to be imported, among other items. This required the construction of port at Kilindini harbor in Mombasa. (The British also used Kilindini as a code breaking station against the Axis Powers during World War II. The station was housed in a building that is now part of Alidina Visram High School in Mombasa.) From Mombasa the Lunatic Express began its journey to the Uganda protectorate. It crossed thousands of bridges and made hair raising elevations to mountain ranges and volcanoes overlooking the Great African Rift Valley before descending to the valley’s floor. From there it made the final stretch to the shores of Lake Victoria in Kampala. (The Kenya portion of the Rift Valley is a UNESCO World Heritage Site, consisting of several lakes, mountains and active and dormant volcanoes). The construction of the Lunatic Express was not only a huge logistical undertaking but a deadly one as well. Hundreds of miles of track were laid in the wilderness and thousands of workers died of diseases or were killed in skirmishes between colonial forces and local communities. Several were killed by wild animals. To English politician, Henry Labouchere, the entire enterprise was a “gigantic folly”—words echoed by Uhuru Kenyatta when he termed the Lunatic Express as “the train to nowhere.” Labouchere famously said “Where it is going to, nobody knows. What is the use of it, none can conjecture. What it will carry there’s none can define. It is clearly nought but a lunatic line.” Despite these misgivings, countless notables rode Kenya’s historic railway, among them, U.S. President Theodore Roosevelt, British Prime Minister Winston Churchill, American novelist Ernest Hemmingway, and an endless list of English Royals including Queen Elizabeth II and the Queen Mother. Churchill praised it as “a brilliant conception” in the “art of British muddling through.” Speaking in defense of the project, Joseph Chamberlain, then Secretary of the Colonies, said “if Britain stepped away from its manifest destiny, it would by default leave it to other nations to take up the work that it would have been seen as too weak, too poor, and too cowardly to have done itself.” It should however be noted that for all its grandeur and logistical marvels, the Lunatic Express was ultimately a colonial endeavor, complete with violence, racism and plunder, and above all, the profound lack of human feeling associated with the colonial experience in Africa. President Roosevelt, in recounting his trip aboard the Lunatic Express, describes Africans as “savages” that “had not advanced beyond the cave man stage.” “This railroad,” he tells his readers, “is the embodiment of the eager, masterful, materialistic civilization of today, pushed through a region in which nature, both as regards wild man and wild beast, does not differ materially from what it was in Europe in the late Pleistocene.” Such were the views of the men in power in the white man’s paradise that was the Kenya colony. ……..The Human Cost 32,000 workers from British-ruled India were sent to the Kenya colony to work on the Lunatic Express. Their experience working on the British railway in India was highly prized by the British colonialists in Kenya. The incentive to import labor from India was also motivated by the resistance that local communities put up against the railway. That said, thousands of Africans also worked on the line as track-layers, porters, cooks and guards. The human cost of constructing the Lunatic Express was colossal. It is estimated that about four workers died for each mile of track. Fifty percent of the entire labor force was affected by malaria and hundreds were decimated by several outbreaks of yellow fever and sleeping sickness, as well as malnutrition due to perennial droughts. As many as 3000 Indians perished by the time construction ended in 1901. The number of African deaths is unknown. The colonial overlords did not bother to keep such records since human rights were the least of their concerns. …..The Man Eating Lions The mystique of the Lunatic Express achieved cinematic fame and left an indelible mark on popular culture. Yet the horror of those who experienced its darker side has received scant attention. One of the most infamous incidents in this regard occurred in 1898 during construction of a bridge at the Tsavo River in what is today the meeting point between Tsavo East and Tsavo West national parks. A pair of marauding lions stalked and killed as many as 135 Indian and African workers over a period of 7 months. Man eating is highly unusual behavior for lions and many speculate it could have been encouraged by the burial customs of the Hindu workers who cremated their dead in the open. This could have attracted the carnivores, as lions, in addition to being excellent hunters, are also prolific scavengers. Lions are also highly opportunistic predators. The sudden concentration of humans in their habitat made them easy prey in the harsh environment of the Tsavo. Night after night the lions breached the camp barriers, pulled workers out of their tents, and devoured them within earshot of their colleagues. Work on the bridge eventually came to a halt. The camp supervisor, Col. J Patterson, mounted a campaign lasting several months to track and kill the beasts. It was an extensive effort as the lions constantly evaded him while continuing to kill more workers. Patterson writes in his memoirs that he observed the behavior of the lions each night from the tower where he lay in wait, his rifle at the ready. He concluded that the lions sensed his presence and somehow avoided getting too close to him. After several months of attempts and near misses he eventually gave up hope of killing them. Then an opportunity presented itself on December 9, 1898 when he shot the first one. He killed the second one on the 29th, narrowly escaping death after it charged him. Patterson became a worldwide hero. His book inspired three Hollywood movies and countless documentaries. His experiences are also immortalized at the Field Museum of Natural History in Chicago, Illinois, where the stuffed man eaters, along with their skulls and skins, are on display, attracting millions of visitors. Successive Kenyan administrations have tried to have the lions repatriated to Kenya without success. (Patterson sold them to the Museum). As shown above, information about the Indian and African victims of the man eaters is scanty. Recently a Kenyan conservationist, Taiyana Chao, put out a well researched account of some of the men who fell victim to the lions. Some of her outstanding work in preserving Kenya’s history can be found here: https://www.theeagora.com/about/ Two years after the Tsavo horror, police superintendent, Charles Henry Ryall, was dragged from his coach and killed by a man eating lion several miles south of the Tsavo Bridge. In 1964 the departing colonial authorities organized a highly publicized event billed as a “commemoration” to symbolize the hardships involved in building the Lunatic Express. The highlight of the event were two lion cubs—mascots of 2 Battalion Scots Guard—that were placed in Ryall’s coach to drum up media attention. As might be expected, the press statement made no mention of the Indians and Africans whose lives were also claimed by man eating lions. …Wars of resistance As is the case with the African and Indian laborers who lost their lives in the Tsavo, the wars of resistance against the railway line have not received much attention. On November 26, 1895, a caravan of about 1,400 railway workers raided a Maasai village and abducted and raped two girls. A group of Maasai morans (warriors) made their way to the settlement and secured the girls’ release. The next day the railway party launched a second raid and abducted the same girls. The morans attacked the settlement and killed around 500 railway workers in what is now known as the Kedong Massacre. A British trader, Andrew Dick, led a counter-attack against the Maasai, killing more than 100 before being put to death himself. An uneasy truce was reached but several years later the Maasai launched a fierce guerilla struggle against the British. This resistance was crushed when the revered Maasai commander, and World War II veteran, Kurito ole Kisio, was captured and killed by colonial troops. As a teenager, Kurito, and hundreds of others, were taken by the British to fight on their behalf overseas. On returning home, a large number formed the core of the anti colonial struggle. Kurito’s body was paraded in his home area in Narok as a warning. His second in command, Muntet Ole Kapian, was paraded in a cage before being tortured and hanged. Koitalel Arap Samoei of the Nandi community led an eleven year resistance against the railway. Nandi guerilla units attacked and uprooted railway tracks and harassed British troops and their African collaborators at remote points. This resistance ended following Samoei’s assassination by a British soldier at a peace meeting staged by the colonial government. The resistance struggles of the Maasai, Nandi, Giriama, Meru, Kikuyu, Luo and other communities along the Lunatic Line eventually crystallized into a fully-fledged anti-colonial struggle waged by the Kenya Land and Freedom Army (KLFA). The struggle was disparagingly named “Mau Mau” by the colonial government. It was heavily demonized by the British press during the state of emergency declared by London and long after Kenya became independent. Its fighters are still portrayed as savages yet their role in liberating Kenya and inspiring liberation movements in other parts of Africa is not in dispute. The Lunatic Express was pivotal in moving troops and logistics for the counterinsurgency campaign waged by the British. As many as 150,000 civilians were herded into 150 camps across the colony as a strategy of denying the fighters support from the population. 10,000 British troops, 21,000 paramilitary, and 20,000 African “homeguards” were deployed in this effort. In 2011 a few surviving victims of this dark period in Kenya’s history sought redress from the British High Court. The complicated and lengthy case brought to light widespread acts of brutality and torture by camp officials, including systematic beatings, castration, rape and other sexual acts, such as the insertion of bottles into the private parts of female detainees. As the case before the British High Court dragged on, an archive of highly sensitive documents removed from Kenya and transferred to the UK shortly before independence came to light. They showed that the atrocities committed by colonial troops were sanctioned by the highest levels of the colonial government. Based on these files the Court ruled in 2012 that affected persons could sue the British government for colonial era abuses. To avoid facing trials in light of the landmark ruling, London paid damages to 5,228 victims, issued an apology, and constructed a memorial in Nairobi. Be that as it may, the UK authorities maintained that they could not be held liable for crimes committed by the colonial administration. During the hearings the Foreign Office maintained that the colony’s liabilities had been inherited by the Kenya government as a matter of public international law. To many therefore, this sad chapter in Kenya’s history has not been closed. Reconciling the iconic and breathtaking rides of the Lunatic Express with the atrocities associated with it is difficult and painful. Such was the nature of the colonial enterprise. The injustices suffered by the natives occurred in very close proximity to the enormous wealth, privilege and status of the Europeans. This state of affairs, which should have provoked outrage, was “normalized.” Elements of this are reflected in the travel culture that emerged after independence. Third class travelers on the Lunatic line sat on hard benches in dormitory—like coaches. There were no meals, no air-conditioning, no sleeper seats, and deplorable ablution facilities– a far cry from the luxuries of first class, just a few hundred feet away. It is astounding how no one saw anything wrong with this. In summary, contemporary Kenyan memories of the Lunatic Express reflect the larger Kenyan experience with colonialism. For many, the railway symbolizes injustice, atrocities, plunder and dispossession. Yet the central role it played in the Kenyan economy and in showcasing Kenya’s outstanding sights and sounds is undeniable. That said, the vast majority of Kenyans felt excluded by the grand project. After all, it was built to advance imperial power, not for the welfare of the natives, who as Roosevelt argued, were sub human. Therefore from its maiden trip on May 30 1896, to its last one on April 28, 2017, the Lunatic Express was largely seen as a colonial railroad—perhaps contributing to its systematic neglect over the years. Will the new Madaraka Express bring something fundamentally different? It is to this question that we will turn to next.
<urn:uuid:0cb8aad7-d8fe-4cce-8054-2e63d8307e4d>
CC-MAIN-2021-43
https://strategicdepth.org/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00070.warc.gz
en
0.975969
2,981
3.421875
3
Before the scientific search for and study of extrasolar planets, the possibility was argued through philosophy and science fiction. The mediocrity principle suggests that planets like Earth should be common in the Universe, while the Rare Earth hypothesis suggests that they are extremely rare. The thousands of exoplanetary star systems discovered so far are profoundly different from the Solar system, supporting the Rare Earth Hypothesis. Philosophers have pointed out that the size of the universe is such that a near-identical planet must exist somewhere. In the far future, technology may be used by humans to artificially produce an Earth analog by terraforming. The multiverse theory suggests that an Earth analog could exist in another universe or even be another version of Earth itself in a parallel universe. On November 4, 2013, astronomers reported, based on Kepler space mission data, that there could be as many as 40 billion Earth-sized planets orbiting in the habitable zones of Sun-like stars and red dwarf stars within the Milky Way Galaxy. The nearest such planet could be expected to be within 12 light-years of the Earth, statistically. In September 2020, astronomers identified 24 superhabitable planet (planets better than Earth) contenders, from among more than 4000 confirmed exoplanets at present, based on astrophysical parameters, as well as the natural history of known life forms on the Earth. Between 1858 and 1920, Mars was thought by many, including some scientists, to be very similar to Earth, only drier with a thick atmosphere, similar axial tilt, orbit and seasons as well as a Martian civilization that had built great Martian canals. These theories were advanced by Giovanni Schiaparelli, Percival Lowell and others. As such Mars in fiction portrayed the red planet as similar to Earth but with a desert like landscape. Images and data from the Mariner (1965) and Viking space probes (1975–1980), however, revealed the planet as a barren cratered world. However, with continuing discoveries, other Earth comparisons remained. For example, the Mars Ocean Hypothesis had its origins in the Viking missions and was popularised during the 1980s. With the possibility of past water, there was the possibility that life could have begun on Mars and it was once again perceived to be more Earth-like. Likewise, until the 1960s, Venus was believed by many, including some scientists, to be a warmer version of Earth with a thick atmosphere and either hot and dusty or humid with water clouds and oceans. Venus in fiction was often portrayed as having similarities to Earth and many speculated about Venusian civilization. These beliefs were dispelled in the 1960s as the first space probes gathered more accurate scientific data on the planet and found that Venus is a very hot world with the surface temperature around 462 °C (864 °F) under an acidic atmosphere with a surface pressure of 9.2 MPa (1,330 psi). From 2004, Cassini–Huygens began to reveal Saturn's moon Titan to be one of the most Earth-like worlds outside of the habitable zone. Though having a dramatically different chemical makeup, discoveries such as the confirmation of Titanian lakes, rivers and fluvial processes in 2007, advanced comparisons to Earth. Further observations, including weather phenomena, have aided the understanding of geological processes that may operate on Earth-like planets. The Kepler space telescope began observing the transits of potential terrestrial planets in the habitable zone from 2011. Though the technology provided a more effective means for detecting and confirming planets, it was unable to conclude definitively how Earth-like the candidate planets actually are. In 2013, several Kepler candidates less than 1.5 Earth radii were confirmed orbiting in the habitable zone of stars. It was not until 2015 that the first near-Earth sized candidate orbiting a solar candidate, Kepler-452b, was announced. The probability of finding an Earth analog depends mostly on the attributes that are expected to be similar, and these vary greatly. Generally it is considered that it would be a terrestrial planet and there have been several scientific studies aimed at finding such planets. Often implied but not limited to are such criteria as planet size, surface gravity, star size and type (i.e. Solar analog), orbital distance and stability, axial tilt and rotation, similar geography, oceans, air and weather conditions, strong magnetosphere and even the presence of Earth-like complex life. If there is complex life, there could be some forests covering much of the land. If there is intelligent life, some parts of land could be covered in cities. Some factors that are assumed of such a planet may be unlikely due to Earth's own history. For instance the Earth's atmosphere was not always oxygen-rich and this is a biosignature from the emergence of photosynthetic life. The formation, presence, influence on these characteristics of the Moon (such as tidal forces) may also pose a problem in finding an Earth analog. Size is often thought to be a significant factor, as planets of Earth's size are thought more likely to be terrestrial in nature and be capable of retaining an Earth-like atmosphere. The list includes planets within the range of 0.8–1.9 Earth masses, below which are generally classed as sub-Earth and above classed as super-Earth. In addition, only planets known to fall within the range of 0.5–2.0 Earth radius (between half and twice the radius of the Earth) are included. According to the size criteria, the closest planetary mass objects by known radius or mass are: |Name||Earth masses (M🜨)||Earth radii (R🜨)||Note| |Kepler-69c||0.98||1.7||Originally thought to be in the circumstellar habitable zone (CHZ), now thought to be too hot.| |Kepler-20f||< 14.3||1.03||Slightly larger and likely more massive, far too hot to be Earth-like.| |Tau Ceti b||2||Extremely hot. Not known to transit.| |Kepler-186f||1.1||Orbits in the habitable zone.| |Earth||1||1||Orbits in habitable zone.| |Kepler-20e||< 3.08||0.87||Too hot to be Earth-like.| |Proxima b||>1.27||>1.1||Closest exoplanet to Earth.| This comparison indicates that size alone is a poor measure, particularly in terms of habitability. Temperature must also be considered as Venus and the planets of Alpha Centauri B (discovered in 2012), Kepler-20 (discovered in 2011), COROT-7 (discovered in 2009) and the three planets of Kepler-42 (all discovered in 2011) are very hot, and Mars, Ganymede and Titan are frigid worlds, resulting also in wide variety of surface and atmospheric conditions. The masses of the Solar System's moons are a tiny fraction of that of Earth whereas the masses of extrasolar planets are very difficult to accurately measure. However discoveries of Earth-sized terrestrial planets are important as they may indicate the probable frequency and distribution of Earth-like planets. Another criterion often cited is that an Earth analog must be terrestrial, that is, it should possess a similar surface geology—a planetary surface composed of similar surface materials. The closest known examples are Mars and Titan and while there are similarities in their types of landforms and surface compositions, there are also significant differences such as the temperature and quantities of ice. Many of Earth's surface materials and landforms are formed as a result of interaction with water (such as clay and sedimentary rocks) or as a byproduct of life (such as limestone or coal), interaction with the atmosphere, volcanically or artificially. A true Earth analog therefore might need to have formed through similar processes, having possessed an atmosphere, volcanic interactions with the surface, past or present liquid water and life forms. There are several factors that can determine planetary temperatures and therefore several measures that can draw comparisons to that of the Earth in planets where atmospheric conditions are unknown. Equilibrium temperature is used for planets without atmospheres. With atmosphere, a greenhouse effect is assumed. Finally, surface temperature is used. Each of these temperatures is affected by climate, which is influenced by the orbit and rotation (or tidal locking) of the planet, each of which introduces further variables. Below is a comparison of the confirmed planets with the closest known temperatures to Earth. |Temperature comparisons||Venus||Earth||Kepler 22b||Mars| |Global equilibrium temperature||307 K |+ Greenhouse gas effect||737 K |Global Bond albedo||0.9||0.29||0.25| Another criterion of an ideal life-harboring earth analog is that it should orbit a solar analog; that is, a star much like our Sun. However, this criteria may not be entirely valid as many different types of stars can provide a local environment hospitable to life. For example, in the Milky Way, most stars are smaller and dimmer than the Sun. One such star, TRAPPIST-1, is located 12 parsecs (39 light years) away and is roughly 10 times smaller and 2,000 times dimmer than our sun, yet it harbors at least 6 earth-like planets in its habitable zone. While these conditions may seem unfavorable to life as we know it, TRAPPIST-1 is expected to continue burning for 12 trillion years (compared to our suns remaining 5 billion year lifetime) which is time enough for life to arise by abiogenesis. For comparison, life evolved on earth in a mere 1 billion years. The concept of the habitable zone (or Liquid Water Zone) defining a region where water can exist on the surface, is based on the properties of both the Earth and Sun. Under this model, Earth orbits roughly at the centre of this zone or in the "Goldilocks" position. Earth is the only planet currently confirmed to possess large bodies of surface water. Venus is on the hot side of the zone while Mars is on the cold side. Neither are known to have persistent surface water, though evidence exists that Mars did have in its ancient past, and it is speculated that the same was the case for Venus. Thus extrasolar planets (or moons) in the Goldilocks position with substantial atmospheres may possess oceans and water clouds like those on Earth. In addition to surface water, a true Earth analog would require a mix of oceans or lakes and areas not covered by water, or land. Some argue that a true Earth analog must not only have a similar position of its planetary system but also orbit a solar analog and have a near circular orbit such that it remains continually habitable like Earth. The mediocrity principle suggests that there is a chance that serendipitous events may have allowed an Earth-like planet to form elsewhere that would allow the emergence of complex, multi-cellular life. In contrast, the Rare Earth hypothesis asserts that if the strictest criteria are applied, such a planet, if it exists, may be so far away that humans may never locate it. Because the Solar System proved to be devoid of an Earth analog, the search has widened to extrasolar planets. Astrobiologists assert that Earth analogs would most likely be found in a stellar habitable zone, in which liquid water could exist, providing the conditions for supporting life. Some astrobiologists, such as Dirk Schulze-Makuch, estimated that a sufficiently massive natural satellite may form a habitable moon similar to Earth. The frequency of Earth-like planets in both the Milky Way and the larger universe is still unknown. It ranges from the extreme Rare Earth hypothesis estimates – one (i. e., Earth) – to innumerable. Several current scientific studies, including the Kepler mission, are aimed at refining estimates using real data from transiting planets. A 2008 study by astronomer Michael Meyer from the University of Arizona of cosmic dust near recently formed Sun-like stars suggests that between 20% and 60% of solar analogs have evidence for the formation of rocky planets, not unlike the processes that led to those of Earth. Meyer's team found discs of cosmic dust around stars and sees this as a byproduct of the formation of rocky planets. In 2011 NASA's Jet Propulsion Laboratory (JPL) and based on observations from the Kepler Mission is that about 1.4% to 2.7% of all Sun-like stars are expected to have Earth-size planets within the habitable zones of their stars. This means there could be two billion of them in the Milky Way galaxy alone, and assuming that all galaxies have a similar number as the Milky Way, in the 50 billion galaxies in the observable universe, there may be as many as a hundred quintillion. This would correspond to around 20 earth analogs per square centimeter of the Earth. In 2013, a Harvard-Smithsonian Center for Astrophysics using statistical analysis of additional Kepler data suggested that there are at least 17 billion Earth-sized planets in the Milky Way. This, however, says nothing of their position in relation to the habitable zone. A 2019 study determined that Earth-size planets may circle 1 in 6 sun-like stars. Terraforming (literally, "Earth-shaping") of a planet, moon, or other body is the hypothetical process of deliberately modifying its atmosphere, temperature, surface topography or ecosystems to be similar to those of Earth to make it habitable to humans.
<urn:uuid:2256a280-7690-4242-8869-f5889ed5719a>
CC-MAIN-2021-43
https://www.knowpia.com/knowpedia/Earth_analog
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585209.43/warc/CC-MAIN-20211018190451-20211018220451-00510.warc.gz
en
0.940168
2,801
4.34375
4
Tessa was worried. This was the third morning in a week she’d woken up with a stiff jaw. This morning, it was so stiff that, for a moment, she was concerned she wouldn’t be able to open her mouth at all. Fortunately, after working it for a few minutes, it was OK, but the rest of the day, it bothered her. Would there come a morning when her jaw would remain locked closed? The National Institute of Dental and Craniofacial Research estimates that about 10 million Americans are affected by jaw joint and muscle disorders, commonly called “TMJ” or “TMJD” (temporomandibular joint and muscle disorders). For most people, the condition doesn’t signal a serious problem, and symptoms are usually temporary but, for others, the condition can create chronic discomfort and pain. If you suffer from frequent joint pain and/or stiffness, there are natural and home remedies that can help. What Is TMJ? The temporomandibular joint connects the lower jaw (mandible) to the upper jaw (maxilla) in front of the ear structure. The rounded part of the mandible sits against an indentation in the skull, with a disc-like structure of bone and cartilage between them to keep the joint moving smoothly. Various ligaments in the head and neck hold the joint together, and several muscles are connected to those ligaments to help the jaw move. The joint moves in two different ways. It moves like a hinge on a door, the jaw opens and closes the mouth. Alternatively, with a sliding motion, the jaw moves down and forward, then back, or from side to side. These two motions help you move the jaw in all the ways you need to as you go about your daily life chewing, talking, yawning, singing and wiggling your ears. The fact that the jaw joint moves in these ways also makes it different and more complex than most other joints in the body. TMJ disorders occur when something goes wrong with the jaw joint itself or the ligaments and muscles that surround it. These disorders are typically separated into the following three categories: - Muscle-oriented: Pain and stiffness in the jaw come from inflamed and tight muscles that control jaw function. - Joint-oriented: Pain or movement difficulties come from issues with the joint itself — perhaps a displaced disc, dislocated jaw or other injuries to the joint. - Arthritis-oriented: Arthritis causes degeneration in the joint and the cartilage that cushions it. An individual may have one or more of these conditions at the same time. Whatever is causing the issue, common symptoms include the following: - Pain in and around the ear - Jaw pain or soreness that is more prevalent in the morning or late afternoon - Jaw pain when chewing, biting or yawning - Jaw muscle stiffness - Limited movement or locking of the jaw - Clicking, popping or grating in the jaw joint when opening or closing the mouth - A change in the way the upper and lower teeth fit together - Headaches or neck aches - Tenderness in the jaw or jaw muscles - Difficulty opening and closing the mouth - Sensitive teeth Statistics show that TMJ affects more than twice as many women as men, although scientists aren’t sure why. What Causes TMJ? There are a variety of potential causes of TMJ. They include the following: - Injury or trauma: The joint is damaged by an injury or impact. Possible causes include a car accident, sports injury or blow to the jaw. - Arthritis: The joint’s cartilage is damaged by arthritis. This is more common as people get older or in those that have arthritis in their families. - Disc problems: The disc erodes or moves out of its proper alignment, no longer providing proper cushioning to the joint. - Grinding or clenching the teeth: Teeth grinding or clenching during sleep puts stress on the joint and the muscles around it, resulting in pain and stiffness. - Misaligned teeth: Teeth that don’t line up as they should between the top and bottom rows can cause TMJ over time as they work against one another. - Bad posture: If you sit or stand with your head forward a lot, you put extra strain on your head, face and neck muscles. That strain, over time, can lead to TMJ. - Infections: An infection in the jaw joint can lead to symptoms of TMJ. - Stress: Stress can cause muscle tension in the jaw, which can lead to pain and stiffness. Sometimes, individuals may have more than one cause affecting the joint — arthritis and stress, for example, or bad posture and teeth grinding. Examine your lifestyle, check with your dentist and keep a diary of your symptoms to pinpoint what may be causing your jaw pain. Once you have the answer, it will help you choose effective treatments. What Is Lockjaw? Lockjaw occurs when there is a pain, swelling and muscle spasms around the jaw, leaving you unable to open it or shut it temporarily. There are two types of lockjaw, caused by two different things: - Tetanus infection: This is a more serious but rare type of lockjaw caused by an untreated tetanus infection. One of the first symptoms is stiffness in the jaw and neck muscles. The bacteria that cause tetanus are found in soil, manure, and dust. They infect humans by entering through cuts or puncture wounds, usually because of injuries with contaminated objects or because of animal or bug bites. The risk of infection increases if the wound remains dirty. Staying up to date on your tetanus shots prevents this problem. - TMJ: This is a less serious but more common form of lockjaw and is caused by stiff muscles, inflammation or deformed joints that aren’t functioning properly. The muscles can go into spasm, making it near impossible to open your mouth. The most common reasons that TMJ may develop into a locked jaw include the following: - Muscle fatigue: Overuse of the jaw joint, such as that which occurs with excessive gum chewing or nail biting, can gradually shorten and tighten the jaw muscles. Stress and repeated clenching of the jaw or teeth grinding can also result in jaw muscles that go into spasm. - Joint problems: If your jaw clicks or pops regularly, there may be mechanical issues in the joint that can lead to muscle inflammation and spasm. - Jaw injury: If you suffered a recent injury to the jaw, and it’s inflamed, swollen up, bruised or severely damaged, lockjaw can result. - Cancer therapies: Radiation to address head and neck cancer sometimes affects the jaw muscles so that they become less flexible. Treatment for lockjaw usually depends on what’s causing the symptoms. Doctors and dentists typically devise a treatment plan that includes exercises, anti-inflammatory medications or injections and physical therapy to help the jaw recover normal movement gradually. The important thing to know is that TMJ lockjaw is usually not a serious problem and can be addressed with conservative treatments such as those listed below. Making healthy choices for your jaw can also help prevent lockjaw. Only very rarely is surgery necessary and usually as a last resort. In fact, recent research has suggested that jaw surgery should be avoided whenever possible as the outcomes have not shown to be consistently beneficial. Lifestyle Changes and Supplements to Ease TMJ Symptoms If you’re experiencing any of the symptoms of TMJ, it’s wise to adopt lifestyle changes that can help. These include: - Eating soft foods - Applying ice packs as needed to reduce swelling and inflammation - Applying heat when muscles seem tight and stiff - Using over-the-counter pain relievers when needed - Avoiding extreme jaw movements, such as those associated with gum chewing - Improve your posture — stand up straight so that your head, neck, and spine are in proper alignment - Practicing some sort of stress-relieving activity each day, including deep breathing, meditation, journaling, walking and taking warm baths - Using self-massage or other massage treatments around the jaw to loosen up the muscles — gently massage the jaw and temple muscles in a circular motion while opening and closing the jaw slowly for about 30 seconds every four to six hours - Using a mouth guard or stabilization splint overnight to help reduce teeth grinding and relieve pressure on the jaw joint and muscles - Using gentle stretching and relaxing exercises to increase jaw movement ― examples below There are some natural supplements too that can help reduce the inflammation and pain associated with TMJ. Always check with your doctor first: - Glucosamine: Helps rebuild cartilage in the joint, which may improve range of motion. It’s particularly helpful in those with arthritis. - MSM: Helps reduce muscle spasms and inflammation. - Fish oil: Can help reduce inflammation. - Turmeric: Another potent anti-inflammatory agent. It has been found in studies to help improve pain, swelling, and inflammation. - Calcium: Supports optimal bone health in the joint. - Magnesium: Necessary for muscles to relax. - B vitamins: Help relieve stress. Make sure you’re getting the recommended daily allowance. - Cramp bark: Can help reduce muscle spasms — consider this one when your jaw muscles are stiff. Use on the skin only — do not take internally. - Kava: Can help you relax during a stressful period. It also helps tight muscles to loosen. Try a standardized product containing 70mg of the active compounds called “kavalactones” up to three times daily or try kava tea. This herb may make you drowsy. - Valerian: Another calming herb that can reduce the effects of stress. If you’re going through a stressful time in your life and your jaw is acting up, try 300mg, up to three times daily or try valerian tea. This herb may cause drowsiness. Jaw Exercises and Stretches That Help Prevent Lockjaw and Ease TMJ Symptoms In addition to the recommendations above, it may also help to perform the following exercises and stretches regularly to increase jaw mobility and healing. According to one study, therapeutic jaw exercises provided earlier recovery of jaw function than mouth guards or splints, particularly in cases where the disc had been displaced. Below are several exercises you can use to maintain proper TMJ function and ease tight jaw muscles: - Jaw-opening exercise: Open and close your mouth slowly a few times as a warmup. Then, while opening, place your fingers on the top of your front four bottom teeth and pull down gently until you feel a slight discomfort at the side of your jaw. Your mouth should be open wide. Hold for 30 seconds, then repeat three times, gradually working your way up to 12 times. - Smile stretch: Smile as widely as you can without feeling pain. While smiling, slowly open the jaw for an additional 2 inches. Inhale deeply, then exhale while relaxing the smile. Repeat up to 10 times. - Chin tucks: Stand with your shoulders back and chest up. Pull your chin straight back, creating a double chin. Hold for 5 to 10 seconds and repeat up to 10 times. - Yoga neck stretch: Neck stretches can help ease jaw tension too. For this one, cup the base of your skull at the back of your head with your right hand. Sit up tall and lengthen the neck. Then, reach your left arm straight out to the side and turn your head to the left, without letting it tip forward. Hold for three breaths, then repeat on the other side. These exercises should be performed only when your muscles are not in pain. Exercising painful muscles will only make them worse. When you’re in pain, stick to the stretches listed above. When the pain eases, try these exercises to keep your jaw muscles strong: - Thumb under the chin: Place your thumb under your chin, then open your mouth slowly while applying gentle pressure against the movement with your finger. Hold open for 3 to 6 seconds, working the muscles, and then relax. Repeat three to five times. - Wiggle the jaw: Place an object like a pencil between your teeth. Move your jaw gently over the object from one side to the other several times. If this is easy, use a thicker object like a marker. Once you’ve finished going back and forth, move the jaw forward and back by moving the lower teeth forward until they’re in front of your upper teeth. Repeat several times, then with a thicker object. - Contract-relax jaw: Cross your thumb and index finger so that your thumb pushes up against your top teeth, and your index finger pushes down against your bottom teeth. Open your jaw as wide as you can and use your fingers to hold it in this position. Now, push your teeth against your fingers gently as if you were going to close your jaw but use your fingers against the pressure to keep it open. You should feel the muscles contracting. Hold for 10 seconds, then relax. If you can, open the jaw even wider, then perform the contraction again. Repeat the held contraction and jaw opening three times. Always avoid pain. This stretch can help you gradually open your jaw more widely. Combined Jaw Exercises Close your mouth with your teeth touching. Do not clench. Rest the tip of your tongue on the roof of your mouth, just behind your front teeth. Run the tip back toward your soft palate at the back of your mouth as far as it will go without separating the teeth. Hold the tongue in this position while slowly opening your mouth until you feel the tongue being pulled away. Do not open any further, but stay in this position for 5 seconds, and then relax. You should feel the jaw muscles engage. Neck pain can be linked with pain from TMJ. For your guide to eliminating neck pain, check out Neck Pain Solved, here! Haketa, T., Kino, K., Sugisaki, M., Takaoka, M., & Ohta, T. (2010). Randomized Clinical Trial of Treatment for TMJ Disc Displacement. Journal of Dental Research, 89(11), 1259-1263. doi:10.1177/0022034510378424 National Institute of Dental and Craniofacial Research. (n.d.). Prevalence of TMJD and its Signs and Symptoms. Retrieved from https://www.nidcr.nih.gov/research/data-statistics/facial-pain/prevalence National Institute of Dental and Craniofacial Research. (n.d.). TMJ Disorders. Retrieved from https://www.nidcr.nih.gov/health-info/tmj/tmj-disorders
<urn:uuid:4bb713e6-7c8f-4621-9d89-89c897dd74bd>
CC-MAIN-2021-43
https://exercisesforinjuries.com/tmj-why-your-jaw-feels-stiff-and-how-to-relieve-it/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584913.24/warc/CC-MAIN-20211016170013-20211016200013-00030.warc.gz
en
0.934508
3,137
3.140625
3
All children get rashes from time to time, ranging from short term illnesses such as chicken pox, to longer term skin conditions such as eczema. Rashes in children are common and whilst they can be an indication of illness, it is important to remember that it is unlikely that you’ll be handling anything life-threatening or a danger to your child’s long-term health. The nature of rashes make their cause tricky to identify as a parent, as they can present themselves in many different forms. Some are unique to a single clinical condition whereas some are associated with a number of different ailments. Essentially the question is, how are you to know if your child is suffering with something that will clear up on its own or that if it’s a rash that will require a trip to your GP? In an attempt to provide clarification on this confusing topic, Dr Akash Deep, Consultant Paediatrician at The Portland Hospital, part of HCA UK, takes us through the most common rashes seen in children, what they look like and when to seek medical advice. Heat Rash (Prickly Heat) Heat rash is an itchy rash of raised spots which create a stinging or ‘prickly’ sensation on the skin. The rash is usually caused by excessive sweating which leads to a blockage of the sweat ducts in the outer layer of skin. The trapped sweat then leads to a rash a few days later. This rash is common in babies (as they can’t control their temperature) as well as in older children. Heat rash can be uncomfortable, but it is mostly harmless and there are measures that you can take to help soothe the symptoms for your child, such as: - Dressing them in loose cotton clothing - Using lightweight bedding - Bathing them in cool water - Giving them plenty of fluids to drink to avoid dehydration - Applying something cold to the rash, such as a damp cloth or ice pack - Tapping or patting the rash instead of scratching it - Avoiding the use of perfumed bathing products If the rash doesn’t improve after a few days, it’s important to seek medical advice. Chickenpox is a viral illness that most children catch at some point in their childhood, most commonly before they reach the age of 10. Having the Chickenpox virus at some stage in childhood is actually preferable to not having it at all as once you have had the condition it is unlikely that you will get it again – working similarly to a vaccination. The Chickenpox rash is very unique to this specific virus; a rash of itchy spots turn into fluid-filled blisters which crust over and form scabs, eventually dropping off. The severity of the rash differs between cases – some children will only have a few spots whereas others will have them all over their body. The spots are most likely to appear on the face, ears and scalp and then make their way to the under arms, chest, belly and the arms and legs. There is no specific medical treatment for Chickenpox as in nearly all cases it will clear up on its own, but you can take steps to relieve some of the symptoms: - Ensure your child drinks plenty of fluids - Give them Paracetamol to help with pain and discomfort - Cut your child’s nails to manage the damage they can make by scratching their skin - Use cooling creams or gels from your pharmacy - Bathe them in cool water and pat the skin dry (don’t rub) - Sometimes anti-allergy medications and skin soothing lotions can help You should look to seek medical attention if: - You’re not sure if it’s chickenpox - The skin around the blisters is red, hot or painful as this could be a sign of an infection - Your child is dehydrated - They seem to be getting worse If you think your newborn baby may have Chickenpox, then you should ask your GP for an emergency appointment as they can prescribe medicine to prevent complications. Most medicines will need to be taken within 24 hours of the appearance of the rash, which is why it’s so important to act quickly in this instance. Eczema is a long-term condition that causes the skin to become itchy, red, dry and cracked. The most common type is atopic eczema, which mainly affects children but can continue into adulthood. It commonly develops behind the knees or on the elbows, neck, eyes and ears. About one in five children in the UK have eczema, it is very common and while there is no cure, it can be managed and kept under control with certain treatments. If you think your child may have eczema, the best thing you can do for them is seek diagnosis from your GP. Together, you can develop a management and treatment plan for the condition, this will likely involve the following: - Emollients (moisturisers) – used every day to stop the skin becoming dry - Topical corticosteroids – creams and ointments used to reduce swelling and redness during flare-ups - Avoiding triggers – this can include certain fabrics, heat, soaps or detergents etc - Dietary changes – some foods are linked with triggering eczema symptoms, such as cow’s milk and eggs, but this may be unique to the person suffering. - Building a relationship with an eczema specialist Hand, Foot and Mouth Disease Hand, foot and mouth disease is a common, childhood contagious infection that causes mouth ulcers and spots on the palms of the hands and the soles of the feet. Signs of the condition are the described rash, a sore throat, loss of appetite and a temperature above 38C. Unfortunately, there isn’t a cure for the disease and it’s easily spread, so you should keep your child away from school or nursery until they get better. Your child’s immune system will fight the disease and it will typically clear up after about 7 to 10 days. You can help with the symptoms by: - Drinking fluids to prevent dehydration – avoid acidic drinks such as fruit juice - Eat soft foods like soup - Use child-suitable paracetamol or ibuprofen to help ease a sore mouth or throat Impetigo is a common and highly contagious skin infection that causes sores and blisters. They soon rupture and leave crusty, golden-brown patches that look a little bit like cornflakes stuck to the skin. There are two types of Impetigo – bullous and non-bullous. Bullous Impetigo typically affects the trunk (the area of the body between the waist and neck) and cause the fluid-filled blisters that rupture and crust, as described above. Non-bullous impetigo typically affects the skin around the nose and mouth, causing sores that quickly burst and leave red, open patches of itchy skin. Impetigo is rarely a serious condition, but it will need prescribed antibiotic cream to help clear it up. You will therefore need to pay a visit to your GP. As the condition is highly contagious as well as painful and uncomfortable your child will need to stay off school or nursery until they are better. If it is impetigo that your child is struggling with you should: - Keep their sores, blisters and crusty patches clean and dry - Wash your hands and their hands frequently - Wash your flannels, sheets and towels at a high temperature - Wash or wipe down toys with detergent and warm water or anything your child may have come into contact with The rash stops being contagious 48 hours after you start using the medicine prescribed by your GP. Due to the routine meningitis vaccination it is very unlikely that this disease is the cause of your child’s rash, however it’s still important to be aware of how this rash presents itself. One of the key symptoms of meningitis is a blotchy rash that doesn’t fade when you roll a glass over it – if this is the case then you should call 999 or go to A&E. It is very important that meningitis is treated quickly. If the rash does appear to fade under the glass but you’re still concerned, you should, again, seek medical advice as soon as possible – especially if they are suffering other symptoms including: - A fever - Feeling and being sick - Irritability and lack of energy - A headache - Aching muscles and joints - Irregular breathing - Cold hands and feet - A stiff neck - A dislike of bright lights Dr Akash Deep, Consultant Paediatrician, The Portland Hospital For more information contact [email protected] / 020 7025 1363 About The Portland Hospital - Situated in central London and part of the HCA Healthcare UK group of award-winning hospitals, The Portland specialises in three areas: Paediatrics, Obstetrics and Gynaecology. - The UK’s largest private children’s hospital with a 10-bed dedicated intensive care unit, 46 paediatric beds and 155 consultant paediatricians who treat children from new-borns up to the age of 18. About HCA Healthcare UK - HCA Healthcare UK is the country’s largest provider of privately funded healthcare, with 800,000 patient interactions every year. From complex and urgent care, to primary care, outpatient and day-case treatment, we provide expert medical care across our network of hospitals, outpatient facilities and NHS partnerships. - HCA Healthcare UK includes London Bridge Hospital, The Portland Hospital, The Harley Street Clinic, The Lister Hospital, The Princess Grace Hospital, The Wellington Hospital, Roodlane Medical Ltd, and Blossoms Healthcare. HCA UK also partner with leading NHS Trusts to provide care at The Christie Private Care, HCA UK at University College Hospital and Private Care at Guy’s. - In 2017 HCA UK invested £50m in its cancer network in London; £38.2m London Bridge Hospital, Private Care at Guy’s and the £12m HCA UK at Sydney Street, an outpatients and diagnostics centre in Chelsea.
<urn:uuid:0fe02cd3-2db1-4b8a-b7a4-abd150ebc119>
CC-MAIN-2021-43
https://www.mybaba.com/identifying-the-cause-of-your-childs-rash-tips-on-how-to-treat-them/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00029.warc.gz
en
0.949766
2,156
3.5
4
New sources of recovered paper for the recycled tissue industry must be found, say Bill Moore and Susan Cornish of Moore & Associates. Here they analyse the long-term trend, and consider potential answers. Although the global use of recycled fibre as a percentage of tissue/towel mill furnish has peaked, recovered paper (RCP, also known as PfR [paper for recycling in Europe]) is still an important raw material for the sector. Figure 1 shows the fibre sources used by the world’s tissue mills over the last several decades. Since peaking in the year 2000 at about 50%, recycled fibre (RCF) use has declined slowly to the current level of 35%. RCF is being primarily replaced by chemical fibre pulp. This decline in RCF usage by the tissue sector can also be seen in Figure 2 which shows the global usage of RCP by paper and board product grade. In 2008, tissue grades consumed 16.6m tonnes of RCP (8% of world usage) and this dropped to 15m tonnes by 2018 (6% of world usage). The decline in RCF usage is primarily caused by changes in the available supply of the RCP grades relevant for tissue manufacturing. Printing & Writing papers (P&W) are the primary source of RCF for tissue/towel production. Figure 3 shows the global consumption of P&W papers and tissue grades over the last twenty years. From its peak in 2007, global P&W paper consumption has declined from 119.4m tonnes to 98.4m tonnes in 2018. During that time frame, global tissue consumption increased from 26.9m tonnes in 2007 to 39.2m tonnes in 2018. When recovered, P&W papers account for a substantial share of a statistical grade called deinking high grades, or DHG. The world’s primary sources of DHG are North America and Europe where developed economies imply more ‘knowledge workers’ who are the heaviest users of P&W paper grades. Uncoated Freesheet (UFS) is the largest product category within P&W papers, and in both North America and Europe demand has declined significantly in the past five years. UFS demand dropped an average of 4.6% annually from 2015 through 2018 in North America, followed by a steeper decline of 12% in 2019. In 2020 with the emergence of a global pandemic and the closure of offices, stores, schools, public services and the like, steeps declines have continued. In North America, demand dropped an average of 10.5% per month from January through March and an average of 36.8% per month over April and May. Given the slow reopening of businesses, we expect the decline in UFS demand in 2020 to be significant but for the rate of decline to slow somewhat in 2021. For tissue produced from RCF, the cost of RCP is a significant component of overall production cost. Not all tissue brands/ products use RCF and the percentage that do varies considerably by region, with North America (US, Canada, and Mexico), Europe, developed Asia (Japan, Korea, and Taiwan), and the Middle East having the greatest use of RCF. RCF is predominately used in Away From Home products. Much of emerging Asia’s new tissue capacity, particularly China (but also Indonesia and others), and a substantial amount of Latin America’s tissue capacity, is based on virgin fibre. Because of China’s small role in the global DHG market, the country’s significant decrease in RCP imports have had minimal effect on DHG markets in contrast to major impacts on the global OCC and Mixed Paper market. The largest grade within DHG is Sorted Office Paper (SOP), followed by the ledger grades and Coated Book Stock (CBS). Traditionally, the sources of these grades have been office recycling programmes and printer scrap. Starting in the late 1990s, the rapid growth of confidential document destruction and office paper shredding led to strong growth in the volume of available SOP. This market trend was the result of both privacy and legislative/regulatory developments in certain regions, primarily North America followed by Europe. While banks, governments, and insurance companies had always shredded their records, the new laws increased document destruction significantly. But the document destruction business is now declining with the move away from hard copy records. Another large source of DHG, the postal services of the world, have been declining in the developed economies as electronic communications replace hard copy mailings. The other major source of DHG, the printing industry, has also been on a steady downturn in the developed world for some time. While the global recession of 2008/2009 caused a downturn in all paper production, the P&W papers and printing sectors declined dramatically. This was not only due to the recession but also a structural trend of producing/printing fewer hard copy documents, which continues to this day. The overall trend will constrain the supply of DHG going forward but in the short term, the pandemic has exacerbated the slow decline of the printing industry. In the US, the trade press reported many cancelled print runs in April and May and advertising spending more broadly is expected to decline as much as 13% in 2020. While tissue is the largest user of DHG, there are several other users of DHG including production of P&W papers with recycled content, and freesheet deinked market pulp. The use of DHG in RCF-based P&W papers is limited to several areas of the world, primarily the United States, with some in Western European countries and in India. DHG is used little in P&W papers because the high yield losses in the deinking process make it relatively uneconomical. In comparison, DHG has been an economical fibre source for Away From Home tissue, the reason usage has increased for several decades. The production of freesheet deink pulp and its use in P&W papers is declining as overall production of the P&W product grades decline. Figure 4 shows the decline in the use of DHG by the other sectors and consolidation of use in tissue products. A major problem with the supply of DHG is obvious: the use of P&W papers in the developed economies of the world is declining rapidly which constrains the supply of DHG available. With limited growth in the use of P&W papers in Asia, Eastern Europe, and several other regions, the decline in North America, Western Europe, and Japan will more than offset this new available supply. The developing and emerging countries of the world are not increasing their use of P&W papers as they ‘skip’ hard copy documents and move directly to electronic communications. At the same time, tissue mill yields on SOP have declined because quality of the grade is dropping. This results in higher processing costs and an increase in SOP cycle costs (until the last low price cycle, 2019). In addition, reasonably priced virgin fibre pulp such as BEK is readily available, providing tissue mills with a good alternative. The situation is similar in Western Europe as shown in Figure 6. UFS, which accounts for a significant share of P&W papers, is declining at a fast pace relative to DHG. Over the time frame of 2014 to 2021, UFS usage in the region will decline 1.8m tonnes while DHG demand will decrease by only 0.4m tonnes. In Germany, prices for Multi Printing (3.10), two DHG grades used by the tissue sector, reflect this gradual decline in supply. After averaging around 200 euros/tonne through 2016 and through February 2017, prices grew steadily to the 270 Euro/tonne range by the middle of 2018, where they stayed for all of 2018. Figure 8 shows the steady decline in pricing in 2019, followed by a more recent upward price movement in 2020. Figure 8 shows longer range US average SOP pricing from the year 2000 through 2019. It should be noted that the global RCP and DHG markets move together, differentiated only by transportation costs to the end user and currency values. There are several key takeaways from pricing trends: - The 2011 peak of almost $250/tonne for US SOP and the 2018 German Multi Printing average price of 270 euros/ tonne represent a good upper bound price for the market going forward - The bottom cycle pricing of $90/ton in 2001, $110 in 2005, $135 in 2009, and about $145 for 2013 – 2016 (a long trough!) shows a progression upward that Moore & Associates believes will continue. This upward movement of the bottom cycle pricing was reversed in 2019 – which in a number of ways was an anomalous year for SOP. This is a classic characteristic of ‘supply limited’ RCP grade. Expect future bottom cycle prices to increase $5 to $10/tonne in each of the next several pricing cycles. A variety of factors have recently driven the SOP market. Panic-buying and stock- piling of tissue products in spring 2020 occurred as offices closed and the use of UFS, and hence supply of SOP, dwindled. As Figure 9 shows, this resulted in significant SOP prices increases in April and prices remain high through June. With reduced SOP supply and prices spiking upward, substitution of virgin fibrebecomes more attractive and tissue mill demand for SOP slowly moves downward. As consumers become accustomed to the ‘new normal’ and impacts of the recession are felt by greater numbers, we expect consumer demand for tissue products and tissue production level to return to normal levels. Despite this, the ongoing structural decline in UFS usage and SOP supply may allow higher prices to hold for some time. Coated Book Stock (CBS) and Printers Mix, the other key DHG grades used by the tissue sector, have many of the same supply and demand characteristics as SOP. High quality book printing (which generates CBS) after a steady decline, appears to be stabilizing. On the demand side, the tissue sector has reduced the usage of this low yield grade through process changes and higher levels of coated paper in SOP. Because of the demand decrease, CBS, which for decades traded at prices of an average of 120% of SOP, has been on par with SOP for the last five years and is expected to remain at that level going forward. While we will always have peaks and valleys in commodities like DHG, the overall trend line for pricing over the next 10 years is upwards. DHG prices, however, are bounded by the costs for bleached hardwood and eucalyptus pulp as they can be readily substituted for recycled fibres if prices reach levels that are uneconomical. In the second quarter of 2020 we did see an increase in the use of virgin pulp by recycle mills as SOP prices reached high levels. With a constrained amount of P&W papers going into the available supply, new sources of recovered paper for the recycled tissue industry must be found. Potential sources include post-consumer bleached paperboard packaging (both poly coated and uncoated), postal mail, cutting of books, silicone release papers, and greater use of Pulp Substitutes. It is our expectation that more of these grades will be recovered and used by the tissue sector. Some of the hurdles include: collection infrastructure for the post-consumer SBS grades, high mechanical fibre content of postal mail, and a return to cutting of books. Prior to the 1990s, cutting bindings and covers off books was very common. With higher labour costs, safety issues, and higher Mixed Paper prices, this practice was significantly curtailed. With higher prices for ledger grades and lower Mixed Paper prices, will book cutting come back? There are now some highly automated book cutting systems that improve safety and reduce labour costs. The growing brown napkin/towel business is based primarily on Old Corrugated Containers (OCC), but we are seeing increased usage of the RCP grade Mixed Paper also in these products. Brown products, particularly napkins, are being favoured by many cost conscious restaurant chains, not only because of price but also because consumers often see brown napkins as more ‘environmentally friendly’ products. We are currently seeing a surge in OCC prices primarily because of the lack of supply from the shutdown/curtailed retail and commercial sector. Going forward there is very large new demand for the grade as it is the fibre source of choice for corrugated box production. The good news is that the supply of corrugated boxes is growing, very much related to increased e-commerce consumer purchasing. Mixed Paper after a price slump in 2018 and 2019, which saw negative pricing for the grade, has recovered somewhat in 2020, with OCC prices rising sharply. While Mixed Paper may not return to negative pricing, it has the lowest recovery rate of the major RCP grade categories, so supply is plentiful. The challenge is the mixed fibre and contaminants found in this ‘catch all’ grade. The other area seeing renewed activity as a fibre source for tissue manufacturing is non-wood pulps: bamboo, bagasse, wheat straw, grasses, and other agricultural residues. Most of the action on these sources of fibre is still in its infancy, but consumer interest in ‘greener more sustainable’ products may be an important driver here. As the global recovery rate for all RCP grades increases, it is inevitable that overall quality is declining. Two factors contribute to this: the ‘next tonne’ of recovered material is usually more contaminated than the last, easy-to-get tonne, and collection systems become more varied as volume increases. While this has affected the low grades of RCP more than DHG, the tissue sector has also seen quality decreases in much of their RCF supply. There is a move to better measure and control RCP quality in many parts of the developed world, with Europe leading the way. These systematic and sometimes real time measurements not only contribute to better being able to monitor and control RCP quality, but for the tissue sector, they may play an important role in the fibre recipe and process operation adjustments based on changing RCP incoming quality and composition. The most sophisticated of these RCP measurement systems can accurately measure full bales for moisture, plastics and other contaminants, ash, mechanical vs. chemical fibres and even brightness. In conclusion, all businesses face challenges as conditions change in their markets. The sources and usage of recycled fibre in the tissue sector presents some significant issues that the industry is working toward meeting. As the use of Uncoated Freesheet office papers and the supply of SOP diminish, production of packaging is increasing generally, creating more SBS scrap. BothSBS scrap and mechanical fibre grades such as magazines and coated groundwood sections are being used more in tissue production, however growth in this area does not counteract the decline of SOP. In general, SOP and CBS supply will continue to decline for the next ten years but will hit the practical minimum after that. With the acute short-term downturn in SOP supply as a result of the pandemic, short term SOP and CBS market prices are very strong. Demand for SOP will be modest as the industry shifts toward virgin fibre over the long term. Higher bottom cycle prices for SOP and CBS can be expected with limits on top cycle prices due to virgin pulp substitution – except when pulp prices trend upward.
<urn:uuid:e2229819-5ec1-4864-9ff8-15a6416d88d5>
CC-MAIN-2021-43
https://www.tissueworldmagazine.com/departments/exitissues/recovered-paper-supply-already-in-decline-hit-hard-by-the-pandemic/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00110.warc.gz
en
0.952036
3,187
2.75
3
Hpv wart in throat Hpv cancer in throat treatment. Imaging in Otolaryngology: Richard K. Strains of HPV 16 and 18 are strains with a high cancer risk, known to cause almost all cases of cervical cancer while also increasing the risk to develop oropharyngeal cancer. Papilloma on my uvula Human papillomavirus external genital warts Squamous papilloma in throat, Hpv wart in throat Hpv papilloma in throat - Încărcat de - Papilloma in mouth causes Papillon zeugma belek yorumlar Ano ang hpv virus Oxiuri la bebelusi simptome Tipuri de leziuni HPV: Diagnostic, tratament si prevenire Hpv papilloma in throat However, hpv inside mouth, head and neck cancer also refers to other types of hpv inside mouth that arises in the nasal cavity, sinuses, lips, mouth, thyroid glands, salivary glands, throat, or voice box. Hpv cancer in mouth symptoms HPV or human papillomav Tobacco and alcohol use are the leading causes of hpv lesion throat and voice box cancers. Cancers of the head and neck account for 6 percent of all malignancies in the United States. - Wart inside mouth. - Tratamentul viermilor de hookworm - Wart inside mouth, Hpv inside mouth - Human papillomavirus infection dental - Imagini parazite ale pielii - Hpv inside mouth, Tenic într o singură persoană - Cancer bucal en ninos Caucasians currently have the highest incidence rates of head and neck cancers, although death is still highest in African Americans. Tobacco including smokeless tobacco and alcohol use are very important risk factors for oral, head and neck cancers, particularly those of the tongue, mouth, throat and voice hpv wart in throat papilloma in throat. Chewing tobacco hpv papilloma in throat been shown to cause mouth cancer. Human Papilloma Virus may be related hpv wart in throat over half of tonsil cancers. Diagnosis banding enterobiasis HPV-related throat cancer: Papiloame plate ce să facă Clinic Radio Cigarette smoking increases your risk of head and neck cancer by 15 times compared to a non-smoker. Metoda pentru enterobioză who use both tobacco and alcohol are at greater risk than people who use them alone. For example, where the cigarette sits on the lip, or where the chewing tobacco is placed in the mouth. Hpv and throat and neck cancer - Formular de căutare Hpv in throat signs Hpv positive throat cancer treatment hhh Cervical Cancer Oral Sex Hpv in throat symptoms Hpv throat îndepărtarea verucilor genitale yuao symptoms causes Hpv on throat, Hpv in throat signs Cancerul de san probleme de dependenta Acestea sunt clasificate în grupuri cu risc scăzut şi grupuri cu risc hpv and throat cancer statistics, în funcţie de potenţialul oncogenic. Histologia papilomelor Human Papillomavirus and Head and Neck Cancer parazity v ludskom tele priznaky Papilomul oral la câini, Symptoms of throat papilloma Ce este cancerul de gat? Can a throat papilloma be cancerous - hhh Cervical Cancer Oral Sex Oropharyngeal human papillomavirus Traducerea «papillomavirus» în 25 de limbi According to some recent studies, the HPV infection may also increase the risk of cardiovascular diseases. Environmental hpv lesion throat such as exposure to sunlight can cause skin cancer, melanoma including cancers of the lips. A red or white patch in the mouth or hpv wart in throat sore throat can be the first signs of cancers of the mouth and throat Hoarseness or a cancer facial simptome in the voice can be the first sign of cancer of the voice box. Hpv papilloma hpv wart in throat throat hpv papilloma in throat of thyroid cancer has increased in hpv lesion throat races and in both males and females in the hpv papilloma in throat two decades. Hpv cancer in throat treatment Volunteers sought: People with HPV-positive tonsil and tongue cancers paraziti zivotinja Que hpv inside mouth cancer fase 1 hpv virus hpv inside mouth symptome, symptomes anemie cancer de colon vertebral. Thyroid cancers account for over 55, new cancers each year in the US. Over the past ten years, an hpv wart in throat number hpv lesion throat people with Human Papilloma Virus Hpv lesion throat who were young, non-smokers have developed cancer of the tonsils and back of the tongue tongue base. Hpv inside mouth Apasă pentru a vedea definiția originală «papilloma» în dicționarul Engleză dictionary. Throat cancer and human papillomavirus hpv - Apasă pentru a vedea traducerea automată a definiției în Română. Papiloma Papilloma Papilomul se referă la o tumoare benignă epiteliană care crește exofitic hpv papilloma in throat frunze asemănătoare niplului și, adesea, asemănătoare cu degetele. În acest context, papila se referă la proiecția creată de tumoare, nu o tumoare pe hpv wart in throat papilă deja existentă. Atunci când este utilizat fără context, se referă frecvent la infecțiile cauzate de papilomavirus uman, hpv lesion throat ar fi negi. Men are affected about twice as often as women with oral cancer. Hpv inside mouth, Hpv roof mouth Overwhen you include thyroid cancer. Most oral cancers form on the hpv lesion throat, tongue, or floor of the mouth. Papilloma in mouth causes Hpv papilloma in throat Papilloma virus sul palato They also may happen inside your cheeks, on your gums or on the roof of your mouth. Oropharyngeal cancer is different from oral cancer. Hpv lesion throat Înțelesul "papillomavirus" în dicționarul Engleză Oropharyngeal hpv papilloma in throat are related to HPV usually and occur in the tonsil or base of tongue while oral cancers are in the mouth and usually caused by tobacco use. Most head and neck cancers can be prevented. Head and neck cancers often spread virus papiloma numero 52 the lymph nodes of the neck. Chemotherapy may be added as hpv inside mouth adjunct in certain situations for advanced disease. Can hpv cause jaw cancer Treatment hpv lesion throat head and neck cancers requires the assistance of many different professionals, such as surgeons, radiation oncologists, medical oncologists, hpv wart in throat, nutritionists, and speech therapists. Tipuri de hpv lesion throat HPV: Diagnostic, hpv inside mouth si prevenire About half of throat cancers occur in the larynx voice box. In the US, a new head and neck cancer case is diagnosed every 10 minutes and a person dies from this disease every 45 minutes. Removal is highly recommended. Hpv lesion throat laser laryngeal papilloma hhh Cervical Cancer Oral Sex Papilloma virus zone Endometrial cancer hipec Virusul papiloma uman HPV : Simptome, diagnostic și tratament - Symptoma® Thyroid cancer can develop in anyone, although there often is hpv papilloma in throat family history or exposure to radiation involved. Hpv lesion in throat. Tratamentul carcinoamelor de planşeu oral anterior Salivary glands also do not seem to be related to any particular cause. Only about 1 in 20 thyroid nodules are cancerous. The two most common types of thyroid cancer are called papillary carcinoma and follicular carcinoma. Hpv causes mouth cancer Volunteers sought: People with HPV-positive tonsil and tongue cancers paraziti zivotinja Traducerea «papillomavirus» în 25 de limbi Thyroid cancer is more common in women than in men. In hpv hpv inside mouth traitement, thyroid cancer is one of the least deadly cancers of the head and neck. The most common type of cancer in the nasal cavity and paranasal sinuses is squamous cell carcinoma. Hpv wart in throat Apasă pentru a vedea definiția originală «papillomavirus» în dicționarul Engleză dictionary. Wart inside mouth It makes hpv lesion throat a little over a half of the cancers. Cancers of the nasal and paranasal cancers are rare; about 2, people develop these cancers every year. GENITAL WARTS, Causes, Signs and Symptoms, Diagnosis and Treatment. Sinus cancer should be considered when someone has constant nose bleeds, numbness of the cheek, facial swelling or hpv papilloma in throat. People who work in environments with dust, glues, formaldehyde, mustard gas, certain heavy metals, and radium are at higher risk for developing nasal and paranasal cancer. There are several different glands found inside and near the hpv lesion throat. Several types of cancers can start in the salivary glands. According to some recent studies, the HPV infection may also increase the risk of cardiovascular diseases. Strains hpv wart in throat HPV 16 and 18 hpv wart in throat strains with a high hpv lesion throat risk, known to cause almost all cases of cervical cancer while also increasing the risk to develop oropharyngeal cancer. Hpv in throat treatment Structura HPV women. Fig 1. Every hpv wart in throat there are about 2 cases per everypeople of salivary cancer. The average age that salivary cancer is found is Once cancer is in the lymph nodes, it is more likely to spread throughout the body. Patients with cancers treated virusi tipuri the early stages may have little post treatment disfigurement.
<urn:uuid:d29b2112-60ec-4524-b481-094428b6264e>
CC-MAIN-2021-43
http://mobilserv.ro/200-hpv-inside-mouth.php
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587854.13/warc/CC-MAIN-20211026072759-20211026102759-00470.warc.gz
en
0.831062
2,358
2.515625
3
By splitting up the workload and giving more than one person control over processes, separation of duties (SoD) ensures that multiple people share responsibilities in a series of checks and balances, reducing the chances of errors or fraud. Implementing separation of duties for a security team takes some time, but it’ll make the process of managing the organization’s network safer. What is Separation of Duties Anyway? In the world of finance and accounting, separation of duties is a common practice. By separating those in the organization who handle receipts from those who make the bank deposits from those who pay the bills, for instance, the organization reduces the chances of fraud. If one person controlled all of those aspects of the organization’s financial side, they could misappropriate or steal funds, altering the accounting records to hide the bad actions, and it would be difficult for someone outside the accounting department to catch the fraud. SoD in Security Within an IT department, separation of duties (also called segregation of duties) refers to the network security of the organization. Implementation of SoD in terms of security deals with both fraud and hacker attacks. - Fraud: Detecting fraud through the implementation of SoD involves enacting policies that find conflicts of interest or unchecked errors before those problems could place the network at risk. - Attacks: By implementing SoD control features, the organization’s security department should be able to detect potential theft of information or security breaches before they happen. In basic terms, SoD involves implementing a series of checks and balances that ensure the security team can keep the organization’s network and data safe from both internal and external attacks. How Separation of Duties Works When developing a separation of duties plan, the organization’s security team will come up with a list of tasks and duties the plan should address. The team then determines how to split up the duties properly to create the desired level of checks and balances. Some of the most important aspects of creating an SoD plan include the following: - Data Management: Security team members should rank data in terms of its sensitivity levels. Data deemed to have the highest levels of sensitivity should receive the greatest protection under the SoD plan. Commonly available data doesn’t need protection. - Data Ownership: Should some of the organization’s members only need access to sensitive data occasionally, the SoD plan should spell out who can grant them access to this data and how at least two members of the security team will track the use of the sensitive data. - Modifying the Network: Any modification of the network processes should need approval from at least two team members, whether that involves changing network permissions, downloading software, or making adjustments to the network firewall. - Monitoring System Logs: Within the SoD plan, no single person should have the ability to review and edit system logs without oversight from another team member. - New Accounts: When new employees join the organization, checks and balances in the creation of new accounts will catch errors or fraudulent activity that would give a new employee unnecessary network permissions. Common Mistakes in Creating an SoD Plan The biggest mistake organizations make in terms of trying to create a separation of duties plan is not discussing the roles and oversight thoroughly enough as a team. Without clear role assignment and oversight, some aspects of network security may not have the proper level of checks and balances, creating exploitable holes in the system. Additionally, it’s important for the security team to run detailed tests on the plan before implementing it. The testing process should catch areas where only one person has control of a certain aspect of the network, as well as places where the definition of the members’ roles is lacking necessary detail. Even if your organization hires a third-party group to oversee your separation of duties plan, you should have a few people who review the work of this third-party group on a regular basis. Example 1: Defeating Inside Attacks Team members have access to the network every day, allowing them to do their jobs and to keep the organization working smoothly. Although you trust your team members, the chances of a cyberattack that originates from inside the organization is always a possibility. Implementing a proper SoD plan will help you greatly reduce the possibility of this type of attack. With checks and balances in place, other team members should be able to spot clues that reveal the possibility of an inside attack. Thwarting Planned Inside Attacks Within an SoD plan, at least two team members should always have oversight of the system. Should an employee attempt to upload malicious software or malware to harm or bring down the network, for example, having more than one person in charge of searching for malware increases the chances of catching it before it does damage. Should one of the security team members be initiating the attack, having a second person involved in checking for attacks will thwart the first person. As an added benefit, any employee considering starting an inside attack may choose not to because of the strong separation of duties plan in place. The employee knows they will not be able to avoid detection, so they won’t try the attack. Thwarting Inadvertent Inside Attacks Some inside attacks are inadvertent. The right SoD plan should catch these potential errors before they happen too. Suppose a team member who has oversight for downloading apps and software unknowingly downloads malware or another type of malicious software. Under the SoD, a second team member would also be able to oversee the software downloads, hopefully spotting the dangerous software in case the first person misses it. Without an SoD plan, if only the first person has oversight regarding downloading of apps, the malware may end up on the network without detection. The team member probably didn’t mean to download the dangerous software, but the result is the same as if the attack occurred on purpose. Example 2: Protection of Data Preventing data breaches is a key role of any organization’s security team. A data breach could lead to significant financial loss for the organization, either through the loss of customer trust or through financial judgments against the organization. Governmental oversight requires protecting sensitive data for customers and employees. If hackers steal credit card information or Social Security numbers, your organization could end up receiving significant financial penalties. Ensuring data protection through the implementation of a separation of duties plan involves a few different practices. Viewing Sensitive Data The security team needs to ensure that only those members of the organization who need to see sensitive personal data for customer relations have access to this data. At least two members of the security team need to be able to review which people have access to sensitive data and to make adjustments to permissions as needed. Without an SoD plan in place and without clear oversight from security team members about who receives access to this data, the likelihood of an employee having unnecessary access to sensitive data goes up. This error would increase the potential for the data to fall into the wrong hands through fraud or hacking. Tracking Those Who Access Sensitive Data The separation of duties plan should set up a tracking process for monitoring which employees gain access to which types of sensitive customer data. Should a data breach occur, being able to track who accessed the sensitive data can help the security team discover the source of the breach. The SoD plan should implement checks and balances so that at least two people work together to track down the information. With oversight from multiple people, there’s no chance of the same person who caused the data breach also being the only person who is investigating the breach. Example 3: Splitting Network Oversight Duties If an attack occurs where hackers steal the login credentials for a member of the security team, your organization’s SoD plan can limit the amount of damage the hackers can accomplish before you discover the intrusion. Without an SoD plan in place, members of the security team may have access to the network without any checks and balances from other team members. If the hackers are able to steal the credentials for one of these powerful team members, they could take full advantage of their newfound access, doing significant damage to the network and stealing significant amounts of sensitive data. By splitting up the duties of the security team among several different people, no single team member has unchecked power over the network and the organization’s data. Consequently, the hackers would not be able to gain unchecked power either, unless they manage to steal credentials for multiple people. Example 4: Implementing Technical Safeguards A significant part of any organization’s security plan includes setting up firewalls, intrusion detection systems, and vulnerability scanning. If one team member has control of all of these aspects of network protection, it’s possible that this person will miss something, leading to a breach. Having a separation of duties plan in place that splits control and management of these safeguards ensures that multiple team members have a role in managing and monitoring the network’s protective measures. Whether a team member makes an error with the network’s management software on purpose or inadvertently, having checks and balances in place should allow the security team to catch the error before significant damage occurs. How to Get Started With Separation of Duties Here are some ideas to help an organization begin implementing an SoD plan. Perform an Assessment of Risk Before assigning responsibilities within the organization regarding security measures, it’s important to understand exactly where your organization’s vulnerabilities lie regarding security. You then can build the SoD plan around the risks. Additionally, the risk assessment should define the potential security risks for each position on the security team. Define the duties for each position, and then determine what kinds of security risks those duties have. Undertaking a detailed assessment of risk for your organization’s security measures should be a regular process. Depending on how quickly the organization is growing and changing, you may need a reassessment every three to six months. For an organization growing at a slower pace, an annual reassessment probably will be sufficient. Hire a Third-Party Security Service Third-party companies are available to handle the security concerns of an organization. These organizations can perform a variety of security functions including: - Performing a risk assessment - Developing a security plan - Running a security audit - Testing the security measures - Creating reports for the organization to review - Monitoring the safety of sensitive data - Watching for security breaches Hiring an outside team to take care of the implementation of security measures for the organization fits the definition of separation of duties. No employee would have control over the security processes, reducing the chances of fraud. The organization may want to have the third-party security service report to multiple people in the organization or to an audit committee to follow SoD practices. You don’t want one person in your organization to have access to all of the reports, determining which information they choose to share with the rest of the team. Another reason to consider hiring a third-party service is to support a small security team. If the team members are able to handle certain aspects of the separation of duties plan, the third-party organization could cover any remaining areas outside your team’s bandwidth. Determining the Success of an SoD Implementation After creating a separation of duties plan, the security team can ask itself a few different questions to test the usefulness of the plan. If the answer to any of these questions is no, the plan will need some tweaking to make it something the organization can implement. - Does one person control sensitive data? Any sensitive customer or organizational data should have at least two people with the ability to track its usage. This ensures one person cannot move, delete, or copy the data without the knowledge of at least one other member of the security team. - Does one person handle security monitoring? At least two members of the security team should be able to monitor warnings about security breaches or digital attacks. If only one person monitors this information, they could allow hackers to go unchecked, either on purpose or inadvertently. - Does any employee have responsibilities that conflict? If one member of the security team has responsibilities for implementing the security plan and also testing the security plan, this could result in holes in the plan. The person implementing the plan may not see the need to run extensive tests, for example, or may decide to manipulate the plan or its testing to their own benefit. - Are subordinates monitoring the actions of supervisors? Unless your security department is extremely small, only consisting of a few people, subordinates should not receive responsibilities that would require them to monitor the actions of a supervisor. This could cause significant conflicts of interest. - Are non-security personnel involved? Again, unless you have a small security department, you may not want employees who rarely deal with security to have responsibilities under separation of duties. Non-security personnel may not understand exactly what kinds of problems they should watch for, and they may not have the time to appropriately dive into security issues, allowing potential breaches to occur. Another option is hiring a third-party auditor to study your organization’s SoD setup to determine whether it is as safe as it could be.
<urn:uuid:7899cd17-020a-4a2e-b2b9-89b464466a86>
CC-MAIN-2021-43
https://nira.com/seperation-of-duties/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585025.23/warc/CC-MAIN-20211016200444-20211016230444-00310.warc.gz
en
0.935163
2,718
2.984375
3
WHY DO KOREAN PEOPLE OFFER FOOD TO THE PHOTOS OF THE ANCESTORS? 제사 JESA – Remembering and honoring the ancestors. If you like watching heart-warming Korean family dramas like Neongkuljjae Gulleo-on Dangshin 넝쿨째 굴러온 당신 (My Husband Got a Family, KBS 2, 2012), where extended families of many generations live together under the same roof (which was typical until recently), there is this scene where everyone in the family gathered around a huge, low dining table on which a wide array of traditional Korean dishes and seasonal fruits were presented in front of the photos of the ancestors, followed by a series of rituals like burning incense, bowing, offering rice wine, and sticking a spoon upright in a rice bowl. What you just saw is a traditional memorial ceremony for ancestors called jesa 제사. Technically speaking, jesa can refer to any type of memorial ceremony, but they are categorized by when they are held. Here is a lengthy list of rituals and their dates you can remember before-hand. – FOR UP TO YOUR GRANDPARENTS OF THE PATERNAL SIDE. – IF BOTH HAVE PASSED AWAY, A SINGLE JESA IS HELD FOR BOTH, ON THE DEATH ANNIVERSARY OF THE GRANDFATHER. (Fall Harvest Festival, 15th day of the 8th month of the lunar calendar). Gijesa 기제사 – On the night before or morning of the ancestor’s death anniversary Sije 시제 – Every season, for ancestors who are the fifth generation and beyond. Myoje 묘제 – Memorial ceremony held at the gravesite Seongmyo 성묘 – On Hansik 한식 (April 5th) and Chuseok. It’s a memorial ceremony performed at the gravesite of the ancestors. On top of the memorial ceremony, families tidy up the grave by cutting the weeds and mowing the grass. ORDER OF THE CEREMONY Truth be told, the rituals are quite complicated and even the most orthodox Confucian families have a difficult time remembering everything, not to mention the average Korean. But getting bogged down in the rules and having a headache is not what the ancestors want. What they would really want to see is everyone getting together, having a good time while remembering, and honoring the ones that came before them. In light of preserving the tradition, though, here is the typical order of the memorial ceremony. Kangshin 강신 – “Inviting The Souls Of The Ancestors” All attendees stand before the altar while the eldest male descendant, jeju, kneels down in front of the memorial altar. He burns three incense sticks and bows twice. (Sometimes the bowing is skipped). The jeju kneels again. Another person (usually the wife) gives the jeju an empty cup with a saucer and pours it (about 30% full). The jeju then takes the cup and makes a circle three times over the incense. The liquor is poured into a bowl filled with sand, called 모사 mosa, in three equal pours. The empty cup and a saucer are returned to the wife. The jeju makes two full bows. It’s believed that the incense invites the souls of the ancestors from the above and the liquor invites those from the underground (which the sand is symbolic of). Chamshin 참신 – “Greeting The Souls Of The Ancestors” All attendees make full bows (twice for men and four times for women). Choheon 초헌 – “First Offering Of Rice Wine” The jeju makes the first offering of rice wine, followed by his wife. At the conclusion of the first ritual offering, the jeju makes two full bows and the wife makes four. Aheon 아헌 – “Second Offering Of Rice Wine” The second eldest male descendant within the family (the next eldest sons or sons-in-law) makes an offering of rice wine, following the same procedures. Jongheon 종헌 – “Final Offering” The offering of rice wine continues until no high-ranking male descendants are left. Sapsi 삽시 – “Food Serving” The meals are served to the ancestors by the jeju, by sticking a spoon upright in the middle of the rice bowl. Yushik 유식 – “Receiving of the Offerings” All attendees leave the room or turn away for a few minutes so that the souls of the ancestors can enjoy the offerings. Cheolsang 철상 – “Removal of Table” The table is cleared by first blowing out the candles and removing the dishes on the table, starting from the innermost. All the attendants make two full bows, sending the spirits off. Eumbok 음복 – “Receiving Blessings” Attendees share the food offerings removed from the table and partake in the feast, and it symbolizes the receiving of the blessings from the ancestors. WHAT’S OFFERED ON THE TABLE? When it comes to what goes on the table, there’s no one right answer. It’s different from region to region, and from family to family. With the change of times, what was not available in the past, such as the non-traditional Korean dishes and fruits like pizza and banana started to appear on the table, because the idea is that at the end of the day it’s the deceased ancestors whom the memorial ceremony is held for, and if they liked them when they were alive, then why not serve them what they liked? Of course, Korean traditionalists would frown upon the setup. With that said, let’s look at a typical table setting for a Jesa ceremony to see what it looks like. Row 1 – Rice and soup, but on Seollal, tteokguk 떡국 (rice cake soup) is served instead. When serving liquor, it has to be clear (e.g., filtered rice wine). Songpyeon (half-moon shaped rice cake) takes the place of liquor and rice during Chuseok. Row 2 – Various kinds of meat, pancakes, and fish. When you put the fish, keep the head facing east (right). Place the meat on the left side, and the fish on the right side. Row 3 – Various soups. Place in the order of meat soup, tofu soup, and fish soup. Place soy sauce between them. Row 4 – Vegetables, dried fish, and shikhye 식혜 (sweet rice drink). Place the dried fish on the left (west). Shikhye goes on the far right. Row 5 – Place fruits, cookies, and desserts. – Peaches because they expel ghosts & spirits. – No fish ending with “chi” such as kkongchi 꽁치 (mackerel) and galchi 갈치 (cutlass fish) because it’s believed that fish without scales are “cheap.” – Red beans, food with gochugaru 고추가루 (red pepper powder) or garlic seasoning cannot be served because ghosts and spirits hate red color and garlic. WHY ARE THE FOODS PLACED IN SPECIFIC ORDER? ARE THERE ANY RULES? Banseogaengdong 반서갱동: Rice on the west, soup on the east (opposite to the living). Jeokjeopgeojung 적접거중: Roast meat in the center. Eeodongyukseo 어동육서: Fish on the east and meat on the west. Dongdoseomi 동두서미: The head facing the east and the tail facing the west. Baebokbanghyang 배복방향: Dried fish with its back upward. Sukseosaengdong 숙서생동: Cooked vegetables on the west and raw kimchi on the east. Hongdongbaekseo 홍동백서: Red fruits on the east and white fruits on the west. Jwapouhye 좌포우혜: Dried fish at the left end and shikhye at the right end. Dongjoseoyul 동조서율: Dates on the east and the chestnuts on the west. Joyulishi 조율이시: Starting from the left, place dates, chestnuts, pears, and persimmons. Although their origins are unclear, the above rules have been passed down as a custom by posterity, and some of the rules contradict each other. For example, if you place red dates on the left, following the joyulishi rule, you are violating hongdongbaekseo rule which dictates that red should go east (right). Are they not only complicated to follow? They often cause quarrels among family members. WHAT ARE THE ANCESTRAL TABLETS? Shinwi 신위 is one of the objects representing the presence of the dead, such as portraits or memorial tablets. Originally, it was made of wood, and normally it was not easy for most families to build a shrine. Therefore, jibang 지방, a disposable shinwi, was made before the rite. It contains the information of the name and official position of the deceased on a piece of paper and was burnt after the memorial ceremony. These days, portrait photos are a more popular choice. WHY IS A FOLDING SCREEN SET UP DURING A JESA CEREMONY? Byeongpung 병풍 is a folding screen with poetic calligraphy written across it which is set up facing north, as it’s the direction for the dead. Not only does it cover other household objects like the TV during jesa, but it is symbolic of the presence of the dead because, in traditional funerals, the body of the deceased was put behind it. WHY ARE ONLY WOMEN RESPONSIBLE FOR PREPARING FOR JESA? While many look forward to the long holiday, it’s a time many married Korean women fear – the never-ending kitchen labor, spending all day in the kitchen, making a large feast for jesa and charye held for their husbands’ ancestors! It’s because when a woman gets married in Korea, she becomes part of the husband’s family, and the priority is always put on the husband’s family matters. For example, visiting the home of the husband’s parents is essential during the holidays, while that of her parents isn’t. Inevitably, pent up emotions rise to the surface during the holidays – tensions between the in-laws and labor inequality are all contributing factors to the divorce rate that skyrockets after the holiday season. It’s a Korean drama cliche where couples wrangle with each other in a car on their way back to Seoul from their visit to the husband’s parent’s home in the countryside. HOW DO KOREANS WITH DIFFERENT RELIGIONS HANDLE JESA? Korea is a free country where freedom of religion is guaranteed by the constitution. When it comes to jesa, Catholics (the Catholic Pope formally recognized it as a civil practice in 1939) and Buddhists practice the memorial ceremonies, while Protestants do not (as it could be viewed as “worshipping” other deities besides the Lord). So the Protestant members of a family are excused from partaking in the ritual.
<urn:uuid:66e73a4b-00e9-4222-9ae8-9af90eb18ba1>
CC-MAIN-2021-43
https://hyphe-nated.com/why-do-korean-people-offer-food-to-the-photos-of-the-ancestors-jesa-%EC%A0%9C%EC%82%AC-remembering-and-honoring-the-ancestors/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00350.warc.gz
en
0.942368
2,655
2.640625
3
Jewish Political Studies Review 21:3-4 (Fall 2009) The Jewish community in Great Britain, once regarded as an inspiring model, has undergone a steep numerical decline from around 450,000 souls in 1945 to less than 300,000 today. A generally low birth rate, childless “partnerships,” intermarriage, and the loss of observant families through aliyah account for much of this erosion. Another reason has been the failure of mainstream Orthodoxy – represented by the United Synagogue and the Chief Rabbinate – to stem the religious drift and keep most of “Anglo-Jewry” within its ranks. How this process began and developed is the subject of Meir Persoff’s informative and enlightening study. A well-known author, journalist, and former editor of the influential weekly the London Jewish Chronicle, Persoff brings an insider’s knowledge of and insight regarding the workings and history of the Anglo-Jewish community and its religious leadership. In his introduction, Dr. Todd M. Endelman, William Haber Professor of Modern Jewish History at the University of Michigan, neatly sums up the message of this volume, when he observes that “Chief Rabbis…variously battled with their own clergy and lay leaders, as well as with the religious leadership of congregations both to their left…and to their right….” Essentially, Faith against Reason shows how successive Chief Rabbis, in their effort to prevent schism, fell into the trap of confusing Jewish unity with religious uniformity. The author begins with the “Great Secession” of 1842 which resulted in the establishment of the West London Synagogue, whose mainly Sephardi membership desired a more conveniently located place of worship. This led to the rabbinic herem (excommunication) and ensuing bitterness. Although the Sephardic authorities withdrew their herem in 1849, allowing erstwhile opponents to be reconciled, the Ashkenazi Chief Rabbinate never formally revoked the ban. Persoff argues that had wiser counsels prevailed, authorizing the establishment of branch synagogues in the West End, secession might have been avoided. In addition to opposing new synagogue locations, the rabbis objected to changes such as English sermons and more decorous services. Persoff observes that at this point “British Reform was a lukewarm affair. Hebrew remained the language of prayer; liturgical references to the messianic redemption, the return to Zion and the chosenness of the Jews were retained; organ music was delayed for two decades; and mixed seating was to await the twentieth century.” As time would show, most changes made by those who seceded differed little from those eventually sanctioned by Chief Rabbi Nathan Marcus Adler. Despite Rabbi Adler’s neo-orthodox training and German doctorate, political considerations influenced many of his decisions. For example, his attempt to prevent the registration of the West London Synagogue’s marriage secretaries by an Act of Parliament in 1856 met with failure and caused further dissension. And although Adler and his supporters (notably Sir Moses Montefiore) prevented reformers from serving on the Board of Deputies, he maintained good relations with wealthy reformers but neglected the lower-class Jews. His major achievement was the founding of Jews’ College – the rabbinical, cantorial, and teaching seminary – in 1855. His son and, in 1891, his successor, Hermann Adler, fostered minhag anglia, a peculiarly “English tradition” in behavior, clerical dress, and worship influenced by the Anglican clergy. He also sanctioned a new, anglicized prayer book. Edited, with a new translation, by Simeon Singer, this Authorised Daily Prayer Book of the United Hebrew Congregations of the British Empire (ADPB), first published in 1890, enjoyed wide-spread popularity and went through numerous reprints before its first revision in 1962. While omitting or abbreviating many traditional prayers and blessings, the ADPB introduced new ones (often of the rites de passage type) designed for late Victorian Anglo-Jews. Strictly orthodox Jews vehemently opposed such innovations. For the Jewish masses escaping to England from the Russian pogroms there was little or no difference between United Synagogue congregations and the reform synagogues in London and Manchester. They had no use for the ADPB, and in their eyes Hermann Adler was the “Chief Reformer.” Aiming to integrate these newcomers without undermining their orthodoxy, Samuel Montagu (the first Lord Swaythling), a strictly observant Jew, established a new roof organization, the Federation of Synagogues. Nevertheless, in 1889, the Chief Rabbinate had to face the challenge of a reformist group within the United Synagogue itself, whose prominent members – led by Morris Joseph, Simeon Singer, and Israel Abrahams – held “revised” services with a mixed choir and organ accompaniment, which attracted hundreds of nominally orthodox and reform Jews in the Hampstead area on Saturday afternoons. A greater crisis was still to come. In 1902, Singer and other representatives of the United Synagogue established the Jewish Religious Union which held services on Saturday afternoons without separate seating for men and women and without a sefer torah. While Singer returned to the fold, Claude Montefiore, a great-nephew of Sir Moses and Lily Montagu, daughter of Lord Swaythling, became the cofounders of a radical movement that broke away from Orthodoxy – not Reform – and out of which Liberal Judaism would emerge. In Britain, “Liberal Judaism” is what is called “Reform Judaism” in the U.S., while “British Reform” is less radical. The next Chief Rabbi, Joseph Herman Hertz, first rabbinical graduate of the Jewish Theological Seminary in New York, championed its “enlightened Orthodoxy,” which he styled “Progressive Conservatism.” Hertz saw a far greater threat in the Liberal movement than in English Reform, and endeavored to maintain a policy of conciliation vis-à-vis the moderate reformers. He also faced criticism on the right by uncompromisingly orthodox rabbis such as Victor (Avigdor) Schönfeld and Isaac Halevi Herzog, who objected to his presence alongside non-orthodox clergy at various communal events and to his conciliation of reformers. While Hertz endeavored to reassert his authority within the orthodox mainstream, the Second World War radically changed Anglo-Jewish life and many refugee rabbis found a welcome in reform congregations. In a letter to the United Synagogue’s lay leaders (April 1945) venting all his pent-up frustration, Hertz cited numerous examples of their interference in exclusively religious affairs. This bitter conflict ended with the death of Hertz in January 1946. No great religious revival had taken place during his years in office, but he bequeathed to Anglo-Jewry works of lasting value, notably the Pentateuch and Haftorahs (1936) and an enlarged Daily Prayer Book (1941), both of which included his notes and commentary. Israel Brodie, the next Chief Rabbi, educated at Jews’ College and Oxford, had served as a chaplain to the forces in two World Wars and was a popular congregational rabbi in Australia. An excellent speaker and an English gentleman, Brodie surprised the wealthy laymen by waging war against the resurgent Liberal and Reform movements, emphasizing the rate of intermarriage that made conversion to Judaism “a thorny issue.” He also opposed any attempt by the Conservative movement in North America to “infiltrate” Europe. During Brodie’s tenure, the lay leaders became more observant and Singer’s prayerbook underwent a major revision in 1962. It was Rabbi Brodie’s misfortune that during his term as Chief Rabbi the so-called “Jacobs Affair” took place. This affair rocked the orthodox community and led to another “Great Secession.” Persoff devotes two chapters of Faith against Reason to the issues and personalities involved. Louis Jacobs attended a yeshiva in Manchester, where he was ordained. While studying Semitics at London University, he discovered “higher criticism” of the Bible which influenced his views on the origins and authorship of the Torah, his religious outlook, and his future path. Jacobs expressed these ideas in his induction sermon at the New West End Synagogue (1954) and in books such as We Have Reason to Believe (1957) and Principles of the Jewish Faith (1964). The Chief Rabbi became aware of Jacobs’ views when he started lecturing at Jews’ College, a stepping stone to the Chief Rabbinate. When Brodie vetoed his appointment as principal of Jews’ College after Isidore Epstein’s retirement, a public battle ensued between Jacobs and his supporters (“Jacobites”) and Brodie and his dayanim (“Israelites”). The Jewish Chronicle and the media misrepresented the dispute as one between an enlightened Jewish theologian and “foreign rabbis” and “obscurantists.” Jacobs resigned from Jews’ College and, along with his supporters, established the independent New London Synagogue, which eventually allied itself with the Conservative movement, but remained “traditional.” Had Jacobs defined his religious position more forthrightly at the outset, the United Synagogue and Anglo-Jewry might have been spared a great deal of heartache, mud-slinging, and character assassination. What lay behind this “theological” conflict was a hankering after the old minhag anglia coupled with a power struggle between the United Synagogue’s irreligious “grand dukes” and the growing number of observant “shul-goers” who sought to dethrone and replace them. Persoff devotes the last few chapters to Rabbi Brodie’s successor, Immanuel Jakobovits, who had served for nearly a decade as rabbi of the Fifth Avenue Synagogue in New York. After assuming office as Chief Rabbi in 1967, he attempted to unite Anglo-Jewry by “preserving its character, and working with all types of Jews in Jewish and general causes.” Issues such as conversion, the Beth Din’s invalidation of all marriages performed at the New London Synagogue, and the exclusion of non-orthodox representatives from a communal service celebrating Israel’s twentieth anniversary thwarted his efforts. He fought against intolerance on the part of orthodox Jews, but statements by some Liberal rabbis were also not conducive to reconciliation. After his retirement in 1991, Jakobovits admitted his failure to eliminate polarization into “ever more extremist groups.” He viewed his task as speaking “for Judaism and not necessarily for Jews” and promoting Jewish education, and he gave up on the obsession for unity among the different Jewish groups. Centrist Orthodoxy now accounts for less than half the Jewish population in Greater London (and about 55% throughout the United Kingdom), but the outlook and practice of members and lay leaders are now far closer to the rabbinate’s than at any time in the past. One example of this change can be seen in the demand for an eruv – creating a “public domain” that enables observant Jews to carry and wheel baby carriages on the Sabbath. The present Chief Rabbi, Jonathan Sacks, who recently became a life peer, has made effective use of the media and authored books on a high intellectual level. One notable development was the festive service commemorating the 350th anniversary of Jewish resettlement in England, held at London’s historic Bevis Marks (Spanish and Portuguese) Synagogue in 2006. Attended by Prime Minister Tony Blair and Chief Rabbi Sir Jonathan Sacks, it brought together for the first time representatives of all religious streams in Anglo-Jewry – from Baroness Rabbi Julia Neuberger on the far left to Rabbi Avrohom Pinter on the far right. Such a demonstration of unity within diversity also needs to be galvanized in the wider field of self-defense. Meir Persoff describes the history of the rabbinate and the community elegantly and cogently. His prologue, nineteen chapters, and epilogue are accompanied by three appendices and a comprehensive bibliography. An outstanding feature of the book lies in its inclusion of addresses, sermons, pronouncements, press interviews, and letters. Persoff allows these sources and personalities to speak for themselves. He also includes thirty-two portraits of the dramatis personae which enhance the text. However, one might raise a few points of criticism. Persoff does not mention the fact that Michael Wallach, Chief Rabbi Brodie’s private secretary, turned out to have been a secret agent of the “Jacobites.” Nor does he devote more than one footnote to the role of Immanuel Jakobovits in British public life. The late Chief Rabbi’s outspoken, conservative views on moral issues and the family reached a wide audience and commended themselves to Prime Minister Margaret Thatcher, who scorned the liberal Anglican hierarchy and reputedly named Jakobovits as her “favorite cleric.” She had him knighted and then elevated to the House of Lords (1988), the first Chief Rabbi to be so honored – and also the first to be interred in Jerusalem. In addition, the book contains over forty pages of footnotes printed in small type which are hard to read. These notes include many names that should have appeared in the index. All in all, Faith against Reason is a ground-breaking work, the first of its kind to make extensive use of untapped archive material, especially private correspondence. Is it likely to attract readers outside the British Commonwealth? The answer may be found in the growing number of American scholars, such as Todd Endelman, who have become experts in one period or another of Anglo-Jewish history. Lloyd Gartner, another example, is the long-serving chairman of the Jewish Historical Society of England’s Israel branch. Clearly, Meir Persoff’s book will provide material for researchers throughout the world in years to come. * * * . Established by an Act of Parliament in 1870, the United Synagogue is an association of Orthodox Ashkenazi congregations in the London area. Its original nucleus (the Great, Hambro’, New, Central and Bayswater synagogues) had expanded to over eighty constituent, district, and affiliated congregations a century later, representing 40,000 families or about half the number of Jews in Greater London. Popularly known as “the U.S.,” it is the main supporter of Britain’s Chief Rabbinate. Its designation was borrowed in 1913 for the Conservative roof organization established by Solomon Schechter in the United States. . On the revised editions of the ADPB, published by Chief Rabbis Brodie and Jakobovits “to reflect the changing priorities of Anglo-Jewry,” see Stefan C. Reif, Judaism and Hebrew Prayer: New Perspectives on Jewish Liturgical History (Cambridge: Cambridge University Press, 1993), 305-8. * * * DR. GABRIEL SIVAN, a cultural historian, has published, edited, and translated numerous works in the field of Judaica. He is currently Chairman of the World Jewish Bible Association and an executive of the Jewish Historical Society of England’s Israel branch.
<urn:uuid:af2e1cf3-e2da-4a9c-bbfc-08c1ea3c6ba3>
CC-MAIN-2021-43
https://jcpa.org/article/gabriel-a-sivan-on-faith-against-reason-religious-reform-and-the-british-chief-rabbinate-1840-1990/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00110.warc.gz
en
0.960633
3,242
2.578125
3
The September full moon, known as the “Corn Moon”, always shines in or near the stars of Aquarius and Pisces. Because the moon appears full only when opposite the sun, full moons always rise around sunset and set around sunrise. The Season is Changing There’s a lot of unusual stuff going on around tonight’s full moon. First, it will rise to appear situated in the constellation of Aquarius. Second, and it will find its trajectory passing near Neptune as the blue planet will have been sitting in opposition on Tuesday evening; the point at which the planet will have appeared brightest in our sky. To see the full moon and Neptune at the same time, you’ll need to have a telescope, or at least binoculars, because far-away Neptune isn’t visible to the naked eye. According to Space.com, the moon and Neptune will pass within 0.73 degrees of each other around 1 a.m. Eastern on Wednesday, with Neptune hanging out just to the northwest of the moon. The moon will be officially full at 3 a.m. Eastern Wednesday, so plan to stay up late tonight. Traditionally, September’s full moon is always called the Harvest Moon, but not this time around. Since the Harvest Moon is always the full moon that arrives closest to the fall equinox (September 22), the full moon on October 5 will get the iconic title. September’s full moon, instead, has been deemed the Corn Moon. It’s been the go-to name for the full moon when it falls far enough away from the fall equinox, as First Nations tribes always gave the moon names that reflected aspects of the season. As the Corn Moon, or alternately the Barley Moon, early September’s moon name reflects the crops that were ready for harvest around this time. It’s also known as the Falling Leaves Moon and the Nut Moon. The equinoxes occur twice a year when the tilt of the Earth’s axis is inclined neither away from nor towards the Sun, the Sun being vertically above a point on the Equator. The term equinox can also be used in a broader sense, meaning the date when such a passage happens. The name “equinox” is derived from the Latin aqueous (equal) and Nox (night), because around the equinox, the night and day are approximately equally long. At an equinox, the Sun is at one of two opposite points on the celestial sphere where the celestial equator (i.e. declination 0) and ecliptic intersect. These points of intersection are called equinoctial points: the vernal point and the autumnal point. An equinox happens each year at two specific moments in time (rather than two whole days), when there is a location on the Earth’s Equator where the centre of the Sun can be observed to be vertically overhead, occurring around March 20/21 and September 22/23 each year. - Autumnal equinox: this classical name is a direct derivative of Latin (autumnus = autumn). - September equinox: a usage becoming the preferred standard by technical writers choosing to avoid Northern Hemisphere bias (implied by assuming that March is in the springtime and September is autumnal—true for those in the Northern Hemisphere but exactly opposite in the Southern Hemisphere). - Northward equinox and southward equinox: names referring to the apparent motion of the Sun at the times of the equinox. - Vernal point and autumnal point are the points on the celestial sphere where the Sun is located on the vernal equinox and autumnal equinox respectively (again, the seasonal attribution is that of the Northern Hemisphere). - First point (or cusp) of Aries and first point of Libra are names used by navigators and astrologers. Navigational ephemeris tables record the geographic position of the First Point of Aries as the reference for the position of navigational stars. Due to the precession of the equinoxes, the astrological signs where these equinoxes are located no longer correspond with the actual constellations once ascribed to them. Length of Equinoctial Day and Night On a day of the equinox, the centre of the Sun spends a roughly equal amount of time above and below the horizon at every location on the Earth, night and day being of roughly the same length. The word equinox derives from the Latin words aqueous (equal) and Nox (night); in reality, the day is longer than the night at an equinox. Commonly, the day is defined as the period when sunlight reaches the ground in the absence of local obstacles. From the Earth, the Sun appears as a disc rather than a single point of light, so when the centre of the Sun is below the horizon, its upper edge is visible. Furthermore, the atmosphere refracts light, so even when the upper limb of the Sun is below the horizon, its rays reach over the horizon to the ground. These cumulative effects make the day about 14 minutes longer than the night at the Equator and longer still towards the Poles. The real equality of day and night only happens in places far enough from the equator to have a seasonal difference in day length of at least 7 minutes, actually occurring a few days towards the winter side of each equinox. The date at which the time between sunset and sunrise crosses 12 hours, is known as the equinox. Because sunset and sunrise times vary with an observer’s geographic location (longitude and latitude), the equinox likewise depends on location and does not exist for locations sufficiently close to the equator. The equinox, however, is a precise moment in time which is common to all observers on Earth. Heliocentric view of the seasons The Earth’s seasons are caused by the rotation axis of the Earth not being perpendicular to its orbital plane. The Earth’s axis is tilted at an angle of approximately 23.44° from the orbital plane; this tilt is called the axial tilt. As a consequence, for half of the year (i.e. from around March 20 to around September 22), the northern hemisphere tips toward the Sun, with the maximum around June 21, while for the other half of the year, the southern hemisphere has this honour, with the maximum around December 21. The two instants when the Sun is directly overhead at the Equator are the equinoxes. Also at that moment, both the North and South Poles of the Earth are just on the terminator and day and night are divided equally between the hemispheres. A few remarks can be made about the equinoxes: - Because the Sun is a spherical (rather than a single-point) source of light, the actual crossing of the Sun over the Equator takes approximately 33 hours. - At the equinoxes, the rate of change for the length of daylight and night-time is the greatest. At the Poles, the equinox marks the start of the transition from 24 hours of nighttime to 24 hours of daylight. High in the Arctic Circle, Longyearbyen, Svalbard, Norway has an additional 15 minutes more daylight every day around the time of the Spring equinox, whereas in Singapore (which is virtually on the Equator), the amount of daylight each day varies by just seconds. - It is 94 days from the June solstice to the September equinox, but only 89 days from the December Solstice to the March equinox. The seasons are not of equal length, because of the variable speed of the Earth in its orbit around the Sun. - The instances of the equinoxes are not fixed, but fall about six hours later every year, amounting to one full day in four years. They are reset by the occurrence of a leap year. The Gregorian calendar is designed to follow the seasons as accurately as is practical, which is good, but not absolutely perfect. - Smaller irregularities in the times are caused by perturbations of the Moon and the other planets. - Currently, the most common equinox and solstice dates are March 20, June 21, September 22 and December 21; the four-year average will slowly shift to earlier times in coming years. This shift is a full day in about 70 years (compensated mainly by the century “leap year” rules of the Gregorian calendar). This also means that in many years of the twentieth century, the dates of March 21, June 22, September 23 and December 22 were much more common, so older books teach (and older people may still remember) these dates. - Note that the times are given in UTC (roughly speaking, the time at Greenwich, ignoring British Summer Time). People living farther to the east (Asia and Australia), whose local times are in advance, will see the seasons apparently start later; for example, in Tonga (UTC+13), an equinox occurred on September 24, 1999, a date which will not crop up again until 2103. On the other hand, people living far to the west (America) whose clocks run behind UTC may experience an equinox as early as March 19. Geocentric view of the seasons In the half year centred on the June solstice, the Sun rises and sets towards the north, which means longer days with shorter nights for the Northern Hemisphere and shorter days with longer nights for the Southern Hemisphere. In the half year centred on the December solstice, the Sun rises and sets towards the south and the durations of day and night are reversed. Also on the day of an equinox, the Sun rises everywhere on Earth (except the Poles) at 06:00 in the morning and sets at 18:00 in the evening (local time). These times are not exact for several reasons, one being that the Sun is much larger in diameter than the Earth that more than half of the Earth could be in sunlight at any one time (due to unparallel rays creating tangent points beyond an equal-day-night line); other reasons are as follows: - Most places on Earth use a time zone which is unequal to the local time, differing by up to an hour or even two hours, if daylight saving time (summer time) is included. In that case, the Sun could rise at 08:00 and set at 20:00, but there would still be 12 hours of daylight. - Even those people fortunate enough to have their time zone equal to the local time will not see sunrise and sunset at 06:00 and 18:00 respectively. This is due to the variable speed of the Earth in its orbit and is described as the equation of time. It has different values for the March and September equinoxes (+8 and −8 minutes respectively). - Sunrise and sunset are commonly defined for the upper limb of the solar disk, rather than its centre. The upper limb is already up for at least one minute before the centre appears, and likewise, the upper limb sets one minute later than the centre of the solar disk. Due to atmospheric refraction, the Sun, when near the horizon, appears a little more than its own diameter above the position than where it is in reality. This makes sunrise more than another two minutes earlier and sunset the equal amount later. These two effects add up to almost seven minutes, making the equinox day 12hrs 7min long and the night only 11hrs 53min. In addition to that, the night includes twilight. When dawn and dusk are added to the daytime instead, the day would be almost 13 hours. - The above numbers are only true for the tropics. For moderate latitudes, this discrepancy increases (for example, 12 minutes in London) and closer to the Poles it gets very large. Up to about 100 km from both Poles, the Sun is up for a full 24 hours on an equinox day. - The height of the horizon on both the sunrise and sunset sides changes the day’s length. Going up into the mountains will lengthen the day while standing in a valley with hilltops on the east and the west can shorten the day significantly. This is why settlements in east-west running valleys are more favourable (daylight-wise) than north-south running valleys. Cultural Aspects of the Equinox - The September equinox marks the first day of Mehr or Libra in the Persian calendar. It is one of the Iranian festivals called Jashne Mihragan, or the festival of sharing or love in Zoroastrianism. - The Mid-Autumn Festival is celebrated on the 15th day of the 8th lunar month, often times near the autumnal equinox day, and is an official holiday in China and in many countries with a significant Chinese minority. As the lunar calendar is not synchronous with the Gregorian calendar, this date could be anywhere from mid-September to early October. - The traditional harvest festival in the United Kingdom was celebrated on the Sunday of the full moon closest to the September equinox - The September equinox was “New Year’s Day” in the French Republican Calendar, which was in use from 1793 to 1805. The French First Republic was proclaimed and the French monarchy was abolished on September 21, 1792, making the following day (the equinox day that year) the first day of the “Republican Era” in France. The start of every year was to be determined by astronomical calculation, (that is: following the real Sun and not the mean Sun as all other calendars). - World Storytelling Day is a global celebration of the art of oral storytelling, celebrated every year on the spring equinox in the northern hemisphere, the first day of autumn equinox in the southern. - Wiccans and many other Neopagans hold religious celebrations of “Mabon” on the autumnal equinox. Myths, Fables and Facts - One effect of equinoctial periods is the temporary disruption of communications satellites. For all geostationary satellites, there are a few days near the equinox when the sun goes directly behind the satellite relative to Earth (i.e. within the beamwidth of the ground-station antenna) for a short period each day. The Sun’s immense power and broad radiation spectrum overload the Earth station’s reception circuits with noise and, depending on antenna size and other factors, temporarily disrupt or degrade the circuit. The duration of those effects varies but can range from a few minutes to an hour. (For a given frequency band, a larger antenna has a narrower beamwidth, hence experiences shorter duration “Sun outage” windows). - Although the word equinox is often understood to mean “equal [day and] night,” as is noted elsewhere, this is not strictly true. For most locations on earth, there are two distinct identifiable days per year when the length of day and night are closest to being equal; those days are commonly referred to as the “equinoxes” to distinguish them from the equinoxes. Equinoxes are points in time, but equinoxes are days. By convention, esquilaxes are the days where sunrise and sunset are closest to being exactly 12 hours apart. This way, you can refer to a single date as being the Equiluz, when in reality, it spans from sunset on one day to sunset the next, or sunrise on one to sunrise the next. - What is true about the equinoxes is that two observers at the same distance north and south of the equator will experience nights of equal length. - The Equiluz counts times when some direct sunlight could be visible, rather than all hours of usable daylight (which is any time when there is enough natural light to do outdoor activities without needing artificial light). This is due to twilight; a particular type of twilight which is officially defined as civil twilight. This amount of twilight can result in more than 12 hours of usable daylight up to a few weeks before the spring equinox, and up to a few weeks after the fall equinox. - In a contrary vein, the daylight which is useful for illuminating houses and buildings during the daytime and is needed to produce the full psychological benefit of daylight is shorter than the nominal time between sunrise and sunset. So in that sense, “useful” daylight is present for 12 hours only after the vernal equinox and before the autumnal equinox, because of the intensity of light near sunrise and sunset, even with the sun slightly above the horizon, is considerably less than when the sun is high in the sky. |September||Harvest Moon||Nut Moon||Mulberry Moon||Singing Moon||Barley Moon||Harvest Moon||Barley Moon||Harvest Moon||Fruit Moon|
<urn:uuid:70033172-cd26-495e-86f9-cbac77fc6e79>
CC-MAIN-2021-43
https://goodwitcheshomestead.com/2017/09/06/september-full-moon/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585380.70/warc/CC-MAIN-20211021005314-20211021035314-00270.warc.gz
en
0.947385
3,562
2.859375
3
Coastal area management and environmental assessment So far, no comprehensive definition of the coastal area has been provided. The natural forms of the coastal area include coasts, lagoons, estuaries, cobblestones, coral reefs, rocky shores, sand dunes [1-5]. For all aquatic invertebrates and fish, it is used by humans and commercial fishermen. Important functions of the coastal area for which economic value can be easily determined include stabilization of the shoreline, aquaculture, recreation, and flood control [6-9]. Also, coastlines in many countries are a good place for industrial and commercial offices and attractive for tourism. Coastal areas in developing countries are increasingly exposed to high population pressure and multiple economic activities in several areas [10-15]. Such a situation often leads to complex and increasing biological, resource-depleting consequences, as well as sharp contrasts between competing working groups such as those that rely on coastal resources for livelihoods and those interested in recreational uses of coastal areas. The exploitation of coastal fish and plants in large parts of the world has already reached stable levels. In many areas, ecological systems have changed irreversibly [16-19]. Continuous degradation and deterioration of marine biodiversity are significant and lead to a decrease in the potential for sustainable development in the long run. Sustainable environmental assessment can be one of the planning tools to achieve these goals [20-23]. Coastal areas and the need to pay more attention to them Coastal areas are one of the most productive and dynamic ecological resources and the bedrock of great economic and social activities in the world [24-27] Valuable ecological resources, biodiversity, and abundant oil and gas reserves, and huge economic activities have made these areas one of the most sensitive and valuable areas in the world. In recent decades, the misuse of these valuable resources has put most of the world's coastal areas in a critical and dangerous situation, as the pressures on them far outweigh their environmental tolerance capacity [28-30]. Population growth, improper use of resources, pollution of coastal areas, development of activities that are not compatible with the environment, and lack of coordination between activities in the coastal strip are the most important reasons for putting pressure on these areas [31-35]. According to past studies, more than 39% of the world's population lives 100 km from the coast. Of course, the population whose activities affect the coastal ecosystem and, on the other hand, their survival depends on the coasts and oceans, is much higher than these figures and certainly covers the majority of the planet's population [36-39]. In summary, the most important problems of coastal areas that threaten sustainable local, national and global development can be categorized as follows: - a) The concentration of population in the coastal strip and threat to the valuable natural resources of this area; - b) private exploitation of development rights and their benefits; - c) reduction of biodiversity and loss of vulnerable marine and terrestrial species; - d) spread of all kinds of environmental pollution in all coastal areas (land and sea); - e) destruction of historical and ancient monuments; - f) creating conflict and coordination and conflict between the benefits of various economic activities through segregation in development plans; and - g) restricting public access to beaches and their benefits . Iran, with about 3,000 kilometers of coastline with rich resources, valuable natural resources, and productive and sensitive ecosystems in the Caspian Sea, the Persian Gulf, and Oman Sea, is facing the mentioned problems. In the northern coasts of Iran, improper and over-exploitation of natural resources, destruction and change of natural ecosystems and land-use change of the most fertile plain and forest lands, improper exploitation of groundwater resources, the advancement of saline water into freshwater aquifers, and increasing pollution of surface water pollution are among the challenges this country is grappling with [41-44]. Inadequate wastewater disposal and agricultural drainage, oil exploration and extraction exploration activities, lack of proper interaction between different sub-sectors of transportation, high population density and limited job opportunities, inadequate location of towns and industrial areas, low level of services Superiority in middle and middle cities and severe spatial inequality in the service system and the like are among the major challenges despite the excellent geographical, natural and ecological capabilities throughout the region [45-49]. In the southern coasts of Iran, the challenges include improper use of natural resources, lack of adequate facilities to control surface water and groundwater depletion, lack of port facilities following the development capabilities of the region, inadequacy of infrastructure networks, and especially transport network capacity following development requirements, lack of observance of environmental standards in the establishment of activities, lack of spatial balance between the concentration of modern activities of oil and gas industry with other activities, change of land use potential for agriculture, the gap between infrastructure and physical characteristics, lack of tourism facilities and equipment, and increasing pollution of the sea and coastal areas [50-54]. One of the main challenges is that despite the sensitive and strategic location near the international open waters, being in the path of international corridors north and south and access to potential markets in the region, having huge oil and gas resources and related industries and rich marine resources in those areas can be seen [55-58]. To exploit the above resources and facilities, revive public rights, and reduce harmful environmental effects, inter-sectoral coordination, and use of beaches as gates of the country within the framework of the country's long-term vision document and the law of the fourth economic, social and cultural development plan can be effective [59-62]. The national coastal management document recommends a three-tier approach, including strategic, structural, and executive management levels [63-66]. At the first level, long-term strategies for the development of the country's coastal areas are presented in the form of landscaping strategies in these areas. In the second level, the physical bedrock for the realization of these strategies will be done in the form of (physical) development plans, and in the third level, the integrated coastal management plan will be prepared and implemented [67-70]. Also, in terms of geographical scale, this document includes areas beyond the coastal area in the form of areas, including impact area, monitoring area, integrated coastal management area, and special coastal strip area [71-74]. Prospects for the development of the country's coasts The coastal areas of the country are developed areas that serve as a bridge of communication and interaction with other countries of the world, facilitate the internal and external relations of the country's economy and help to create regional balances. Sustainable resources and capabilities and environmental protection ensure the security of inland areas through water borders and generally act as a symbol of the country's development [75-77]. In this regard, the northern coast of the country is a model for proper use of environmental resources, preservation, and promotion of natural landscapes and valuable ecological resources, tourism capabilities, and leisure for the people of the country and other countries in the region. Sustainable use of other agricultural, industrial, service, and cultural capabilities and benefits are to meet national needs and export development. The southern coast of the country is a symbol of national authority by using open water resources and the country's capacities in the field of energy and mineral resources, industrial, commercial, transportation, and transit capabilities; also scientific capabilities and human resources are considered as the front line of the country's interaction with the world [78-81]. Long-term goals of organizing the country's coasts - a) Using the sea as gateways for communication and interaction with other countries in the direction of comprehensive development of the country and economic extraversion ; - b) creating the ground for sustainable socio-economic development of coastal areas through proper utilization of coastal capacities; - c) environmental protection of coastal areas; - d) guaranteeing the right of public use of beaches and seas as a national treasure; and - e) optimal use of space and coastal resources and reduce competition in the exploitation of these resources among users . General strategies for organizing the country's coasts - a) Development of economic activities compatible with the environmental capacities of coastal areas; - b) prohibiting private uses of coastal space and providing public access to it; - c) creating the ground for public participation in organizing coastal areas; - d) conservation and restoration of coastal and marine ecosystems; - e) prevention and removal of environmental pollution in coastal areas; - f) improving the capacity to deal with environmental hazards and unforeseen events; - g) ensuring the security of communities and activities located in coastal areas; - h) establishing special legal and financial systems in coastal areas to guide development activities; and - i) creating a culture of proper use of beaches and sea . Special strategies for organizing the northern and southern coasts of the country - North coastal areas: - a) Creating a balance in population distribution, commensurate with the resources, environmental capacity, and tolerance capacity of ecosystems in areas prone to the development; - b) adopting the necessary mechanisms to liberate the coastal areas and rivers, prevent pollution and protect the environment, and continuously control and monitor the protection of these areas; - c) equipping and strengthening potential areas and different areas of tourism and improving the level of management in national and transnational dimensions with coordination between the sector and within the sector with the priority of using the facilities of the private and cooperative sectors; - d) preventing the uncontrolled expansion of coastal cities and organizing a new population settlement center due to the limitations of the coastal strip; - e) development of coastal ecotourism protection, controlling and protection of water and soil resources, protection and restoration of marine living resources, controlling marine environmental pollution, and deforestation, along with strengthening environmental management; - f) equipping fishing docks and ports, organizing and improving the quality of the fishing fleet, aquaculture development, increasing the fisheries industry, and developing exports by improving management, to ensure the country's food security; - g) development and equipping of sea entry and exit points and increasing the utilization coefficient of ports and creating suitable facilities for the optimal use of existing capacities and responding to the growing demand for transit of goods; - h) land-use allocation commensurate with the capabilities and capabilities of the coastal environment; - i) using the natural capabilities of water and soil resources to develop and modernize agricultural activities; and - j) strengthening and developing agriculture-related industries and electronics industries with an emphasis on establishing clean industries due to the environmentally sensitive coastal areas and protecting them from the development of industries that are not compatible with the environment . - South coastal areas: - a) Development and establishment of industrial activities based on existing oil and gas reserves and mines with emphasis on chemical, petrochemical, mining, and marine industries in accordance with the environmental capacity and with regard to the establishment of activities related to the South Pars gas field on the coast Persian Gulf; - b) creating a balance in the distribution and composition of the population and strengthening the existing population centers, especially small and medium-sized cities, according to the development perspective of activities located on the shores of the Persian Gulf and the need to locate some of them on the shores of the Oman Sea; - c) providing infrastructure and the ground for the development and construction of tourism facilities and utilization of historical and natural capacities with the participation of the private sector and cooperatives, especially on the shores of the Persian Gulf; - d) defining a principled approach to climate and environmental issues such as soil erosion, marine environmental pollution, and wastewater disposal and protection of coastal strip ecosystem with emphasis on sensitive habitats and vulnerable plant species and animals, especially on the shores of the Persian Gulf; - e) strengthening and equipping fishing docks and ports, protection and reconstruction of reserves, development of fishing and aquaculture, to promote the share of the fishing industry in the region and the expansion of industrial fishing in waters commensurate with their environmental potential; - f) improvement and development of infrastructure networks, provision of water resources, and strengthening of communication routes in accordance with the establishment of activity and population, through fast communication networks and urban equipment; - g) practicing Coastal Strategies Approved in the Fourth Development Plan; - h) organizing and preventing pollution and destruction of coasts, with priority on the Caspian Sea, through the development of a comprehensive plan to organize the coast, which includes necessary measures such as demarcation, the establishment of integrated coastal management, environmental and maritime rules and standards, fishing, and aquaculture, amending and supplementing laws and regulations accompanied by determining the responsibility of the relevant bodies in the field of policy-making, implementation, and supervision; - i) as a responsibility of the government, facilitating trade and transportation, establishing maritime industries, expanding tourism, facilitating the sustainable exploitation of fishing resources and the optimal use of these areas, to develop production activities and maritime services, while maintaining policy-making, planning, and oversight. Hence about it, can write: - j) establishing security and order, and determining legal regulations and judicial procedures; - k) environmental protection and demarcation and zoning of coastal areas and inland and international waters; - l) sustainable exploitation of coastal and maritime areas, supporting the fleets of the Islamic Republic of Iran in accordance with international rules, and supporting Investments in economic activities, such as: maritime transport, non-renewable marine resources (oil and gas, mines, etc.), marine renewable resources (Aquatic and…), maritime tourism, support services, and maritime industry; - m) scientific, engineering, management, legal and specialized marine, and naval skills training; - n) marine research, recording of oceanographic information monitoring, and marine information and communication technology; - o) supporting the national fleet in accordance with international rules; - p) providing facilities and infrastructure necessary for the development of fishing activities, including: Development, equipment, maintenance, and improvement of fishing ports; and renovation of the maritime transport fleet using managed funds. - q) renovation of the maritime transport fleet using managed funds. Accordingly, organizing and regulating the establishment of activities in these areas, especially the northern coasts of the country for which tourism functions are provided, should be a priority in the country's development programs and specific policies and programs for optimal use of these areas to be implemented. Any procrastination and loss of opportunities in this field can impose harmful effects and consequences on the country and make the existence of these areas and achieving sustainable development very costly and sometimes impossible. The need for optimal organization and management of beaches Coastal areas include fertile and diverse habitats that are very important in terms of human settlement and local livelihood and development. Part of the world's population lives along the coastline, 60 km from the sea, and this figure has increased by 25% in 2020. Many of the world's poorest people live in coastal areas. Coastal resources play a vital role for many poor people, especially in developing countries. Despite national, regional, and international efforts, current methods for controlling and managing marine and coastal resources have not been effective or consolidated to the extent that sustainable development can be achieved. As a result, many of these coastal areas, especially in developing countries, have been exposed to all kinds of pressures from human activities and have suffered irreparable damage. Following these degrading processes in marine and coastal environments, Chapter 17 of Agenda 21 (International Community Charter on Environmental Issues and Problems), held in Rio de Janeiro, Brazil, in 1992, on the protection of oceans, Seas, including closed and relatively closed seas, coastal areas, emphasizes the protection and proper exploitation and development of their living resources. Thus, the importance of preserving and protecting the coasts and careful monitoring of how to exploit and use these areas optimally and the establishment and loading of various human activities in these areas becomes clear, given the specific geographical location, including security, military, tourism, environmental components. It is economically and socially very important and for this reason, the necessary compatibility between uses should be established and activities should be licensed in accordance with the potential of coastal areas. Failure to pay attention to this issue can impose adverse effects and consequences on these areas and overshadow many of the capabilities and capabilities of these areas. Unfortunately, the lack of attention to this issue has caused many environmental and social problems on the coasts of the country, especially the northern coasts, which in recent years has been raised as one of the main issues. Problems facing the organization of beaches in the north of the country The Caspian Sea is the largest body of inland water in the world, which currently has an area about 27 meters lower than the level of the high seas. Its length is between 1030 to 1200 km and its width is between 208 to 480 km (average 344 km), its area varies due to changes in water level and is currently estimated at 378 thousand square kilometers. The average depth of this sea is about 180 meters, which in the southern parts reaches about 1000 meters and in the northern parts it is only a few meters. The length of the coastline of this sea is about 6440 km, of which more than 5300 km is in the northern neighboring countries and about 1000 km is the coastline of Iran. This length, including the shoreline inside the water bodies connected to the sea, is like Gorgan Bay. If these lines are removed, the exact direct coastline of the Caspian Sea off the coast of Iran will be about 740 km. The Caspian Sea is connected to the three northern green provinces from the south: Gilan province in the west, Golestan in the east, and Mazandaran in the middle, which have a total area of 61.465 km and cover 2.83% of the country's area. It seems that one of the main reasons for the current problem of the Caspian coast in recent years is the lack of attention to the natural conditions of the lake, or in other words, periodic fluctuations in the water level of the sea, which has led to many private sector planning and investment. For this reason, brief references to the reasons for the rising Caspian Sea water level can draw the attention of coastal authorities and planners to the importance of this factor in future planning and policy-making and it can be considered as an important aspect. Coastal areas around the world are historically among the areas that are always the most exploited due to the rich resources. In recent decades, the misuse of these valuable resources has left most of the world's coastal areas in a critical and dangerous situation, as the pressures on them have exceeded their environmental tolerance capacity. Population growth, improper use of resources, pollution of coastal areas, development of activities incompatible with the environment, and lack of coordination between activities in the coastal strip are the most important reasons for putting pressure on these areas. This set of issues and problems has led many countries, especially developed countries, to formulate and implement various rules and regulations for the optimal use of these areas, so that the establishment of different uses by the private and public sectors is possible only through obeying these rules and regulations. The Islamic Republic of Iran is no exception to this rule and in recent years it has begun efforts to regulate and make optimal use of these areas, but for various reasons, these measures have not led to the desired results. The issues and problems of the coastal areas of the country in general and the northern coasts of the country, in particular, are still showing themselves.
<urn:uuid:0872cf17-db3d-4eb1-a7af-aa7993a9cb2a>
CC-MAIN-2021-43
https://www.jeires.com/article_136968.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585671.36/warc/CC-MAIN-20211023095849-20211023125849-00310.warc.gz
en
0.933183
3,974
3.875
4
wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 30 people, some anonymous, worked to edit and improve it over time. This article has been viewed 48,477 times. Everyone’s mind sometimes wanders. Paying attention in school, especially during subjects you don’t find interesting, can be tedious. What to do? Take a brain vacation! Letting your mind wander or relax unconsciously (zoning out), can give you the space you need to get through those long, painful classes. X Research source Carefully planning the zone-out session and acting relaxed and natural will keep you from getting caught. There are also several alternatives to zoning out you should consider instead of risking getting in trouble with your teacher. Method 1 of 3:Planning the Zone-Out Session 1Decide carefully when to zone out. If you zone out during a presentation or a time when you’re expected to speak in class, your cover will be blown. If, on the other hand, you zone out during someone else’s presentation, or on a day when the class sees a film, you’ll be far more likely to successfully zone out without getting caught. 2Sit away from the teacher. A seat far from the teacher is a good place to zone out for two reasons. First, it will provide crucial distance between you and anything which might disrupt your thought vacation. Second, it will reduce the chances of you being discovered for zoning out. If you’re using an electronic device to block out the teacher’s lecture, you’re less likely to be caught when you’re not sitting front and center in the teacher’s line of sight.Advertisement 3Ask or answer a question early in the class. When you show that you are engaged, the teacher will be less likely to call on you again. Asking or answering a question before you zone out will ensure you earn your requisite participation points with the teacher while limiting the likelihood he or she will expect more of you later. 4Listen to your teacher. This seems counterintuitive: how can you zone out when you’re paying attention? But if the class is so boring that you’d dig up an article online about how to zone out and get away with it, chances are that you’re stuck in a truly boring class. Listening to a few minutes of your teacher drone on about binomial fractions or Wuthering Heights is sure to numb your brain enough to allow the zoning-out process to spontaneously take over.Advertisement Method 2 of 3:Getting Relaxed 1Rest your eyes. Reduce your rate of blinking. Don’t close your eyes or you might fall asleep, but don’t focus your eyes on anything in particular. You can look at your desk, your book, or the floor. Imagine you’re staring through the object directly in front of you. If you wear glasses, remove them. Give your eyes a gentle rub before zoning out. 2Get comfortable. Lean back against your chair. Plant both feet on the floor. If possible, remove your shoes. If you’re wearing a constricting tie or jacket, loosen or remove it. Breathe in slowly and evenly, inhaling through your nose. 3Engage in a simple, repetitive motion. For instance, you might roll a marble back and forth between your thumb and index finger. Or you might wiggle a pen or pencil rapidly in your hand using the same fingers. Using an object in this way can help you concentrate on your personal daydreams or fantasy. 4Don’t try to focus. Trying to fight a daydream or a zoned-out feeling by shaking your head, arching your eyebrows up and opening your eyes wider, or rubbing your face or eyes vigorously in an attempt to “snap out of it” will draw attention to your efforts. Instead, let yourself return from the period of zoning out naturally. Return from your zone-out session slowly. 5Let your mind wander. Thinking about things you’ll be doing later when you’re out of class, or things you did yesterday are some of the easiest things to daydream about. X Research source Alternately, you could imagine yourself in an exciting adventure with wizards, monsters, and/or space aliens. Don't smile or show any emotion to the imaginary visions you're seeing or you might get caught. 6Distract yourself. It’s easy to become immersed in a good e-book, or a show. A simple classic like solitaire, pong, or chess is available on almost every laptop. Newer games with 3-D graphics and lots of exciting action are good choices too if you turn the volume off. Any entertaining distraction can help you zone out and ignore what’s going on around you. - Be careful not to let your teacher see you using these devices in class; you’re likely to have them taken away. 7“Write” in your notebook. Don’t write words or take notes, just move your pencil or pen up and down with its tip suspended just above the page. Stare at the page but do not focus on it. Unless your teacher is paying close attention to you, the movement of the pen up and down across the page is likely to fool them into believing you are actively engaged in note-taking. This is a good way to zone out without getting caught. 8Focus on a point in front of you. It could be on the desk, on the floor, or on your book. Keep your eyes on that spot but relax your eyes. Looking at a nearby object in a natural way will prevent you from getting caught zoning out. - Pretend you’re reading the book. Stare intently at the book in front of you. Your teacher will think you’re reading or reviewing material relevant to the lecture, but you’re really just using the book as a zero point. 9Have a friend act as a lookout. Tell your friend “Hey, I’m going to zone out for a few minutes. Please let me know if I should be doing something or if I miss something important.” Begin your zone-out session. After you come back, thank your friend for his or her help. Copy the notes they took in the last few minutes while you were mentally checked out. 10Listen for key words. If your teacher has words or phrases he or she frequently uses like "Got it?" or "Understand?", you can listen for them and mentally drop out until you hear them. When people are hypnotized, the hypnotist always plants a wake-up cue in their minds so they will not be hypnotized forever. Usually, they use a small bell to wake their subjects up. Think of your teacher’s catchphrase(s) as your little bell. Limiting your zone-out time and returning to attention in this way will ensure you don't get caught. 11Offer vague answers. If your teacher suspects you’re drifting off into your own private world, you might be called on to answer a question. Reply with answers that could plausibly be those of a fully engaged student. “Could you please repeat the question?” and “I’m not sure” are both acceptable, though your teacher might be upset at your inability to proffer the correct answer. - If your teacher asks if you’re listening to him or her, apologize but deny zoning out. Say instead that you were thinking about what had just been said. This can be risky, since your teacher may then follow up on your comment and ask you to relay what they just said, or your thoughts about it. 12Balance zoning out and paying attention. Don’t zone out during the entirety of your class. Only zone out for as much time you need to feel refreshed and relaxed. If you zone out the entire time you’re in class, the odds that you’ll be caught by your teacher increase dramatically. Plus, you’re likely to miss something that you might need to know later.Advertisement Method 3 of 3:Adopting Alternatives to Zoning Out 1Avoid eating a heavy carb load before class. Carbs provide fuel for your body, especially when you’re engaged in athletic events requiring endurance. While it’s a good idea to load up on carbs before engaging in physical activity, doing so before class can lead to postprandial somnolence, better known as a food coma. A food coma is the feeling of drowsiness following a meal with lots of carbs. - Carbohydrates in foods with a high glycemic index like snacking crackers, cookies, and soda are more easily digested than foods with a lower glycemic index, and leads easily to exhaustion and sleepiness. X Research source - A balanced meal of fruits, vegetables, and whole grains is the best option to stay alert during class. 2Come to class well rested. Failing to get adequate sleep can lead to deficits in energy, motivation, and concentration. X Research source You will be more easily distracted and less likely to remember what was talked about or covered in class if you have not gotten at least 6-8 hours of sleep each night. Set a regular bedtime for yourself which enables you to obtain the requisite amount of sleep. If you wake at 6, for instance, tuck into bed around 10 the night before. 3Read the material being covered in class. If you read the material which will be covered in class the night before you go, you’ll have a better time keeping up with what the teacher is talking about. Use your reading to come up with some questions to ask in class. Coming into a class with some background knowledge will help you better connect with the new material presented in the lecture. 4Find at least one interesting thing in the course material for the day. As you take notes, if anything surprises you or makes you laugh, put a star by it. This will help improve your recall later and make the class more enjoyable. It’s always more fun to be in a class where you find at least something of interest than it is to be in a class where everything is boring. Listening and looking actively for an interesting tidbit will keep you alert and engaged. 5Make a game out of listening for keywords from the teacher. For instance, if the class is about the American Revolution, count the number of times you hear the word “Revolution.” Each time you hear it, put a small tally at the top corner of your notebook. Listening actively and being engaged in what the teacher is saying will keep you focused and prevent you from zoning out. 6Count how many students say something in class. Each time a student speaks, make a note of what they asked and what the answer was. Paying attention to what your classmates say can be a good source of information. Oftentimes, a teacher will address interesting and significant information in response to a student’s question. Paying attention to your peers’ comments and questions is not only respectful, but it can increase your attention on the class as a whole.Advertisement QuestionMy teacher is annoying and rude, but I am her favorite student. What should I do?Community AnswerMaybe you could approach her before or after class and calmly discuss what she's doing that bothers you. This would only be appropriate if whatever she's doing has some relevance to her teaching style, though. If you just find her personally annoying, you will just have to put up with it. - Don't stare at your teacher, they’re bound to notice the glazed-over look in your eyes. - Another tactic is mind-rambling. You think of one topic, and then you go off on another tangent, until you think of two things that seem to have no relation at all, except for the tangent your twisted, sadistic mind came up with. - Don't say "Wait, what were you saying?" after they ask you something. They will probably get angry that you were not listening. - Don’t feel too bad about zoning out. Daydreaming is a normal and healthy activity which can provide space for the imagination to stretch out. - Make sure you don’t just stare at an object for a really long time. The teacher will notice you have been staring at it and you might get in trouble or the teacher might think your having a hard time on that subject. - Don't let your eyes close, or you might fall asleep. - Don't let your teacher catch you or you’ll get in trouble. - Keep zoning out, and you might miss something very important like, “Your test is tomorrow.” Don’t make a habit of zoning out in a particular class. - ↑ http://discovermagazine.com/2009/jul-aug/15-brain-stop-paying-attention-zoning-out-crucial-mental-state - ↑ https://www.psychologytoday.com/articles/200903/devoted-distraction?collection=59974 - ↑ http://articles.chicagotribune.com/2013-08-07/features/ct-x-0807-expert-school-food-20130807_1_peanut-butter-protein-breakfast - ↑ http://www.aasmnet.org/resources/factsheets/sleepdeprivation.pdf
<urn:uuid:15acd286-5761-486b-b3de-e9d455d75c70>
CC-MAIN-2021-43
https://www.wikihow.com/Zone-Out-when-a-Teacher-Is-Talking-to-You-and-Not-Get-Caught
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587915.41/warc/CC-MAIN-20211026165817-20211026195817-00310.warc.gz
en
0.946902
2,853
2.65625
3
For each of the 6 problems linked below, make a table that describes the position, velocity, and acceleration indicated by the graph. Make sure you notice what kind of graph you are given – is it a position vs. time graph, or a velocity vs. time graph? In all of these problems, the up direction is positive, the down direction is negative. Let’s use a rounded value for the acceleration due to gravity: -10 m/s2. - An astronaut in outer space throws a rock. The rock leaves her hand and travels toward the Milky Way at 10 m/s. Where is the rock 2 seconds later? - The same astronaut is now on earth and throws the same rock toward the Milky Way – assume she throws the rock straight up and it leaves her hand with a speed of 10 m/s. Where is the rock 2 seconds later? What is the difference between situation 1 and situation 2? - Imagine a shelf full of dishes. The shelf is above a counter. A person grabs a dish and lowers the dish to the dish to the counter. Describe the velocity and acceleration of the dish as it is moved from shelf to counter. - At the same shelf of dishes and counter, a cat knocks a dish down and the dish falls to the counter and breaks. Describe the velocity and acceleration of the dish as it is moved from shelf to counter. Why does it break? What is the difference between situation 3 and situation 4? Which of these objects is at mechanical equilibrium: - A seagull standing on top of a fence post. - A car moving due south at 40 kilometers per hour. - A water drop from a kitchen tap, just before it hits the surface of the sink. - A rain drop from the sky, just before it hits the ground. - A car as it enters the freeway, traveling from a surface road where the speed limit is 60 km/h to the freeway where the speed limit is 100 km/h. The driver’s foot is pressing the accelerator. - A can in a factory on a conveyor belt moving at 0.1 m/s. - A bicycle wheel rolling in a straight line at 50 revolutions per second. - A coin after it is dropped from someone’s hand and before it hits the ground. - A rock thrown up in the air, at the very top of its journey through the air. - The earth as it travels around the sun. (This is a trick question, something to think about. Assume that the earth travels around the sun in a circle, and assume that the earth’s speed is constant. The earth’s orbit is approximately circular and its speed is approximately constant – after all, it goes around pretty steadily once a year.) Horizontal Asymptotes (end behavior, symmetry) If the degree of the numerator of a rational function is less than the degree of the denominator, the function has a horizontal asymptote. Use division by the highest power of x to determine the equation of the horizontal asymptote. If the degree of the numerator is one more than the denominator, there is a slant asymptote. Use long division to find the equation of the slant asymptote. If the degree of the numerator is two or more than the denominator, the end behavior of the function does not follow a linear asymptote. Instead, it is similar to that of a polynomial of the same degree as the difference between numerator and denominator. What is the end behavior of each of these functions? If there is a horizontal or slant asymptote, what is its equation? 1. f(x) = (2x + 1) / (x – 4) 2. f(x) = (x2 + 3) / (x – 1) 3. f(x) = (3x4 – x3 + 5) / (x2 + 7) 4. f(x) = 17 / (x2 + 4x – 5) 5. f(x) = (6x2 + 1) / (3x2 – 1) Sign (intervals of definition, increasing, decreasing) The graph of a rational function can be broken into disconnected segments by the presence of vertical asymptotes. Remember, at a vertical asymptote the function approaches either positive or negative infinity (sometimes both). To graph a rational function correctly it helps to determine where it is positive or negative. Here is an organized way to do this. A. Find the zeros and undefined x-values of the function (places where numerator or denominator are zero). B. Arrange these values in increasing order. C. Divide the x-axis into intervals around these values. For example, if the values are -1 and 0, the intervals are: -1 < x, -1 < x < 0, and 0 < x. If there are N values, there will be N+1 intervals. D. Test the sign of the function on each interval. You don’t have to compute exact values of the function, just check to see if it is positive or negative. Here is a set of problems that guide through the process: 1. f(x) = (x2 + x) / (x2 + 6x + 5) Factor the numerator and denominator of f(x). 2. Where does f(x) have zero value(s)? 3. Where does f(x) have vertical asymptote(s)? 4. Where does f(x) have a hole? 5. Using the information from problems 1-4, test the sign of f(x) over the appropriate intervals. Asymptotes are lines that the graph of a function approaches. A vertical line in the x-y plane is a line that goes to plus and minus infinity. So vertical asymptotes indicate that the values of a function approach infinity (or minus infinity) as x approaches a finite value. Example notes: The function f(x) = 1/(x – 1) has a vertical asymptote at x = 1. But the function g(x) = (x2 – 1)/(x – 1) does not have a vertical asymptote at x = 1. As long as x is not equal to 1, the function g(x) is equivalent to x + 1, which has no vertical asymptote. (Factor and simplify g(x) to make sure that this is true.) Which functions below have vertical asymptotes? If there are any vertical asymptotes, what are their equations? 1. f(x) = 3 / (x – 2) 2. f(x) = (x3 + x)/x 3. f(x) = x / (x2 + 5) 4. f(x) = (2x3 – 32) / (x2 – 6x + 5) 5. f(x) = 1 – 1/x + 2/(x – 1) The range is the set of all values taken by the function. State the range of the following rational functions, in interval notation. 1. f(x) = 1/(x – 1) 2. f(x) = 3 3. f(x) = 3/(x2 + 1) 4. f(x) = 1/x2 5. f(x) = (x3 + 1)/x The definition of a rational function is: it can be written as a ratio of two polynomials. 1. Suppose f(x) = 1/x and g(x) = 1/(x + 1). Are f(x) and g(x) both rational functions? 2. Is h(x) = f(x) + g(x) from problem 1 above a rational function? Explain. 3. What is the domain of f(x) = 1/x? 4. What is the domain of the rational function f(x) = (x – 1) / (x2 + 1) ? 5. What is the domain of h(x) = 1/x + 1/(x + 1)? There are connections between complex numbers and geometry. You can graph complex numbers in the complex plane, where the horizontal axis is the real part, and the vertical coordinate is the complex part. The complex number 2 + 3i, for example, would occupy a point similar to the coordinates (2, 3) in the real plane. 1. Graph the number 1 in the complex plane. (Hint, 1 as a complex number is 1 + 0i, and it occupies a point similar to (1,0) in the real plane). Multiply the number 1 by i and graph the result. Do it again and again. What is the geometrical effect of multiplying by i? 2. Graph the complex number 1 + i in the complex plane. What is the effect of multiplying this number by i? Graph the result. 3. Graph the complex number 2 + i in the complex plane. Multiply this number by the real number 2 and graph the result. What is the effect of multiplying by 2? 4. Graph the complex number -i in the complex plane. Multiply -i by 2 and graph the result. What is the effect of multiplying by 2? 5. Graph the complex number 1 + 2i in the complex plane. Multiply this number by -1 and graph the result. What is the effect of multiplying by -1? Roots of Unity 1. The non-real number i raised to what power is one? (Of course, when raised to the zeroth power it is one, but there are other powers as well.) 2. Compute the square of:2-1/2(1 + i) 3. Compute the cube of: 2-1/2(1 + i) 4. What power of 2-1/2(1 + i) is one? In other words, 2-1/2(1 + i) raised to what power is one? 5. Compute the square of: 2-1/2(1 – i)
<urn:uuid:a517a6f0-3ad6-44eb-8bb0-4a865cdcce4c>
CC-MAIN-2021-43
http://blue.mathbelt.com/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585837.82/warc/CC-MAIN-20211024015104-20211024045104-00710.warc.gz
en
0.90496
2,188
4.3125
4
‘Keep Spotless, Unblemished, and in Peace’ “Do your utmost to be found finally by him spotless and unblemished and in peace.”—2 PETER 3:14. 1, 2. What is holiness? JEHOVAH GOD is holy. His Son, Jesus Christ, prayerfully addressed him as “Holy Father.” (John 17:1, 11) And spirit creatures in heaven are described declaring: “Holy, holy, holy is Jehovah of armies.” (Isaiah 6:3) But what is holiness? 2 The terms “holy” and “holiness” are translated from Hebrew words having the possible root meaning “to be bright,” “to be new or fresh, untarnished or clean” physically. In the Scriptures, however, these words are used primarily in a moral or spiritual sense. The original Hebrew also conveys the thought of separateness, exclusiveness, or sanctification to the holy God, Jehovah. In the Christian Greek Scriptures, too, the words rendered “holy” and “holiness” denote separation to God. They are also used to refer to holiness as a quality of Jehovah, as well as to purity or perfection in an individual’s personal conduct. So holiness means cleanness, purity, and sacredness. Holiness Required of Jehovah’s People 3. Why does Jehovah deserve clean worship? 3 What, then, is meant by the heavenly declaration: “Holy, holy, holy is Jehovah God, the Almighty”? (Revelation 4:8) Why, this ascribes to God holiness, cleanness in the superlative degree! Therefore, Jehovah, “the Most Holy One,” deserves clean worship. (Proverbs 9:10) Accordingly, Jehovah God instructed the prophet Moses to tell the Israelites: “You should prove yourselves holy, because I Jehovah your God am holy.”—Leviticus 19:1, 2. 4. How only is it possible to worship Jehovah acceptably? 4 Anyone claiming to render acceptable service to Jehovah while practicing uncleanness is disgusting in his sight, for only with godly wisdom and in holiness is it possible to worship him acceptably. (Proverbs 20:25; 21:27) Thus, when God foretold that he would make the way clear for his exiled people to return to Jerusalem from Babylon, he said: “The Way of Holiness it will be called. The unclean one will not pass over it.” (Isaiah 35:8) The remnant that returned in 537 B.C.E. did so with holy motives, to restore true worship of “the Most Holy One.” And the Israelites could have proved holy by obeying God. But they failed to keep holy, spotless from his standpoint.—Compare James 1:27. 5. How did Paul show that spiritual Israelites must worship God in holiness? 5 Spiritual Israelites, or anointed Christians, must also worship Jehovah in holiness. (Galatians 6:16) In this regard, the apostle Paul entreated fellow believers ‘to present their bodies a living, holy, acceptable sacrifice to God.’ To do this, these believers would have to make sure that they were doing the divine will, for Paul added: “Quit being fashioned after this system of things, but be transformed by making your mind over, that you may prove to yourselves the good and acceptable and perfect will of God.”—Romans 12:1, 2. 6. Against what must all Christians be on guard? 6 In this time of increase, many new ones are flocking into Jehovah’s organization. They, too, worship Jehovah in holiness. How they rejoice in the prospect of surviving the “great tribulation” and of enjoying eternal life on a paradise earth in God’s righteous new system! (Matthew 24:21; Luke 23:43) But if those with heavenly hopes and the “great crowd” having earthly prospects are to enjoy unending life, they must be on guard against defiling habits or anything else that goes contrary to Scriptural morals and teaching.—Revelation 7:9, 14. 7. What did Peter say that highlights the need to be exemplary “in holy acts of conduct”? 7 Pointing to our time, the apostle Peter wrote: “Jehovah’s day will come as a thief, in which the heavens [worldly governments] will pass away with a hissing noise, but the elements [worldly attitudes and ways] being intensely hot will be dissolved, and earth [human society alienated from God] and the works in it will be discovered” to be as combustible as “the heavens” and “the elements” in the destructive “fire” of Jehovah’s day. So Peter added: “Since all these things are thus to be dissolved, what sort of persons ought you to be in holy acts of conduct and deeds of godly devotion, awaiting and keeping close in mind the presence of the day of Jehovah, through which the heavens being on fire will be dissolved and the elements being intensely hot will melt!” Yes, all witnesses of Jehovah should be exemplary “in holy acts of conduct.” And those maintaining holiness can look forward to a secure place within God’s righteous ‘new heavens and new earth.’ (2 Peter 3:7, 10-13) What blessed prospects! 8. What does a Christian need to do if he has deviated from the course of holiness? 8 However, what if a Christian has done well in Jehovah’s service for some time but later develops defiling habits or goes contrary to Bible doctrine or morals? Then he has deviated from the course of holiness and needs to demonstrate true repentance and take proper remedial steps. As Paul told fellow anointed ones: “Since we have these promises, beloved ones, let us cleanse ourselves of every defilement of flesh and spirit, perfecting holiness in God’s fear.” (2 Corinthians 7:1) Any Christian needing to correct his wayward course will find the Scriptural counsel of loving overseers to be a blessing indeed.—Proverbs 28:13; James 5:13-20. 9. In view of 2 Peter 3:14, what question arises? 9 After pointing to the righteous new system, Peter added: “Beloved ones, since you are awaiting these things, do your utmost to be found finally by [Jehovah God] spotless and unblemished and in peace.” (2 Peter 3:14) Those words were directed to anointed Christians, but indeed all witnesses of Jehovah must be found ‘spotless, unblemished, and in peace.’ So, what must we do? “Spotless and Unblemished” 10. How have those of the “great crowd” made their “robes” clean in Jesus’ blood? 10 We need to do our utmost to be found “spotless and unblemished.” Those of the “great crowd” have ‘washed their robes and made them white in the Lamb’s blood.’ At one time, they were part of this sinful world and their robes of identification were spotted with it, soiled in Jehovah’s sight. How did they make their robes spotlessly white in “the blood of the Lamb,” Jesus Christ? By demonstrating their belief that ‘no forgiveness takes place unless blood is poured out’ and that Jesus is “the Lamb of God that takes away the sin of the world.” (Revelation 7:9, 14; Hebrews 9:22; John 1:29, 36) This they did by making an unconditional dedication to God and symbolizing it by baptism, total immersion in water. Such a dedication had to be made through Jesus Christ and with the conviction that his shed blood makes it possible for God to forgive their sins and make them acceptable in His sight. 11. Since sin disrupts our peace with Jehovah, in what condition do we need to remain? 11 The “great crowd” must keep their “robes” white by not getting spotted with worldliness and thus losing their Christian personality and identification as Jehovah’s approved witnesses. Indeed, all genuine Christians need to refrain from becoming blemished by worldly ways, actions, and attitudes. Since sin disrupts our peace with Jehovah, only by remaining in a condition wherein our sins can be atoned for can we be found “in peace” at the coming of the great “day of Jehovah.” We must have no spots due to false religious practices or this world’s immorality. 12. How can 2 Peter 2:13 be applied even within the Christian congregation? 12 Remaining spotless and unblemished calls for conduct and attitudes opposite to those of “false teachers” concerning whom Peter wrote: “They consider luxurious living in the daytime a pleasure. They are spots and blemishes, indulging with unrestrained delight in their deceptive teachings while feasting together with you.” (2 Peter 2:1, 13) Yes, even within the congregation, we must beware of false teachers who “consider luxurious living in the daytime a pleasure.” During daylight hours, when so much could be done for the spiritual benefit of others, unspiritual persons may engage in wrongdoing, including revelries and excesses in food and drink. They may try to convert such social events as wedding receptions into occasions for passion-arousing music, sensuous dancing, gluttony, and overindulgence in alcoholic beverages. None of this should be allowed to happen among Jehovah’s people.—Isaiah 5:11, 12; see The Watchtower, April 15, 1984, pages 16-22. 13. What can the host do so that a social gathering will be spiritually upbuilding? 13 The host at a social gathering is responsible for what occurs there. So that the event will be spiritually upbuilding, it is wise to keep it manageable in size and not to invite anyone likely to bring in an unwholesome influence. As Paul’s words at 2 Timothy 2:20-22 indicate, not all who associate with a congregation are necessarily desirable companions. Hence, a Christian host is under no obligation to invite individuals known to be unbridled in speech or given to excesses in food or drink. He remembers that ‘whether we are eating or drinking or doing anything else, we should do all things for God’s glory.’—1 Corinthians 10:31. 14. What position should be taken regarding false teachers? 14 Only a few are ‘spots and blemishes, indulging with delight in deceptive teachings’ while associating with us. But overseers and others in the congregation must be vigilant, firmly rejecting any false teachers who may sneak into the congregation and try to promote immorality or wrong doctrine. (Jude 3, 4) Only by firm adherence to God’s righteous standards will it be possible to keep the congregation spotless and unblemished. What Is Required to Be “in Peace”? 15. (a) How can one attain peace with God? (b) What must we do to be found “in peace” at the coming of Jehovah’s great day? 15 To be found “in peace,” Jehovah’s people must maintain peace with him. (2 Peter 3:14) We have been granted this standing by means of Jesus Christ, concerning whom Paul wrote: “God saw good for all fullness to dwell in him, and through him to reconcile again to himself all other things by making peace through the blood he shed on the torture stake, no matter whether they are the things upon the earth or the things in the heavens.” (Colossians 1:19, 20) Serious sins put a strain upon a person’s relationship with Jehovah and cause the individual to be in a conscience-stricken, disturbed state, whereas peace is the possession of those heeding God’s commandments. (Psalm 38:3; Isaiah 48:18) To be found “in peace” at the coming of Jehovah’s great day, then, we must remain in a godly state that allows for our sins to be atoned for by the blood Jesus shed on the torture stake. 16. According to the apostle Paul, how can we pursue peace with fellow believers? 16 We must also be at peace with other worshipers of Jehovah. Paul urged: “Let us pursue the things making for peace and the things that are upbuilding to one another.” The context shows that we must be careful not to stumble fellow believers in connection with food, drink, or anything else. (Romans 14:13-23) But there is more to the matter than that, for Paul told Ephesian Christians: “I . . . entreat you to walk worthily of the calling with which you were called, with complete lowliness of mind and mildness, with long-suffering, putting up with one another in love, earnestly endeavoring to observe the oneness of the spirit in the uniting bond of peace.” (Ephesians 4:1-3) Surely, we want to demonstrate our unity by avoiding all peace-disturbing words and deeds and by standing firm as supporters of Jehovah’s sovereignty. 17. According to 1 Peter 3:10-12, what is involved in ‘seeking peace’? 17 ‘Seeking peace’ certainly requires that we guard both our deeds and our words, for the apostle Peter wrote: “He that would love life and see good days, let him restrain his tongue from what is bad and his lips from speaking deception, but let him turn away from what is bad and do what is good; let him seek peace and pursue it. For the eyes of Jehovah are upon the righteous ones, and his ears are toward their supplication; but the face of Jehovah is against those doing bad things.” (1 Peter 3:10-12; Psalm 34:12-16) In various ways, then, Jehovah’s loyal servants must continue to “seek peace” if they are to be found “in peace.” Depend on Jehovah’s Help 18. What can we do if worldly ways, actions, or attitudes appeal to us? 18 Peter indicated that “the elements,” the worldly spirit, or attitudes and ways, will be “dissolved,” or destroyed, during “Jehovah’s day.” (2 Peter 3:7, 10) But what can we do if worldly ways, actions, or attitudes appeal to us? Surely, we need to take full advantage of spiritual provisions made through Jehovah’s organization. Among other things, we should regularly study God’s Word and the Christian publications provided by “the faithful and discreet slave.” (Matthew 24:45-47) We must also show continuing gratitude for the ransom provision, Jesus’ “precious blood, like that of an unblemished and spotless lamb.”—1 Peter 1:18, 19. 19. How can prayer be helpful if worldly attitudes are influencing us? 19 We should pray for God’s help to “pursue righteousness.” (1 Timothy 6:11-14) If we realize that worldly attitudes are influencing us, or if some loving fellow believer has drawn this to our attention, it would be wise to be specific about this problem in our prayers by asking Jehovah to help us overcome these leanings. Surely, it would be appropriate to ask for God’s spirit and for his help in cultivating its fruitage that is so unlike worldly attitudes and ways. (Galatians 5:16-26; Psalm 25:4, 5; 119:27, 35) Jehovah can help us to concentrate on righteous, chaste, virtuous, and praiseworthy things. And how fitting to supplicate him earnestly so that the incomparable “peace of God” will guard our hearts and mental powers! (Philippians 4:6, 7) Then anxieties, temptations, and the like, will not grow to the point of being out of control. Rather, our lives will be marked by God-given tranquillity. Indeed, “abundant peace belongs to those loving [Jehovah’s] law.”—Psalm 119:165. Remain ‘Spotless, Unblemished, and in Peace’ 20. Why can we say that a spiritually unblemished state is possible? 20 Happily, all within Jehovah’s organization, including the new ones now coming in, can be acceptable to God. (Acts 10:34, 35) With Jehovah’s help, it is possible “to repudiate ungodliness and worldly desires” and live as true Christians should. (Titus 2:11-14) Though we were once alienated from Jehovah, and our minds were on wicked works, we have been reconciled to God through the death of Christ. Thus a spiritually unblemished state is possible, provided that we continue in the faith and are not shifted away from the hope of the good news.—Colossians 1:21-23. 21. How can we finally be found ‘spotless, unblemished, and in peace’? 21 With the help of Jehovah, his Word, and his organization, we can remain unspotted by the world and unblemished by its ways, actions, and attitudes. Thus we can also know true peace. Yes, by persevering in our holy worship of Jehovah, we can finally be found ‘spotless, unblemished, and in peace.’ How Would You Respond? ◻ Why is holiness required of Jehovah’s people? ◻ How can we remain spotless and unblemished? ◻ What is required to be “in peace”? ◻ In what ways may we show dependence on God’s help? [Pictures on page 16, 17] Aspects of keeping ‘spotless, unblemished, and in peace’ Serving God in wholehearted dedication Cultivating the Christian personality Having spiritually upbuilding association Seeking peace with God through prayer
<urn:uuid:84d1eb13-bf59-4686-b215-4f0e4f7b36e2>
CC-MAIN-2021-43
https://wol.jw.org/en/wol/d/r1/lp-e/1986324#h=6:0-7:0
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585177.11/warc/CC-MAIN-20211017113503-20211017143503-00710.warc.gz
en
0.949574
3,957
2.515625
3
|At what Resolution Should Precision Agriculture Operate?| |1. Spatial N Variability| |2. Small Scale Variability, Sources| |2016 Leo M Walsh Soil Fertility Distinguished Lectureship| In 1993, our variable rate technology team (Nitrogen Use Efficiency Web, and Biosystems and Agricultural Engineering, Oklahoma State University) asked an intriguing question that has truly served as a guiding light for our efforts at OSU. Our engineers said that they simply needed to know the resolution or scale at which significant biological differences existed in agricultural fields. When this information had been generated they would then begin to build 'precision-agricultural-equipment' capable of operating at that scale. As a result of this vision, team members in soil science began to embark on answering that specific question. First, this group identified visually homogenous areas and took 8 soil cores from each 1x1 ft area within a 490 ft2 grid at two locations. These results were later published in the Soil Science Society of America Journal (62:683-690). This work clearly showed that significant differences in soil test properties (Mehlich III-P, organic carbon, total nitrogen, NH4-N, and NO3-N) existed at distances less than 3 feet apart. This was an alarming finding, considering early 1990's research thrusts in the grid sampling arena. If you shift the sampling point (center or corner of each grid) for a grid based system 3-10 feet away, would it result in an entirely different contour map? The answer to that was clearly yes. Ensuing work by Solie et al.1999 showed that in order to describe the variability encountered in the field experiments, soil, plant and indirect measurements should be made at the meter or submeter level. Once these fundamental questions had been answered, another trial was initiated to demonstrate the benefits of operating at a 0.84m2 spatial scale (J. Plant Nutr. 24:313-325). In the second year of the experiment, there was a trend for a lower N rate and a higher efficiency of use for the 0.84 m2 resolution. Although this study was inconclusive it was a step in the right direction in terms of experimental design and rigor required to evaluate the importance of spatial scales. To some extent this study was unsuccessful in demonstrating the benefits of operating at a resolution of 0.84m2 and smaller, simply because we did not have the appropriate Nitrogen Fertilization Optimization Algorithm (NFOA) in place. However, contour plots from each of the experiments conducted by Ms. Joanne LaRuffa, clearly showed that differences existed at resolutions much smaller than 0.84m2. Contour plots were generated using one of the more advanced hand-held optical sensors developed by Dr. Marvin Stone and Dr. John Solie (image to the right, with 0.84m2 plots). That significant differences in biomass and N fertilizer need exist at resolutions less than 0.84m2 is undisputed. We simply have too many examples where differences in nutrient need at scales as small as 7 inches or 0.18m exist in wheat producer fields. Even in some of our long-term soil fertility experiments that have been managed the same way for over 30 years, we find significant differences in biomass and grain yield production over distances less than 1.0m2. How could such large differences (within plots) be found in a long-term experiment where management, and fertilization practices had been exactly the same for 30 years? One thing that was clear from our microvariability work was that significant differences in soil texture also existed at scales < 1.0m2. If texture differences were different, moisture holding capacity would also be affected and that would likely be visible in plant growth when moisture was limiting. Who can argue that the demands for fertilizer in the examples that follow are profoundly different, by-row (both wheat and corn)? Is the 'environmental approach' going to fertilize each of these rows with the exact same rate, even though need was entirely different. Is our approach to maximize yields going to fertilize each of these rows with the same rate even though we clearly know that one may require 50 kg less N? When corn plants emerge 3 to 7 days later in a monoculture, these plants can become weeds because they compete for moisture and nutrients with those plants that will produce a significant amount of grain. Should we fertilize each of these plants with the same N rate? Our goal must be to recognize the scale where we know differences exist. In corn, it is clearly by row, and by plant. If a system is developed that senses every 2 rows and applies a rate based on the average, we sacrifice the savings in fertilizer N that we know exists at that scale and the yield potential that won't be achieved because we averaged rates for those rows/plants that clearly required different amounts. The environmental implications and/or consequences of misapplied N fertilizer are not considered here, but an appropriate value must be placed on the scale which will deliver 'precision N placement' in agricultural fields. Early on, our project focused on predicting yield potential from sensor readings taken at early stages of growth. Implicit in this work was the scale at which readings would have to be taken. As a result we recognized that each 1m2 area had to be sensed independently and that yield would need to be determined from that same 1m2 area. From 1998 to 2002, we compiled data from 28 locations over this 5-year period and developed an index (In-Season-Estimated-Yield or INSEY) capable of predicting yield potential using in-season optical sensor based measurements. This INSEY index has now been significantly modified from earlier versions, however, one thing remains the same and that is the resolution or scale at which sensor measurements were taken and the ensuing grain yield. Would we have been able to demonstrate this relationship using a resolution of 10m2? This is highly unlikely considering the variability that we have encountered in agricultural fields. Most recent efforts have focused on the evaluation of a Field-Scale-Variable-N-Rate-Applicator developed jointly by Oklahoma State University and NTech Industries. Recognizing a problem area in Hennessey where there simply was no wheat was important (traveling vertically across a horizontal area where no wheat grew due to excessive moisture/ponding). In several cases we found that the sensor could miss by as much as 6 to 12 inches. What if we had been traveling the other direction (parallel with the problem) using a resolution of 10m2? Would we recognize the areas where there was no wheat? Based on averages, we would just fertilize the bare soil and the growing wheat with the same rate. This would really be environmentally sensitive! Has our project clearly demonstrated that there are economic benefits of working at the 0.4 to 1.0m2 resolution? Recent results demonstrated that averaged over 4 locations, NUE was improved by >15% when N fertilization was based on optically sensed INSEY, determined for each 1m2 area and a Response Index compared to traditional practices at uniform N rates (Agron J. 94:815-820). This same work showed that VRT treatment at the 1m2 resolution versus flat N rates (common practice employed today) resulted in revenue gains approaching 30$/ha. Did we evaluate VRT at a scale of 2.0m2? No. Why? Because we matched the scale at which we knew we could detect differences in yield potential and that would be the same scale where different nutrient needs would be present. This part of what we have done is quite simple. Our recent Field-Scale VRT experiments clearly showed the economic benefits of sensing and treating at the 0.4m2 scale versus flat rates. At those sites where the total preplant and topdress rates were similar (VRT vs VS2), the VRT treatment resulted in a net gain of $12.00 per acre. We do not have a 2.0m2 resolution VRT treatment to compare this to. However, all of the research that we have conducted over the years documents the need to operate at a scale finer than 1.0m2 and one that should not be compromised. All of the 10 field-scale VRT trials that our team put out this past year had demonstrated spatial scale differences at the 1.0m2 resolution. We know that and we have known this for a long time. If our group decides to develop an applicator that works at a much coarser scale than the one where we know differences in need exist and where differences in resultant yield potential exist, it is because we chose to bury our heads in the sand, not because we didn't have the scientific information available. Our most recent results in corn demonstrate the repeatable by-plant differences sensed with the GreenSeeker hand-held unit that is now commercially available via NTech Industries. Finding repeatable NDVI readings ranging from 0.4 to 0.9 within the same row demonstrates that not only does the variability exist, but that we can recognize it! Should we now chose to ignore it? If these differences can be recognized within row, the by-row differences (left and right) are a must for variable N rate application. Our field-scale applicator clearly demonstrated the economic benefits of operating at the 0.4m2 scale (in spite of many agronomic and engineering problems encountered during the winter of 2002). Even though there has not been significant interest in terms of purchasing equipment that operates at the 0.4m2 scale, it does not beg off the issue of where we ultimately need to operate. This question has been clearly answered and it is one area where many precision agricultural teams have simply missed the mark in terms of doing what is right versus doing what is possible. We must continue to do what is right and to develop solutions to the problems that we know exist in the field. Today, we can sense and fertilize every individual corn plant on-the-go, using GreenSeeker NDVI sensors. The need for having this kind of accuracy at very small scales is clearly illustrated in the corn photos, and graphs below |Graphs & Corn SlideShow|
<urn:uuid:3faafff6-7401-4ae5-9c35-89743ea99c07>
CC-MAIN-2021-43
https://nue.okstate.edu/Index_Resolution.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587608.86/warc/CC-MAIN-20211024235512-20211025025512-00670.warc.gz
en
0.960385
2,124
3.1875
3
A Brief History of (American) Arbitration European Roots and Colonial Growth Legal scholar Lauren G. Barnes points out that arbitration initially developed among members of the merchant class during the medieval period in Europe. Arbitration then took place almost solely among members of the merchant class. Considering that merchants were often traveling between fairs, in different towns and regions no less, in order to conduct business affairs with one another, they needed an efficient way to resolve disputes that arose from their recurring economic transactions. This dispute resolution process needed to do its job quickly and “in accordance with customary norms that merchants respected.”1 As a result, an adversarial court system in which the business relationship between the two parties could be severely, even permanently, damaged would not suffice for this purpose. Rather, a non-legal, yet still judiciously warranted system would be preferable. A few hundred years later, during the colonial period of the United States of America, arbitration retained much of the same role, expectations, and functions. Arbitration was most frequently utilized by craftspeople and merchants to resolve profession-based disputes. Ultimately, they found that it was easier, faster, and simpler to utilize arbitration than to submit their dispute to a legal system which was, in its infancy, already overwhelmed beyond belief.2 Arbitration thus provided them with a workable alternative that they used for many years to come. Yet the times, and the attitudes, changed. Arbitration did not, historically, enjoy the privileged legal, social, political, and economic status in the United States that it did during the colonial period or that it does in contemporary times. Rather, up until the beginning of the 1920s the only law governing arbitration proceedings in the United States came directly from court rulings, some of which dated back to the 17th and 18th centuries and many of which were condemnatory of arbitration. One such example was Lord Coke’s judgment in the famous ‘Vynior’s Case,’ decided in 1609, that formed the general basis for the common law doctrine that discriminated against mandatory arbitration for nearly two centuries. Lord Coke’s common law doctrine about arbitration held that “1) either party to an arbitration might withdraw at any time before an actual award; and 2) that an agreement to arbitrate a future dispute was against public policy and not enforceable.”3 From this decision, it was extrapolated that the parties to a dispute “may not oust the court of its jurisdiction,” meaning that courts may not be deprived of their jurisdiction even by private agreement.4 Moreover, early courts were hesitant to force parties to participate in arbitration when the justices could not be certain that the arbitration process itself was “fair and equitable.”5 The precedent established in Vynior’s Case was the controlling decision in most of American contract law regarding arbitration until around the early 1920s. Shifting Public Opinion Despite its contentious reputation, not everyone harbored ill-will or resentment towards arbitration. Numerous state and national organizations of varying backgrounds strongly felt it, particularly its enforcement, was necessary for judicial and economic progress within the United States. In order to highlight the viability of arbitration, the New York Chamber of Commerce (NYCC henceforth), along with the American Bar Association’s Committee on Commerce, Trade, and Commercial Law (ABA-CCTC henceforth), designed a multifaceted political campaign to overturn the existing laws and regulations that disfavored arbitration to litigation. The NYCC and ABA-CCTC successfully enacted the New York Arbitration Act of 1920 and, following that success, lobbied Congress to pass similar legislation on a national level. During the battle to pass the Federal Arbitration Act (FAA), the NYCC and ABA-CCTC’s main ally was then Secretary of Commerce, Herbert Hoover, who believed that arbitration would ultimately lead to the noble goal of business self-regulation.6 In facilitating that goal, the FAA would make arbitration agreements as “valid, irremovable, and enforceable” as other contracts under federal laws. The NYCC and its supporters made clear the practical benefits of arbitration in numerous letters, phone calls, and amicus curiae briefs submitted to the appropriate governmental officials. With 120+ state and national organizations backing them, the NYCC and ABA-CCTC successfully lobbied for the passage of Federal Arbitration Act, one of the most important events in the United States’ history of arbitration.7 Passage of the Federal Arbitration Act (FAA) The FAA was justified on the grounds of a Congressional concern about the state and federal court systems becoming congested which would mean, among other things, increasingly expensive costs for litigation. Yet almost all court cases, presumably, would take longer by association. This structural congestion is not to mention the professional, psychological, and physical toll that such increased caseloads would have on judges, lawyers, and other court officials. In order to prevent these, and other, unwanted consequences from occurring, the FAA provided the legal framework by which arbitration was recognized as an alternative method to dispute resolution.8 As a general overview of its structure/contents, the FAA declares that either party may ask the court to stay the litigation and/or compel the other party to resolve their dispute through the appropriate channels of arbitration.9 In addition, the FAA lists the ways in which it empowers arbitrators to guide the process such as by compelling witnesses to appear at the arbitration proceeding.10 Finally, the FAA describes the procedures by which the winning party may seek to enforce their arbitral award11, the procedures by which the non-winning party may seek to vacate the winning party’s arbitral award12, and the limited grounds on which a court may base its decision to modify a winning party’s arbitral award.13 More of this legislation will addressed in some of the following sections of this work. Enforcing the FAA Over Time Some of the early Supreme Court decisions immediately following the passage of the FAA remained resistant to endorsing pro-arbitration attitudes. Supreme Court justices during this time had trouble accepting the legitimacy of arbitration as an alternative means to litigation. Some felt that since it lacked trial by jury, it was inadequate for judicial (albeit non-legal) use. Others believed that the lack of publishing records and rulings, along with other relevant documentation, opened it up for numerous misdeeds that would be concealed. Other still claimed that the lack of, or at least the reduced scope of, judicial review rendered it unacceptable.14 This was the general legal atmosphere surrounding the FAA for several decades, ranging from the 1940s until about the 1970s. During the mid-1960s, an important legal development was that the Federal Rules of Civil Procedure were significantly amended. One set of these rule revisions involved the process for filing class-action lawsuits, effectively making it simpler and easier. The result was that many legal classes, such as schoolchildren, prisoners, consumers, and employees, could now have their day in court. While such rule revisions are important because they paved the way for new federal statutory rights and federal agencies, they are relevant to the FAA because it meant that there was an increase in the type and amounts of litigation seen in state and federal courts. Not surprisingly, then, in 1976, Chief Justice Warren publicly called for a ‘reappraisal of the values of the arbitration process’ as a result of the increased strain placed upon the federal and state justice systems. He asserted that ‘[t]here is nothing incompatible between efficiency and justice” and recommended that the United State judicial system make more use of the ‘well-developed forms’ of arbitration to settle disputes.”15 In the years following Chief Justice Warren’s address, the FAA’s scope and degree of jurisdiction expanded rapidly at the hands of the Supreme Court justices to prevent the “federal courts [being] flooded by litigation increasing in volume, in length, and in a variety of novel forms.”16 Starting in the early 1980s, nearly 60 years after the FAA’s initial passage, the Supreme Court’s began to strongly favor arbitration when deciding arbitration-related cases, laying the foundation for the Court’s latest instance of judicial activism. In Moses H. Cone Memorial Hospital v. Mercury Construction Corp., 460 U.S. 1 (1983), for instance, the Supreme Court ruled that when determining whether a particular dispute comes within an arbitration clause, the general rule should be to resolve all disputes in favor of arbitration. A year later, in Southland corp. v. Keating, 465 U.S. 1 (1984), the Supreme Court rejected the view that the FAA only applied to cases tried in the federal court system. Instead, the Court held that the FAA’s jurisdiction included disputes over contracts brought into state courts, insofar as the contract and its dispute involved interstate commerce in some directly relevant way. Several other cases, such as Mitsubishi Motors v. Soler Chrysler-Plymouth, 473 U.S. 614 (1985), Shearson/American Express v. McMahon 482 U.S. 220 (1987), and Gilmer v. Interstate/Johnson Lane Corp., 500 U.S. 20 (1991), further enshrined the Supreme Court’s broad interpretation of the FAA. Then, in 1995, a special committee of the U.S. Judicial Conference (essentially, the federal judiciary’s policymaking entity) generated a “long term plan” that predicted a “nightmarish” scenario in which there would be an overwhelming amount of demand for courts.17 Part of its predictions included the figure that, by the year 2010, there would be 610,800 court cases filed. This was to be more than double the number of filing in 1995 and the court systems were over-bloated as is. These conclusions were then used to inform elected representatives who helped to reform federal procedure and continue to enforce arbitration and defend its viability contra litigation. These legal and political matters have continued to change since then.18 1 Lauren G. Barnes, “How Mandatory Arbitration Agreements and Class Action Waivers Undermine Consumer Rights and Why We Need Congress to Act,” Harvard Law & Policy Review 9:2 (2015), 334. 2 Steven A. Certilman, “A Brief History of Arbitration in the United States,” New York Dispute Resolution Lawyer 3:1 (Spring 2010), 10. 3 Niall Mackay Roberts, “Definitional Avoidance: Arbitration’s Common-Law Meaning and the Federal Arbitration Act,” U.C. Davis Law Review 49 (2016), 1568. 4 Klaus Peter Berger, “Vynior’s Case, 8 Co. Rep. 81 b. et seq. (1609),” Translex (published March 01, 2016 and accessed February 18, 2018), https://www.trans-lex.org/801200/_/vyniors-case-8-co-rep-81-b-et-seq-/. 5 Jill I. Gross, “Justice Scalia’s Hat Trick and the Supreme Court’s Flawed Understanding of Twenty-First Century Arbitration,” Brooklyn Law Review 81 (2015): 117. 6 Stone and Colvin, “The Arbitration Epidemic,” 7. 7 Resnik, “Diffusing Disputes,” 2860. 8 9 U.S.C. §2. 9 9 U.S.C. §3,4. 10 9 U.S.C. §7. 11 9 U.S.C. §9. 12 9 U.S.C. §10(a)(1-4). 13 9 U.S.C. §11(a)-(c)). 14 Bernhardt v. Polygraphic Co. of Am., 350 U.S. 198 (1956), 203; “Arbitration carries no right to trial by jury…[a]rbitrators do not have the benefit of judicial instruction of the law [and] need not give their reasons for their results…and judicial review of an award is more limited than judicial review of a trial.” 15 Warren Burger, “Agenda for 2000 A.D.: A Need for Systematic Anticipation,” Vital Speeches of the Day 42:15 (1976), 450-457; This event makes sense of several resulting phenomena, especially when considered against the legal background of the FAA, and justifies the claim that the Court is ultimately guilty of ‘judicial activism.’ This point will be made more sharply by the criticisms raised from the access justice perspective. 16 Barrentine v. Ark.-Best Freight Sys., Inc., 450 U.S. 728 (1981), 746. 17 Long Range Plan for the Federal Courts, JUD. CONF. U.S. 18 (Dec. 1995), http://www.uscourts.gov/uscourts/FederalCourts/Publications/FederalCourtsLongRangePlan.pdf. 18 Barnes, “How Mandatory Arbitration Agreements and Class Action Waivers Undermine Consumer Rights,” 336-337.
<urn:uuid:da22f51a-dc95-4e93-817c-6d1dcac3cb22>
CC-MAIN-2021-43
https://tafacorianthoughts.com/2020/07/31/scotus-and-the-mandatory-arbitration-revolution-part-2-historical-context/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00630.warc.gz
en
0.95214
2,761
3.9375
4
Raising sheep in paradise: Trinidad and Tobago Trinidad and Tobago are sister islands in the Caribbean, the southern most in the West Indies, situated just 7 miles off the coast of Venezuela and 11 degrees north of the equator. Famous for carnivals, calypso music and steel bands, T&T, as the islands are often called, gained independence from England in 1962. Remnants of the colonial period still remain, especially in Tobago, which was once dominated by a handful of large sugar plantations. Trinidad is the larger, more populous island, approximately the size of Delaware. Tobago, 20 miles off its northeast coast – a short 15 minute flight from Port of Spain – is barely 20 miles long and 10 miles wide. There are significant differences between the two islands, in almost every respect. Trinidad is industrialized, appearing more prosperous than other Caribbean islands I have visited, due in large part to petroleum – oil and natural gas. Food processing is another important economic activity. The main agricultural products are sugar, cocoa, citrus, rice and poultry. The country imports 75% of its food stuffs. The population of Trinidad is quite diverse in terms of ethnicity and religion. Approximately 40 percent of the population is East Indian, immigrants brought in to work the sugar fields. This statistic can be confirmed by the large number of Hindu temples that can be seen throughout the country. Another 40 percent is Black African, descendants of the 18th and 19th slave trade. They are mostly Christian in faith; Roman Catholic is the major denomination. Seventh Day Adventist seemed popular in Tobago. You will see an occasional mosque, as a growing part of T&T's population is Moslem. There are lesser minorities of Chinese, white and mixed ancestry. English is the major language spoken. Cricket is the national sport. English common law prevails. While it attracts some eco-tourists, mostly from Germany and England (few from the United States), Tobago remains essentially unspoiled, a tiny island paradise with picturesque mountains, beautiful beaches and unspoiled rainforest. It is home to more species of birds and butterflies than any other Caribbean island. Tobago's population is more homogeneous than its sister island, consisting mostly of peoples of Black African descent. Scarborough is the largest city. The island boast all major conveniences, but is void of the commercialism found in other Caribbean island nations. Agriculture remains an important part of the economy. Tobago is similar to Jamaica, in that sheep can be found grazing "everywhere"; in Jamaica goats are ubiquitous. Livestock do not roam free in Trinidad. A variety of hair sheep breeds can be found in Trinidad and Tobago, many of which I had not seen before. As in other island countries, the most popular breed is the Barbados Blackbelly (JPG), the "antelope-like" sheep, brown in color, with black points and a black underbelly. Jokingly, we use to refer to Blackbellies as "reproductive skeletons" because while they are one of the most reproductively efficient sheep in the world, they grow slowly and appear almost devoid of muscle. However, this could not be said of the Blackbellies in T&T. Many ewes showed good size and significant udder development. On the better sheep farms, lambs reached market weights in excess of 90 pounds. Another common breed in T&T is the West African, a reddish brown sheep, with more muscle expression than the Blackbelly. Producers commonly cross the West African with the Blackbelly to improve the quality of lambs. The West African was an impressive-looking hair sheep, in my opinion. Too bad we don't have any in the U.S., nor easy access. The Persian Blackhead (JPG) is another new breed I saw, quite numerous in Tobago. It is a fat-tailed hair sheep from Africa that makes up half of the Dorper, a hair breed that is gaining rapid popularity in the U.S. (Dorset Horn is the other breed that comprises the Dorper.) Persians are white with a black head and neck. They show good frame, but are not as well muscled as the Dorper, Katahdin or West African. The St. Croix or "Virgin Island White" is another common breed in the islands. They are distinguished by their white color. They are heavier muscled than the Blackbellies and considered to be better milk producers. It was only the second time I had ever seen a Wiltshire Horn, a hair sheep native to the British Isles. Someone had brought a Wiltshire Horn ram to last year's National Hair Sheep Symposium in Timonium, but I was more impressed with the animals I saw in Trinidad. It is worth noting that the Wiltshire Horn was crossed into the U.S. Katahdin to improve size and scale. It is the only horned sheep in Trinidad and Tobago. We saw Katahdins in T&T, due in large part to the efforts of the Maryland Department of Agriculture to export hair sheep to the Caribbean. Confinement, early weaning and concentrate feeding of lambs, and accelerated lambing are typical characteristics of sheep production systems in T&T. Most sheep and goats are kept on elevated floors with either metal or wooden slats. Others are kept on dirt. Confinement facilities may be shed size or as large as chicken or hog houses. Feeders are usually fence line, arranged on the outsides of the pens. Waterers, too, are attached to the outside, so there is little contamination with urine and fecal matter. A salt/mineral block is often dangled by a rope, a simple idea that I had never thought of before. Everyone has cisterns for collecting water. The rainy season runs from June to December. Flooding is not uncommon. While some grazing occurs, most feed is brought to the sheep in the form of green chop or concentrates. Some silage is fed. Small producers will cut forages by hand, whereas bigger operations will mechanically harvest the tall-growing grasses. While tropical forages grow very rapidly, they are generally not as high in energy and protein as temperate species. Protein sources are not readily available. Nutrition is further compromised by the fact the forages are generally cut and/or fed when they are too mature and stemmy, and their nutritive value and palatability has declined substantially. Of course, the same can be said about forages in the U.S. where continuous grazing causes pastures to be grazed when the grass is too mature and hays are often cut when plants have already gone to seed. It is expensive to feed concentrates in T&T. Corn is very expensive to import. Concentrate rations are mostly home-grown, composed of various by-products of food processing. Pregnancy toxemia is a re-occurring problem, caused by inadequate intake of energy and undoubtably exacerbated by lack of exercise in confinement housing. Reproduction in the ewe is affected by photo period – the length of day and night. Sheep are called "short-day" breeders because in temperate regions, ewes generally come into heat as day length becomes shorter. However, in Trinidad and Tobago, day length does not vary significantly, thus ewes will express estrus throughout the year. Breeding can be continuous. The better sheep farms will remove the rams and breed for three lamp crops in two years. If proper nutrition is provided, ewes are usually quite prolific, especially the Blackbellies. Lambing every 8 months requires early weaning, typically before 90 days. Lambs seemed to be universally creep fed. Creep panels are used to keep ewes out of the creep area – either vertical or horizontal slats. It was the first creep area I saw where lambs had to crawl under a horizontal board to enter the creep area. After weaning, lambs are fed for rapid gain under feed lot conditions. Ram lambs are generally not castrated. As here, the most common health problem affecting sheep and goats in T&T is internal parasites, primarily the barber pole worm, Haemonchus Contortus. Keeping animals in confinement, to a large extent, can keep parasites in check. Coccidiosis, on the other hand, is more of a problem in confinement. Animals are routinely treated for coccidia, but unfortunately products, such as Bovatec, Rumensin and Deccox are not readily available to put in the feed or mineral for prevention. As previously mentioned, pregnancy toxemia is a major concern in sheep flocks. Other disease problems are similar to what's experienced in the U.S. Marketing can be a real problem in the islands, especially the more remote Tobago. We visited a large sheep farm (400 ewes and growing) that had a contract to supply a super market. In Tobago, lambs are sold to local villagers for festivals or to buyers coming from the bigger island. Farmers in Tobago also get most their feed and supplies from Trinidad. As in other Caribbean countries I have visited, there seemed to be a great deal of optimism in small ruminant production, as these small countries strive to supply a greater portion of the lamb and goat that is consumed on their soil. Author's note: I visited Trinidad and Tobago in October 1999 on a trade mission conducted by the International Marketing Division of the Maryland Department of Agriculture. It was one of several trips to the Caribbean I have made on MDA's behalf. MDA should be commended for its efforts to export U.S. livestock genetics abroad – they have been very successful. It could be your sheep or goats next! This article was written in 2000 by Susan Schoenian.
<urn:uuid:7e8b6653-9058-47e5-9447-b2a5cd3b2234>
CC-MAIN-2021-43
https://www.sheepandgoat.com/tt
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00510.warc.gz
en
0.959531
2,050
2.828125
3
Gustave Caillebotte is now considered to be one of the most recognizable artists of Paris’ golden age, the Fin-de-Siècle. Although he is now known for his work as a painter, Caillebotte’s life was filled with many other interests and pastimes. If you’d have asked his contemporaries, such as Edouard Manet and Edgar Degas, they might have been more inclined to talk about Caillebotte as a patron of the arts rather than an artist in his own right. As such, Caillebotte’s place in the history of French art is unique and provides modern art lovers of art with a fascinating insight into the Parisian High Society which has so captured the contemporary imagination and inspired many of the romantic connotations now associated with late 19th century Paris. 1. Gustave Caillebotte Had A Wealthy Upbringing Gustave Caillebotte was by no means a self-made man. His father had inherited a prosperous textile business, who had provided bedding to the armies of Napoleon III. His father served as a judge at Paris’ oldest court, the Tribunal du Commerce. His father owned a large holiday home on the rural outskirts of Paris, where it is thought that Gustave would have first taken up painting. Are you enjoying this article?Sign up to our Free Weekly Newsletter At the age of 22, Caillebotte was enlisted to fight in the Franco-Prussian War in the Paris Defence Force. The impact of the war would indirectly influence his later work, as he captured the newly modernized streets that emerged out of the war-torn and politically ravaged city. 2. He Was Qualified As A Lawyer Two years before he was deployed in the military, Gustave Caillebotte graduated from university, having studied classics and, following in his father’s footsteps, law. He even earned his license to practice law in 1870. However, this was just a short time before he was called up to the army so never worked as a practicing lawyer. 3. He Was a Student at the École des Beaux Artes Upon his return from military service, Gustave Caillebotte began to take a greater interest in making and appreciating art. He enrolled at the École des Beaux Arts in 1873 and soon found himself mixing in the social circles that encompassed both his school and that at the Académie des Beaux Artes. This included Edgar Degas, who would go on to initiate Caillebotte into the Impressionist movement, with which his work would go on to be associated with. However, his father died a year later, and he subsequently spent little time studying at the school. That said, the connections he made in his time as a student would go on to play an important role in his development as both a painter and a patron of art. 4. Impressionism Meets Realism Although often being associated with and exhibiting alongside the impressionists, Gustave Caillebotte’s work retained a style more akin to the work of his predecessor, Gustave Courbet. In his way, Caillebotte took the new-found impressionist appreciation for capturing light and color; and merged this with the realists’ desire to imitate on canvas the world as it appears before the painter’s eyes. This has often been compared to the work of Edward Hopper, who would later achieve similar results in his depictions of inter-war America. As a result, Caillebotte managed to capture Paris with a gentle form of realism that, even to this day, evokes a romantic and nostalgic vision of what the city is imagined to be – both in the minds of those who have visited the city and those who wish to do so eventually. 5. He Was A Painter Of Life In Paris The style of his painting is, however, only one element of his works that make them so popular among modern audiences. He also had a special ability to capture the individuality of the people who formed the subject of his work. Whether in portraits of his family in their own domestic settings, outside in the streets capturing the hustle and bustle of daily Parisian life, or even when depicting members of the working class toiling away in the summer heat; Gustave Caillebotte always managed to convey the humanity within each of these figures. This is one of the many reasons why his artworks are so popular, as it (sometimes quite literally) opens a window into what it was like to live and work in Paris at the end of the 1800s. 6. His Work Was Influenced By Japanese Prints You might notice that his artworks often have a slightly distorted perspective. This is often thought to be because of the influence of Japanese art, which was incredibly popular among Gustave Caillebotte’s contemporaries. Artists such as Vincent Van Gogh had collections of Japanese prints, and the influence of these are well documented on his work and the work of his contemporaries. Caillebotte was no exception to this trend. His contemporaries even noticed the similarity between his work and that of the Edo and Ukiyo-e prints which had become so popular in Paris. Jules Claretie said of Caillebotte’s 1976 Floor Scrapers painting that “there are Japanese watercolors and prints like that” when commenting on the slightly skewed and unnatural perspective with which Caillebotte painted the floor. 7. Caillebotte Was A Collector Of All Sorts As has been mentioned several times already, Gustave Caillebotte was well known for his love of collecting art, as much as producing it. He had works by Camille Pissarro, Paul Gauguin, Georges Seurat and Pierre-Auguste Renoir in his collection; and played a significant role in convincing the French government to purchase Manet’s famous Olympia. In fact, his support even extended beyond buying the work of his friend, Claude Monet, in paying the rent for his studio. This was just one of the many acts of financial generosity he was able to afford those around him thanks to the wealth he had inherited from his father. Interestingly, his collecting habits even extended beyond the arts. He had a sizable stamp and photography collection, as well as enjoying cultivating a collection of orchids. He even collected and built racing boats, which he sailed on the Seine at events such as that depicted by his dear friend Renoir in Luncheon at the Boating Party, in which Caillebotte is the figure sat immediately to the bottom right of the scene. 8. He Had A Penchant For Textile Design Gustave Caillebotte was a man of many talents and interests, including a love for textile design. No doubt a trait that was inherited from his familial past in the textile industry. It is presumed that in his works Madame Boissière Knitting (1877) and Portrait of Madame Caillebotte (1877) that the women he has painted are in fact stitching designs which Caillebotte himself had designed. This love and understanding of textiles and fabric were key in his ability to capture sheets blowing in the wind and suggest the rustling of awnings over the windows of his city center apartment. 9. He Died Tending To His Beloved Garden Gustave Caillebotte died suddenly of a stroke one afternoon while tending to the orchid collection in his garden. He was just 45 years old and had slowly become less interested in painting his own work – focusing instead on supporting his artist friends, cultivating his garden and building racing yachts to sell on the River Seine which his property backed on to. He had never married, although he left a significant sum of money to a woman with whom he had shared a relationship before his death. Charlotte Berthier was eleven years younger than Gustave and due to her lower social status, it would not have been deemed proper for them to officially marry. 10. Gustave Caillebotte’s Posthumous Reputation Although mixing with many of the other most well-known painters of his day, and exhibiting alongside them, Gustave Caillebotte was not particularly well regarded as an artist during his life. His work supporting artists, both buying and collecting their work, was what made him a noteworthy societal figure during his lifetime. After all, owing to his family wealth, he had never had to sell his works to make a living. As a result, his work never received the kind of public veneration that artists and gallerists pushing for commercial success might have otherwise relied on. What’s more, it is likely due to his own modesty that his name did not initially survive alongside his friends and associates. Upon his death, he had stipulated in his will that the works in his collection be left to the French government and that they be displayed in the Palais du Luxembourg. However, he did not include any of his own paintings in the list of those which he left to the government. Renoir, who was the executor of his will, eventually negotiated that the collection be hung in the Palace. The subsequent exhibition was the first public display of Impressionist works which had the support of the establishment and as such, those names whose work was shown (which obviously excluded Caillebotte) became the great icons of the movement which he had had such an important role in shaping. It was only many years later, when his surviving family began to sell off his work in the 1950s, that he began to become the focus of more retrospective scholarly interest. This particularly came to a head when his work was shown at the Chicago Institute of Art in 1964, when the American public was first able to encounter, en masse, his various depictions of life in 19th century Paris. They quickly grew in popularity and it wasn’t long before his work was regarded as epitomizing the era in which he lived and worked.
<urn:uuid:ec8396fa-1700-4364-a583-b0426297bd7d>
CC-MAIN-2021-43
https://www.thecollector.com/gustave-caillebotte/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585280.84/warc/CC-MAIN-20211019171139-20211019201139-00470.warc.gz
en
0.991174
2,122
3.09375
3
Your Guide to Implementing ISO 27701 Since 2016 and within a relatively short period of time, modern data protection legislation has been passed in many countries around the world. The most notable is the EU’s General Data Protection Regulation (GDPR) which has shaped therequirements for organisations to ensure the rights of data subjects when processing their personal data. The relative speed at which this legislation has been established has left some organisations unable to adequately respond, and well- publicised breaches have occurred. Despite the well signposted roll out of the GDPR, it doesn’t provide specific guidance on what measures should be taken to ensure compliance with its requirements. Further, existing standards do not have, in most cases, a robust enough set of clauses or controls to ensure data privacy is addressed in full through implementation of management systems. The International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC) have developed ISO 27701 to provide the necessary guidance for businesses to effectively address data privacy and ensure the gap between existing management systems requirements and global privacy data legislations are effectively bridged. GDPR – AN OVERVIEW OF LEGISLATION The GDPR was adopted by the EU in April 2016 and replaced the EU Data Protection Directive 95/46/EC. This new legislation has initiated obligations to any organisation with data processing responsibilities, and is applicable to organisations outside of the EU too. It has harmonised privacy legislation across the EEA. Any non-EU entity offering goods or services to individuals located in the EU are also bound by the requirements of the GDPR. Businesses and organisations with sizeable personal data processing requirements are uniquely affected and ensuring conformity to the legislation is paramount. Organisations must have a lawful basis for processing personal data and only process it for a specified purpose. Individuals have the right to request a copy of all data that is held on them, including an explanation of how such data is used and if third parties have access. Individuals may request for their data profile to be passed to another data processor; furthermore, individuals also have the right to withdraw consent for processing and to request for data that is no longer required to be erased. Organisations and individuals who process personal data are now required to have appropriate security controls in place to ensure confidentiality of the data they hold or process. Personal data can be transferred outside of the EU, but only to countries which are considered to have adequate legislation for preserving the rights of EU data subjects. Notifications of data breaches must be submitted to the supervisory authority; for the UK this is the Information Commissioners Office (ICO) within 72 hours of recognition of a breach being identified. The ICO is the UK’s independent authority set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals. Further guidance can be found through the UK Government Data Protection Act 2018 page. What is ISO 27701 and Why is it Needed? In common with many privacy legislations around the world, there is very little guidance on how to implement processes to be compliant with GDPR. ISO 27701:2019 is a privacy extension to the international information security management standard, ISO 27001 (ISO 27701 Security techniques – Extension to ISO 27001 and ISO 27002 for privacy information management – Requirements and guidelines). ISO 27701 details the requirements for and gives the required guidance for the establishment, implementation, maintenance and improvement of a Privacy Information Management System (PIMS). The standard is based on the requirements, control objectives and controls of the ISO 27001 standard, and includes a suite of privacy requirements, controls and control objectives. Concepts of information security are familiar to organisations which already have an operational Information Security Management System (ISMS). The new PIMS will ensure that organisations have comprehensive and universally applicable data governance which directly map to their jurisdictions’ legislative requirements. The standard was drafted with input from experts and data protection authorities from around the world, including the European Data Protection Board. Data protection legislations from all continents were taken into account. It is close to GDPR and each clause maps to corresponding GDPR articles. But ISO 27701 is not GDPR specific; it is a global standard. And it represents the state of the art in terms of privacy protection. Organisations implementing it will demonstrate a proactive approach to personal data protection. Bolt on to ISO 27001 ISO 27701 differs slightly in that the standard requires an existing management system to attach to. Not every clause and control is applicable in all instances. The requirements of the standard are split in to the four groups listed below: PIMS requirements related to ISO 27001 are outlined at clause 5 PIMS requirements related to ISO 27002 are outlined at clause 6 PIMS guidance for Personally Identifiable Information (PII) Controllers are outlined at clause 7 PIMS guidance for PII Processers are outlined at clause 8 Additionally, applicable controls are outlined within annexes to the main body of the standard. The following can be used as a guide for relevance: Annex A lists all applicable controls for PII Controllers. Annex B lists all applicable controls for PII Processors. Annex C maps the provisions of ISO 27701 against ISO 29100. Annex D maps the provisions of ISO 27701 against the GDPR. Annex E maps the provisions of ISO 27701 against ISO 27018 and ISO 29151 Annex F provides guidance for applying ISO 27701 to ISO 27001 and ISO 27002. In most circumstances, organisations with existing certification to ISO 27001 should start at Annex F to understand how the application of PIMS fits in to their existing ISO 27001 ISMS. This annex refers to three instances for application of the standard: Application of security standards as is Additions to security standards Refinement of security standards Clauses 5 to 8 within PIMS extend the requirements of ISO 27001 to incorporate PII considerations. Clause 5 provides PIMS-specific guidance concerning the information security requirements in ISO 27001 appropriate to an organisation which acts as either a PII controller or processor. Organisations should implement a PIMS Statement of Applicability (SoA) which is influenced by whether they are a controller or processor (or both). Organisations can create a combined ISMS-PIMS and extend their ISMS SoA to include the PIMS controls. Annex A + Clause 6 = 37 enhanced controls Annex A + Clause 7 = 31 new controls for controllers Annex A - Clause 8 = 18 new controls for processors Detailed below are the additional considerations within clause 5 of the ISO 27701 standard which may be observed as extra to existing ISMS requirements: |5.1||The requirements of ISO 27001 must be extended to the protection of privacy as potentially affected by the processing of PII. A glance at Annex F provides a table which gives visual indication of how this will look.| |5.2.1||An additional requirement to ISO 27001 clause 4.1 is to outline that an organisation will determine its role as a PII Controller and/or processer. Additionally external and internal factors that are relevant to context and affect the ability to achieve outcomes of its PIMS require indication. This includes any relevant legislation adherence already in place as a consideration within the existing ISMS or contractual requirements which hitherto had been identified in differing clauses or Annex controls within ISO 27001.| Where an organisation has both PII controller and PII processor roles identified, separate roles must be determined, each of which will be subject to a separate control set. |5.2.2||A consideration extra to ISO 27001 clause 4.2 is the requirement to include interested parties with responsibilities associated with the processing of PII. This can include customers, which again is not something which may have previously been considered in an ISO 27001 ISMS. Additionally requirements which are relevant to the processing of PII can be determined by legal requirements, contractual obligations or self-identified objectives.| |5.2.3||The scope of the ISMS is required by ISO 27001 clause 4.3. Additional PIMS factors for scope include an organisation including processing of PII. PIMS scope determination, therefore, can require a revision of the ISMS because of the extension to interpretation of what constitutes information security in ISO 27701 clause 5.1.| |5.2.4||Further to ISO 27001 clause 4.4 an organisation is required within the new standard to establish, implement, maintain and continually improve a PIMS in accordance with the requirements of ISO 27001:2013 Clauses 4 to 10, extended by the requirements in Clause 5.| |5.3||Within ISO 27001, organisations are required to demonstrate commitment to the ISMS through leadership initiatives and the creation of policies, roles & responsibilities and guidance. Likewise, the PIMS requires a similar input from the top management along with relevant PIMS specific interpretations as indicated at 5.1 to ISO 27701 which covers all mirrored aspects of clause 5 of the ISMS.| The requirements of ISO 27001 to address risks and opportunities require augmentation with the considerations of clause 5.1 in ISO 27701. Furthermore, Information Security risk assessments identified within ISO 27001 are applicable with the following additional requirements: 1. The organisation shall apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability, within the scope of the PIMS. 2. The organisation shall apply privacy risk assessment process to identify risks related to the processing of PII, within the scope of the PIMS. 3. The organisation shall ensure throughout the risk assessment processes that the relationship between information security and PII protection is appropriately managed. This can be an integrated risk assessment process or parallel processes which are controlled separately; this depends entirely on the organisation to determine. Additionally, ISO 27001 clause 6.1.2.d is refined to include an assessment for potential consequences for both the organisation and PII principals that would result if the risks identified during the 6.1.2.c (ISO 27001) were to materialise. Further considerations are given to the Statement of Applicability which would have been generated by the organisation when implementing the ISO 27001 ISMS. As an organisation would have encountered an “opt out and justify” approach to produce the SoA in the first instance, likewise for the PIMS, not all control objectives andcontrols listed within Annex areas need to be included during PIMS implementation. Justification for exclusion where controls are not deemed necessary can be identified. |5.4.2||Information security objectives from the organisations ISMS from clause 6.2 augmented by the interpretation of ISO 27701 clause 5.1 must be considered.| |5.5||Support considerations from ISO 27001 at clause 7 are applicable along with the additional interpretation specified within ISO 27701 clause 5.1.| |5.6||Operational consideration from ISO 27001 at clause 8 including risk treatment planning are similarly required by ISO 27701 along with additional information which is identified through addressing clause 5.1 to the latter standard.| |5.7/5.8||Similarly; the Monitoring/Measuring & Improvement considerations which are live within an existing ISMS require further augmentation from the considerations given to clause 5.1 to ISO 27701.| The processes identified above indicate that clause 5.1 in the new standard is a key point to the implementation of a PIMS. The extension to the protection of privacy for processing PII is a key element to implementation. It guides the consideration to be given when addressing the further clause areas of ISO 27701. The following table provides a simple overview of the information on the previous page: |ISO 27001 Clause||ISO 27701 Extension| 1. Resourcing/Establishment of Roles 2. Communication (Internal/External) 3. Anticipated outcome 4. Control and Guidance 5. Continual Improvement of PIMS |7.2||Competency profiles of individuals assigned to privacy roles| |7.3||Awareness of the PIMS policy and how personnel contribute to the establishment and improvement of the system| |7.5||Documentation for PIMS with additional considerations on information and documentation non-organic to the organisation.| |8.1||PIMS Risk Treatment activation| |8.2||PIMS Risk Assessment process| |8.3||PIMS Risk Treatment Plan including amendments to existing risk registers| |PIMS Performance and analysis of PIMS effectiveness including: 1. Internal Audit 2. Management Review |10||PIMS Continuous Improvement considerations| To get a quote for ISO 27701 certification simply click here and complete our online quote form. You can download a PDF of this implementation guide here: NQA ISO 27701 Implementation Guide. Information Security Toolkit ISO 27001 FAQs ISO 27001 Implementation Guide ISO 27701 Implementation Guide ISO 27001 Information Security Checklist ISO 27001 27017 27018 27701 Mapping Download Certification Logos ISO 9001 to ISO 27001 Gap Guide Annex SL Comparison Tool
<urn:uuid:d2edd092-6585-407c-86b3-eb4a55c5f675>
CC-MAIN-2021-43
https://www.nqa.com/en-ca/certification/standards/iso-27701/implementation
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584567.81/warc/CC-MAIN-20211016105157-20211016135157-00470.warc.gz
en
0.897839
2,764
2.78125
3
Today's opener draws a line connecting an important assignment from earlier in the year (Part 2 of the Number Line Project) to the Hour of Code that students completed yesterday. With this code block written on today's agenda and a blank copy of Part 2 of the Number Line Project projected on the board, I invite students to explain what will happen. I encourage kids to find that assignment from earlier in the year, and to take a look at it. Enough of my students are keeping organized binders that there will be at least one completed addition table for each group to look at. I let kids talk and think about it for a few minutes, then I hold up a handful of markers and ask who would like to show us what they're thinking on the board. It's not too hard for someone to pick a starting place and draw arrows representing the code. When that's done, I ask if this reminds anyone of any of the coding problems from yesterday's class. I'm hoping that someone recognizes the similarity between this and some of the pathways that zombies had to be programmed to walk. Then I try to get more specific. "Now pick a starting number on your addition table," I say. "After each time you run this loop, which number will you be on?" I want students to see that each time they move up two and right one, the number increases by 3. Seeing the structure of a pattern is the goal of today's lesson, and this visual gives us a great place to start. Usually I hand out the learning targets on the first day of a unit, but I've shaken things up a bit this week. Rather than saying what we're doing and then setting to it, we've done some work already. Now, on the fourth day of this mini-unit, will we look at the learning targets and set a course for the next few weeks. I distribute this organizer, which serves two purposes. It lists the Student Learning Targets that I want students to try to master between now and the end of the marking period, and it gives students a place to record the assignments that they complete as evidence of each. I show students where to record the work of our first two days this week - the two "Math Without Words" puzzles that I assessed under Mathematical Practice #1 - and I return that work. I also show students where to find today's work, under Mathematical Practice #7. As a way to debrief the work of earlier in the week, I've posted this extension on the board. I show students that the solution to the problem, as some of them have found, is 34. In each class, some students have noticed a relationship between the numbers in this pattern. Up to now, I haven't explicitly said that this number pattern is "right," but now I do. More importantly, I now ask why it exists. "My challenge to you is to create a visual explanation of why this pattern works, in relation to the groups of dots." Cultivating Mathematical Practices So far this year, there have been plenty of assignments aimed at getting students to "look for and make use of structure," but today is the first time that I'm explicit in making Mathematical Practice #7 the focal point of the lesson. So in addition to using the learning target tracker to identify that today's work is aligned to that learning target, I've written MP7 on the board, and I ask for a volunteer to read it. Then I give students the chance to identify key words in the learning target. Structure is the one word that really stands out. Today, I hope that students will see connections between the the structure of different representations of patterns. Before distributing today's Dot Patterns handout, I reprise the message of earlier in the week. "On this handout, there are no words. Your first task is to define the problem," I explain. "Once you define each problem, you can solve it." As was the policy two days ago, I say that I'll take questions in five minutes, but that I want everyone to see what they can figure out first. It's satisfying to see how much more receptive students have grown to this approach in just a few days. It's easier for kids to define what these problems are asking them to do, the solution pathways are more obvious, and students have seen arithmetic sequences earlier this year. All of this is designed to help students see clear growth in their problem solving skills after the challenges of solving those two Math Without Words puzzles earlier in the week. As my students and I dig a little more specifically into the content today, I hope that they will employ the mathematical practices they've been developing this week. Mini-Lesson: What Does a Solution Entail? After five minutes, the questions students ask are more specific and direct than they were earlier in the week. I don't give away any solutions; I do answer all clarifying questions. Soon, all students understand that on each of these five problems, they are given the first four figures in a dot pattern, and they have to figure out what a certain figure will look like. On the first problem, where they're asked for the 5th figure, it's easy enough to draw what that will look like. But it's less obvious what's going to happen on the problems that ask for the 50th, 100th, or 200th figure. Eventually a student will ask, "Do we really have to draw the 200th figure?" Or, "What do I have to write on the paper?" I say, "I'm going to show you how to get a 4 on this assignment." On the board, I write, "What does the answer entail?", followed by a checklist of what I want students to include in their solution to each problem. By the time we get here, most students are already satisfied with their drawing of the 5th figure on the first problem, and they can easily count or extend a pattern to see that this figure will consist of 13 dots. I say, "Like many of you have already done on the first problem, I'm looking for a drawing and the number of dots." I make sure that everyone agrees on what these will be. Then I say that I also want to see a brief explanation and an algebraic rule for each problem. To move in that direction, I ask for someone to describe what's happening in the first pattern, and I student descriptions to move the class toward constructing the rule. For example, one student might point out that "two dots are being added each time," while another notes that "each side is going up by one" and this is great. This is seeing structure, and although it's rather simple here, we'll soon move on to more complex problems. I ask who is right, and everyone sees that whether we talk about adding "two dots each time" or "one dot to each side," we're talking about the same thing. I make a horizontal table in which g represents the number of the figure (or group) and d(g) represents the number of dots in group g. This is the second time this year that I've introduced function notation. Most students remember what the notation means, and using it in context like this helps them make sense of why such notation exists. Now we just have to remember where the 2 we've identified goes in the algebraic rule. If students need some help here, I hold up a hand and raise each finger as I say, "What's a better way to say two plus two plus two plus two plus two?" I want students to recall that multiplication can be defined as repeated addition, and so we're going to have the product 2g in the rule. "But that's not enough," I say as I point to the table of values. "Because 2 times 1 isn't 5 and 2 times 2 isn't 7. So what else do we have to add here?" Soon we have the rule: d(g) = 2g+3. Then comes the crux of the lesson - and a key point of the year so far - in getting at structure and seeing structure in expressions. We look at the parameters in our newly-minted function rule, and we look to see where they can be found in the dot patterns. It's a remarkable moment for kids. I ask where we can see "2g" and where we can see "+3" in each dot figure. As shown in this photo, I circle the pairs of dots that are added to the top of each figure in one color, and the three at the base of every figure in another. Then, I use the same color-coding to show how the structure of each dot figure is related to the structure of the rule. "This is what I hope you'll be able to do on each of these problems," I say. "So yes, you do have to draw the 100th figure on problem #4, but you don't have to draw every dot. You can just figure out a rule, and then use the rule to help you describe what the 100th figure will look like." The subtext here is that writing a rule - which many kids take to be a pretty complicated task - is actually easier that drawing the 100th figure. The rule is the tool that save us from drawing all those dots. For your reference as you plan to teach this lesson, here is the work of a student who has done a good job drawing generalized diagrams (although if I'm being really picky I'd have a few tiny pointers here), and here is the work of another who is close will need just a few revisions. Now students are off and running. This assignment really runs itself from here, and I really enjoy hearing what kids have to say about the structure of each pattern. It's neat to figure out which part of each pattern is staying the same, and which part is changing. Problem #2 allows us to talk about how the constant term doesn't have to be at the base of the figure, and Problem #4 challenges students to see the structure when a rule ends with subtraction rather than division. I'll leave it to you to decide how you frame these conversations with your own students. A Quick Note on Supplies It's very useful to have the following tools available to kids today. Both provide a great scaffold and entry point for different kinds of learners. With a few minutes left in class, I really want to hammer home the importance of finding connections between the generalized sketch of a figure and an algebra rule. If students need to see it explicitly, I draw the 100th figure from the first pattern like this. Then, I'll choose another problem from the remaining four and ask for a few volunteers to sketch the 1000th figure in that pattern. What ensues are a few informal, but useful conversations - and maybe even a little argument - about how the pattern is structured. I hope that this will help to send students off to finish strong on this assignment, as they complete it for homework tonight.
<urn:uuid:714d1879-82d5-492d-bef0-3da605e5873b>
CC-MAIN-2021-43
https://betterlesson.com/lesson/551464/seeing-structure-in-dot-patterns-and-linear-functions?from=mtp_lesson
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00230.warc.gz
en
0.971858
2,268
3.109375
3
Despite a lack of evidence that plastic shields would reduce the risk of COVID-19 transmission and documentation that children are at a much lower risk for COVID than adults, officials recommended masks and plastic boxes to separate and socially distance children.1 Not long after China announced the novel coronavirus, researchers began collecting data. Within months many scientists realized that COVID-19 does not affect children at the same rate that it affects adults. There have been many theories as to why this is the case.2 For one thing, children do not have the same types of comorbidities that increase the risk for adults and older adults. Their immune systems are also different. Experts postulated that another difference was the expression of the angiotensin-converting-enzyme (ACE) 2 receptor that is necessary for the virus to infect cells. Some suggested that other viruses common to the mucosa and airways in young children may limit the growth of the virus, which reduced the rate of severe illness. Available data3 in the early months from the Chinese Centers for Disease Control and Prevention showed a cohort of 44,672 confirmed cases of COVID-19 indicated 2.1% of patients were aged zero to 19 years. As more data were collected throughout 2020, researchers continued to report that children have a much lower risk of severe disease and mortality from COVID-19 than do adults.4 According to the CDC,5 since children are hospitalized significantly less often than adults, it suggests that children may have less severe illness. They also attribute the lack of transmission in children to school closures in the spring and early summer of 2020, keeping children at home. And yet, children were still exposed to adults in their home who were symptomatic for the viral illness. The lack of severe symptoms in children infected with SARS-CoV-2 is in stark contrast to the history of significant symptoms with other respiratory viruses in children.6 No Evidence Portable School Desk Shields Are Effective In this 44-second clip, a masked President Biden is visiting a school where the children are all wearing masks behind plastic shields. It’s a disturbing sight that the mainstream media appears to take in stride as they try to convince you that this is the way we should live. Mid-March 2021, the CDC released new guidelines, which reduced the social distance in schools to 3 feet and removed the recommendations for barriers between school desks. Greta Massetti leads the CDC’s community interventions task force and said about the plastic shields, “We don’t have a lot of evidence of their effectiveness” in preventing transmission.7 The new recommendations triggered a variety of responses in teachers and parents, some of whom are not comfortable sending their children to school where they may be allowed within 3 feet of another child or teacher.8 If you haven’t seen the plastic boxes being purchased in bulk by school systems for students at each of their desks, try imagining a three-sided transparent plexiglass shield that measures about 22 inches high9 and surrounds the front and two sides of the student’s desk. Some school systems are excited by the prospect of adding another layer of distance between people. One school in Hawaii recently purchased 460 shields for students and teachers. Principal James Denight said, “Our focus is the health and safety of students and staff. We’re going to keep them in their bubble.”10 Mainstream media outlets covering the story are calling face masks and plastic shields “the new normal.”11 In one school in Ohio, students and staff spend the day wearing a mask and carry a foldable plastic shield they set up on their desks. Unfortunately, the vast fortune the school systems and retail businesses are spending on plastic is not supported by scientific evidence. In the early months, health authorities told the public that the virus was spread by large droplets. Yet, scientists and researchers like Joseph Allen from Harvard T.H. Chan School of Public Health, protested, saying the virus could travel farther, making plastic shields ineffective.12 Nearly one year after the novel coronavirus began infecting people, the World Health Organization and the U.S. CDC finally accepted what researchers had been arguing — the virus can spread through the air.13 A recently released study14 by the CDC of COVID-19 transmission in elementary schools in Georgia demonstrated that plastic barriers on desks or tables were not effective. Building scientist Marwa Zaatari spoke with a reporter from Bloomberg about plastic desk shields, saying they create15 “a false sense of security. Especially when we use it in offices or in schools specifically, plexiglass does not help. If you have plexiglass, you’re still breathing the same shared air of another person.” Air Flow Restriction May Raise Risk of Transmission One study published in the journal Science16 has suggested desk shields used in multiple school systems across the U.S. “are associated with lower risk reductions (or even risk increases).” A preprint paper17 released from Japan investigated the effect plastic shields would have in areas with poor ventilation. They found the plexiglass blocked the air flow and may increase the risk for infection. The CDC study concluded that the results:18 “… highlighted the importance of masking and ventilation for preventing SARS-CoV-2 transmission in elementary schools and revealed important opportunities for increasing their use among schools.” Yet, the published data do not support their statement supporting masking. It’s important to note that the incidence of COVID-19 in the schools evaluated was extremely low. Among students and staff members, there were only 3.08 COVID-19 cases per 500 enrolled students during the study period. The analysis of the numbers showed the incidence of COVID was 37% lower in schools where teachers and staff used masks and 39% lower where ventilation was improved, as compared to schools that did not use these strategies. However, in absolute numbers, a 37% reduction is only about one case in the school — hardly a supportive statistic for requiring schoolchildren to wear masks all day long. Especially interesting is that the statistic was for teachers and staff and not for students. When the researchers looked at masking students they found, “The 21% lower incidence in schools that required mask use among students was not statistically significant compared with schools where mask use was optional.”19 The data suggest that masks are not as effective as government health experts would like you to believe, even though viral experts have been outspoken about the dangers of wearing face masks. Virus expert Judy Mikovits is one of those who have posted on social media. According to Weblyf.com, Mikovits wrote:20 “Do you not know how unhealthy it is to keep inhaling your carbon dioxide and restricting proper oxygen flow? … The body requires AMPLE amounts of oxygen for optimal immune health. Proper oxygenation of your cells and blood is ESSENTIAL for the body to function as it needs to in order to fight off any illness. Masks will hamper oxygen intake.” Mikovits is joined by Dr. Jenny Harries, England’s deputy chief medical officer. According to News-Medical.Net, she warned the public against wearing face masks “as the virus can get trapped in the material and cause infection when the wearer breathes in.”21 Nationally recognized board-certified neurosurgeon Dr. Russell Blaylock also believes face masks may cause serious harm:22 “Now that we have established that there is no scientific evidence necessitating the wearing of a face mask for prevention, are there dangers to wearing a face mask, especially for long periods? Several studies have indeed found significant problems with wearing such a mask. This can vary from headaches, to increased airway resistance, carbon dioxide accumulation, to hypoxia, all the way to serious life-threatening complications … By wearing a mask, the exhaled viruses will not be able to escape and will concentrate in the nasal passages, enter the olfactory nerves and travel into the brain.” Where Will All the Plastic Go? Interestingly, the sale of plexiglass has roughly tripled since the beginning of 2020, rising to roughly $750 million in the U.S.23 Sales were fueled by offices, restaurants and retail stores that scrambled to put up plastic shields after being told it would reduce the spread of the virus. Tufts Medical Center epidemiologist Shira Doron supports the use of plastic shields but acknowledges “there’s no research” to support plexiglass barriers against coronavirus spread. She spoke with a reporter from Bloomberg, saying: “We don’t know a lot.” However, she believes that it comes down to, “If it might help, and it makes sense, and it doesn’t hurt, then do it.”24 Unfortunately, it doesn’t make sense and, ultimately, it may trigger mental health issues for children and adds to the growing plastic problem. Zaatari and Allen believe that plastic shields may make sense in certain settings, such as in front of cashiers if it doesn’t impede airflow. However, money would have been better spent on improving ventilation and air filtration in the school systems. Craig Saunders, president of the International Association of Plastics Distribution, spoke with a reporter from Bloomberg about the future of those plexiglass shields when they are no longer used. He said, “It’s 100% recyclable thermoplastic. [It] just comes down to the logistics.”25 Yet, the logistics of recycling plastic are not a societal strong suit as has been demonstrated in the past 30 years. This begs the question of whether the additional plastic garbage from discarded plexiglass shields will join the trillions of pieces of plastic that litter the oceans and beaches.26 The planet is also facing a new plastic crisis brought on by discarded face masks. Each month there’s an estimated 129 billion face masks being used,27 most of which are disposable, made from plastic microfibers. Before wearing a mask became a daily habit, more than 300 million tons of plastic were already produced globally each year. Most of it has ended up as waste, which led researchers from the University of Southern Denmark and Princeton University to warn that masks could quickly become “the next plastic problem.”28 Bottled water containers have been a leading source of environmental plastic pollution, but will likely be outpaced by disposable masks. While about 25% of plastic bottles are recycled, “there is no official guidance on mask recycle, making it more likely to be disposed of as solid waste,”29 the researchers stated. “With increasing reports on inappropriate disposal of masks, it is urgent to recognize this potential environmental threat.”30 No matter what the ultimate goal was in pushing the COVID-19 pandemic, it appears that ensuring the safety of the Earth on which we live was not a priority. It is essential we protect the ecosystem, and therefore our food supply. Mindless Mask Mandates Likely Ineffective and Harmful The evidence that masks do not work to prevent the spread of viruses has been demonstrated using influenza and COVID-19. The first COVID-19 specific randomized controlled surgical mask trial was published in November 2020,31 and it confirmed previous, conflicting32 findings showing that: - Masks may reduce your risk of SARS-CoV-2 infection by as much as 46%, or it may increase your risk by 23% - The vast majority — 97.9% of those who didn’t wear masks, and 98.2% of those who did — remained infection-free Despite scientific evidence, the CDC has relied on anecdotal stories about hair stylists and retrospective reports to prop up their recommendation for universal mask-wearing to prevent the spread of infection.33 In addition to this, their own data34,35,36 also show 70.6% of patients with confirmed COVID-19 reported always wearing a cloth mask or face covering in the 14 days preceding their illness and 14.4% wore it often. This means a total of 85% of people who had confirmed cases of COVID-19 either “often” or “always” wore a face mask. For a discussion of more science-based evidence about face masks, see “Mindless Mask Mandates Likely Do More Harm Than Good.” Denight’s focus on keeping children “in their bubble” is not far from what’s happening across the world. Data from a study37 using Germany’s first registry recorded the experiences of children wearing masks. It shows there are physical, behavioral and psychological harms38 being perpetrated on children in the name of science. Data from 25,930 children found the average child was wearing a mask 270 minutes each day and parents, doctors and others reported 24 health issues associated with that mask wearing. These problems:39 “… included irritability (60%), headache (53%), difficulty concentrating (50%), less happiness (49%), reluctance to go to school/kindergarten (44%), malaise (42%), impaired learning (38%) and drowsiness or fatigue (37%).” Added to these concerning symptoms, they also found 29.7% reported feeling short of breath, 26.4% being dizzy and 17.9% were unwilling to move or play.40 Hundreds more experienced “accelerated respiration, tightness in chest, weakness and short-term impairment of consciousness.”41 Push Back Against Tyranny Measurements of anxiety or depressive disorder have also jumped dramatically for adults. Data from the CDC42 show the percentage of adults reporting symptoms of anxiety disorder and/or depressive disorder was 11% in the first quarter of 2019 but jumped dramatically to 41.1%43 across the U.S. by January 2021. This jump in anxiety and depression in adults is significant for children since there is a positive relationship between a child’s behavioral problems and mental health with maternal mental health44 and parental mental health.45 This means that independent of their own stress and psychological harm from mask-wearing, lockdowns and plastic shields, children also respond negatively to the rising rate of anxiety and depression exhibited by adults. Thus, the impact on a child’s mental health is the result of both their own stress and that of their parents. March 20, 2021, marked the 1-year anniversary of the first COVID-19 lockdown. On that day, people in more than 40 countries took to the streets to peacefully demonstrate against the lies and tyrannical measures being taken by governmental agencies and experts in the name of a viral pandemic. Chances are you didn’t hear about this global rallying cry for freedom since the mainstream media have near-universally censored any news of it. However, this information is vital to understanding how your freedoms are being stripped and what you can do to protect your rights. Our children and our children’s children are depending on us to ensure they have the freedom and the right to make decisions for themselves about their health, wellness and finances. Read more at “Global Pushback Against Tyranny Has Begun.”
<urn:uuid:3ac29ad8-3a36-4751-a479-877ae8f1b20d>
CC-MAIN-2021-43
https://jpmirandola.online/did-we-put-kids-in-plastic-boxes-with-no-evidence/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585177.11/warc/CC-MAIN-20211017113503-20211017143503-00710.warc.gz
en
0.963735
3,171
3.5
4
Why Increased Connectivity Means More Cyber Risks Everything You Always Wanted To Know About VPNs (But Were Afraid To Ask) VPN. Chances are, you’re at least vaguely familiar with the initials – even if you don’t know what the letters stand for. Maybe you’ve heard of VPNs, but you’re not exactly sure what they’re used for. This article intends to answer those questions, and many more besides. Let’s dive in! What Is A VPN? A virtual private network, or VPN for short, is best defined as “an encrypted connection over the internet from a device to a network.” Think of this connection as a protected “tunnel” through which you can access everything online, while appearing to be in the location of the VPN server you’re connected to. This provides you with a high level of online anonymity, offers an added layer of security, and allows you to access the entire internet without restrictions. VPN technology is a must for anyone who’s concerned about protecting not just their data, but their identity and location as well. A reputable VPN will secure your internet connection, safeguard your privacy, and keep you protected from hackers or anyone else who might be trying to spy on your online activity. Initially, VPNs were developed to give businesses a way to connect employees who aren’t physically at the workplace to the company’s network. Connecting remote employees to a central work server allows them to access files and other resources, as well as any confidential information that they may need in a safe, secure environment. In response to widespread data breaches and other cyberthreats, individuals are increasingly using VPNs to create a secure path as they browse the internet. How Does A VPN Work? Before we delve into how VPNs function, it’s important to explain what the term “internet traffic” means. Internet traffic is the flow of data between your computer and the internet – this applies whether you’re using a desktop, laptop, smartphone, or tablet. When you access the internet without a VPN, all of your internet activity – including browsing history, downloaded files, online banking details, and passwords – can easily be intercepted by other people. This could include your internet service provider (ISP), government agencies, your employer, or even cybercriminals. When you connect through a VPN, your data is safely encrypted as it travels wherever it needs to go. This means that the data is protected when it goes from your computer to the VPN server, and then to your final destination (whether that’s a website or the server of any app you’re serving). As a result, websites only “see” the VPN’s IP address and not yours. Additionally, your ISP only recognizes that you’re using a VPN but doesn’t get to tag along and keep tabs on where you go or what you do. Why Should You Use a VPN? We’ve touched on most of these points already, but a deeper dive will be beneficial to truly demonstrate the benefits of VPNs: Bypass Online Censorship and Geo-Restrictions Many countries worldwide censor the internet (or specific websites) because certain content doesn’t align with their government’s political or religious beliefs. If you’re living in or traveling to a country with internet restrictions, you’ll need a VPN to be able to freely and securely browse online. In some areas of the world, basic tasks like Googling or updating your Facebook status are impossible without a VPN. Because your actual location is being “spoofed” when you connect to the internet with a VPN, you can bypass geographical restrictions and gain access to online content that’s otherwise unavailable in your region. Increased Privacy and Greater Anonymity Nearly every website you visit tracks your online activity and harvests your data. Advertising networks such as Facebook, Google, and Twitter constantly collect information about you through your internet traffic in order to show you targeted ads. However, it’s important to know that these entities are also free to sell your info to interested third parties. By encrypting your data, these networks will be unable to collect info on you, which gives them less influence over what kind of content you see online. Your internet protocol (IP) address is a personal identification code that’s unique to your internet connection. It reveals your physical location and is tied to the individual who pays your internet service provider. With your IP address, you’re both recognizable and traceable online, no matter what you’re doing. The instant you connect with the VPN server, your personal IP address and your location are hidden from view. Websites and other parties will only be able to trace your online activities back to the VPN server, not to you personally and not to your actual location. This allows you to surf the web with greater anonymity. Improved Security Against Cyberattacks and Data Breaches Hackers and other cybercriminals use a variety of techniques to detect web traffic . They’re even able to hijack users’ accounts on websites that don’t use the HTTPS security protocol. Public Wi-Fi networks can pose a particular threat to internet users. Individuals connected to the same network can easily tap into your devices, access your data, and steal your personal information while you browse the web obliviously. When you use a VPN to connect to a public Wi-Fi network, any data you send, receive, or access online is automatically encrypted, rendering it much more difficult to intercept and view. Knowing that your confidential data – such as email logins, bank passwords, credit card info, and images or other files – is potentially exposed to hackers and other malicious denizens of the internet should certainly give you pause. A VPN provides an added line of defense against cyberattacks of all kinds – so why wouldn’t you take advantage of its capabilities? Facilitates Remote Work By necessity, or practicality, or some combination of the two, more and more businesses these days are enabling their employees to work from home or abroad. VPNs are often used to securely connect remote workers – and vendors, as necessary – to the requisite resources, files, and networks that they need. Encrypted connections allow users to interact on the network while ensuring that the company’s data remains private. A natural byproduct of remote accessibility is an increase in overall productivity for the business. When employees have access to your network 24/7, they’re able to work outside the typical 9 to 5 business hours, from wherever they choose. What A VPN Can’t Do Ad companies can still use browser cookies to track your path across the internet, even after you’ve left their sites. If this is a concern for you, there are ways to block third-party cookies in every web browser. Keep You Out of Jail VPN services are obligated to abide by the laws of the country in which they are officially based. As such, they’re legally bound to respond to subpoenas and warrants from law enforcement when requested. If someone targets you specifically and is willing to put forth the effort, they’ll eventually get what they’re after. Having a solid cybersecurity plan in place can help. Stop Malware or Ransomware A VPN is designed to secure your online connections and data. It’s not engineered to protect your system from malicious software. Using antivirus and antimalware programs is always a smart move. Provide 100% Anonymity Given all the different ways someone can be identified online, a VPN alone won’t render you completely anonymous. With the vast resources of surveillance agencies such as the NSA, it’s likely quite difficult to ever achieve 100% online anonymity. Other methods could result in uncovering your online identity, but a VPN will protect your privacy very well, in most cases. Speed Up Your Connection When you’re using a VPN, a lot is going on in the background. Your computer is encrypting and decrypting packets of data, which are being routed through a remote server. All of this takes more time and processing power, which will ultimately affect your internet speed. Because your latency (or “ping”) is increasing, the speed at which you upload or download data will decrease. With higher-quality VPNs, the lag is barely noticeable, whereas others can cause a considerable slowdown. VPN speeds may also be limited by the type of device you’re using, your network, or due to your internet provider “throttling” VPN connections. The Future of VPNs As the world adapts to the “new normal” prompted by the COVID-19 pandemic, organizations worldwide have been scrambling to safeguard their remote employees. Not surprisingly, VPN software usage has escalated dramatically as the need for remote working rises. Mass surveillance, corporate tracking, and internet censorship are three other driving forces that will continue to push VPN software usage even higher. ISPs are increasingly restricting access to various websites – from adult content to torrenting sites. As people are enlightened to the growing risks regarding data collection and security threats, VPN usage will continue to expand. When the internet was first being constructed, not a lot of thought was given to security or privacy. At first, it was merely a cluster of shared computers at research institutions. Computing power was so limited that any encryption could have made functionality extremely difficult, if not impossible. On the contrary, the primary focus was on openness, not defense. Today, most of us have a number of devices that connect to the web which are vastly more powerful than the top computers of the early days. But the internet hasn’t implemented a great deal of fundamental improvements. Only in the past few years has HTTPS become widespread, for example. By and large, the responsibility lies on individuals to protect themselves. Antivirus apps and password managers can go a long way toward keeping you safer, but a VPN is a uniquely powerful tool that you should absolutely have in your personal security toolkit, especially in today’s connected world. While a VPN isn’t an absolute necessity for using the web, it will provide you with better overall security, improved performance, remote access, and greater anonymity. Cybersecurity has never been more important. We live in an increasingly connected world, which enables cyberattackers to constantly find new ways to carry out digital attacks. Even the most vigilant business owners and IT managers can become overwhelmed with the stress of maintaining network security and protecting their data. DataGroup Technologies, Inc. (DTI) offers a wide variety of cybersecurity services to help protect your business from cyberthreats, including security risk assessments, email security solutions, web and DNS filtering, and next-generation firewalls. Give us a call today at 252.329.1382 to find out more about how we can help you #SimplifyIT! Blog post text… Blog post text… Blog post text…
<urn:uuid:16a271c0-36dc-4d82-80bb-a0bd1deff46b>
CC-MAIN-2021-43
https://dtinetworks.com/everything-you-always-wanted-to-know-about-vpns-but-were-afraid-to-ask/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00310.warc.gz
en
0.927494
2,312
2.78125
3
St-Jean-Baptiste celebrations. Popular annual celebrations in French Canada on 24 June (the feast day of St John the Baptist) or on the days before or after this date. Following a tradition the origin of which is lost in antiquity, many people, among them the Gauls, lit fires to celebrate the summer solstice. According to the Jesuit Relations and the Journal des Jésuites, this tradition was revived on the banks of the St Lawrence in 1636. In 1646 the Journal reported that 'on 23 June the fire for St-Jean was lit at half-past eight in the evening... One heard five cannon shots and two or three discharges from muskets.' It is not known why St-Jean-Baptiste came to be considered the patron saint of French Canada. One legend has it that a great many French-Canadians bearing that given name persuaded the journalist and patriot Ludger Duvernay to adopt it as the name of the national society of French-Canadians which he founded in 1834. In any case that was the name he chose, and the St-Jean-Baptiste Association (St-Jean-Baptiste Society from 1914 on) of Montreal took the maple leaf and the beaver as its emblems. The founding was celebrated 24 Jun 1834 by a banquet to which 60 guests were invited - Irish, US, and Canadian. Many among them sang their interpretations of patriotic songs, including George-Étienne Cartier who sang 'Ô Canada! mon pays! mes amours!' The celebration became annual, and gradually more elaborate, and spread to other localities in Quebec, in Acadia (1880), and in the francophone regions of Ontario, the Canadian west, and even the USA. The celebrations were suspended 1838-42 because of political troubles. Quebec City had its first official celebration in 1842. The procession to the cathedral was led by a civic band, the Musique Canadienne, which also played patriotic songs during the ensuing banquet. T.-F. Molt, the regular organist 1840-9 at the Quebec Basilica, was the first church musician to participate in the St-Jean-Baptiste celebrations and ca 1845 he organized a choir for the occasion. The Montreal St-Jean-Baptiste Association was reorganized in 1843 with a parade to mark the festivities. The Temperance Band (Montreal), the first to participate, made its appearance in 1846. Soon, other bands joined: those of the Collège de Montréal in 1847 and the Collège de Ste-Marie in 1850, Joseph Maffré's band in 1851, the Chasseurs canadiens and the Christian Brothers' band in 1868, the Bande de la Cité and the St-Henri and Ogdensburg, NY, bands in 1877, and those of Longueuil, Maisonneuve, and St-Vincent-de-Paul, and the Shamrocks, in 1879. Several musicians dedicated compositions to St-Jean-Baptiste Associations in Quebec City, Montreal, and Ottawa: for example, in Quebec City, Charles Sauvageau's 'Chant canadien' (Aubin & Rowen 1843; repr CMH, vol 7) and 'Chant national' (Le Ménestrel 1844), both for voice and piano; in Montreal, J.-C. Brauneis II's Marche de la Saint-Jean-Baptiste (Lovell & Gibson 1848; repr CMH, vol 1); and in Ottawa, Célestin Lavigueur's 'A notre saint patron' (1877) for voice and piano. In 1878, the St-Jean-Baptiste Association of Montreal adopted 'A la claire fontaine' as its national song. A solemn mass was usual in most parishes in Montreal and Quebec City. Thus, at Notre-Dame in Montreal 'the worthy M. Barbarin conducted 200 voices which, with the orchestra, offered up Haydn's Second Mass with masterly hands and throats' (La Minerve, 25 Jun 1868). Other masses were sung in other years: Haydn's in 1869 and 1879, Rossini's in 1870 and 1871, and one by Father Cléophas Borduas in 1893, the 250th anniversary of the founding of Montreal. In 1935, at the church of St-Jean-Baptiste in Montreal, a Mass by Contant and an 'Ave Maria' by Lamoureux were performed; in 1936, a Mass by Descarries. Twice the celebrations achieved exceptional dimensions. In 1874 60,000 visitors, half of them Franco-Americans, invaded Montreal to celebrate in grand style the 40th anniversary of the founding of the St-Jean-Baptiste Association and to join in a huge national convention of French-Canadians. A hymn, 'Rallions-nous,' was composed by Charles-Marie Panneton to words by Benjamin Sulte. The minutes of the association mention for the first time floats, numbering 15 on that occasion, and also 31 bands in the procession. The choir of the Collège de Montréal sang the eucharist in Notre-Dame Church. A banquet in the hall of Bonsecours Market and a musical jubilee on St Helen's Island were among the memorable events. J.-B. Labelle wrote and conducted a cantata for the occasion. The celebration in Quebec City in 1880 coincided with another national convention of French-Canadians. Band concerts in the public squares on the evening of 23 June drew enormous crowds. The next day a choir of more than 500 voices performed Gustave Gagnon's arrangement of Du Mont's Messe royale accompanied by the bands of the 9th Battalion and the Union musicale. Calixa Lavallée's national song 'O Canada', composed for the occasion, was performed that day. Some 20 floats took part in a parade of 112 associations and numerous bands from Canada and the USA. Parades became more and more elaborate over the years. A particular theme was chosen each year. For example, in 1928 34 floats each took for a theme a folksong, and the song was sung by a choir following the float. Also in 1928, on 28 June, Guillaume Couture's oratorio Jean le Précurseur was presented at the Delorimier Stadium in Montreal; it was revived 22 Jun 1964 in a performance at the PDA. The 1931 theme 'Women in Canadian history' included a float representing Emma Albani singing for Queen Victoria. In 1939, at Lafontaine Park in Montreal, under the general theme 'Canada has remained faithful,' a float illustrated two songs: 'Isabeau ou l'anneau fatal' and 'J'ai cueilli la belle rose'. Folk music was honoured again in 1950 and 1952. Quebec chanson in the world context was featured in the framework of 'The International Personality of Quebec,' the theme of the 1967 celebrations. The following year Gilles Vigneault opened the parade singing 'Mon Pays'. In 1970 a need for change in the format, and considerable political unrest, forced the authorities to put an end to the traditional parade. It was nevertheless revived in 1990 under the theme 'Thirty Years of Quiet Power.' Many musical activities have accompanied the week-long celebrations. Notable among these have been the promenade concerts, the first of which took place in the hall at Bonsecours Market in 1869. On 25 June La Minerve reported that 'the Orphéonistes de Montréal sang some jolly tunes by Octave Labelle and Zotique Pagé (comic songs full of wit and fun).' Such lively dances as the lancers (a variant on the quadrille), cotillions, and quadrilles were danced. The pattern was repeated in later years with much success; at the Monument national in 1893 such artists as Rosario Bourdon, Victoria Cartier, J.-J. Goulet, and Blanche Labelle took part. A military sketch, Devant l'ennemi, was presented 24 Jun 1879 at a grand dramatic and musical evening at the Theatre Royal; a literary and musical session, during which Oscar Martel played his own Fantaisie coquette, took place 24 June 1880. There were gala evenings in 1898, 1901, and 1903 and evenings of folk music in 1919, at the Monument national. In 1929 a competition for poets and musicians was organized with a view to creating new Canadian songs; the best were presented to the public 22 Jun 1929 at the Delorimier Stadium. Henri Miro's cantata Vox populi was performed on 24 June. Concerts of instrumental and vocal music were presented 1903-48 in parks and public squares, especially in Lafontaine Park. The celebrations continued more or less in the traditional manner until the early 1960s. In 1964 the Commission des Fêtes du Canada Français was created, and that year 43 chansonniers performed at five bandstands on St Helen's Island, Montreal. Week-long celebrations took place in 1965 and 1968, with international dances, band festivals, and popular concerts. After 1970 celebrations were held in the streets of Old Montreal, and in 1975 and 1976 on Mount Royal. In 1977, on the night of St-Jean-Baptiste, the team of artists gathered at the Olympic stadium included Colette Boky, Pierre Duval, the Disciples de Massenet, Félix Leclerc, Claude Léveillée, and Robert Savoie. From the end of the 1970s onwards, regions, towns, and villages organized their own activities, engaging noted singers and instrumental musicians as well as local ones. On 24 Jun 1985 Jacques Faubert's Messe de la Saint-Jean-Baptiste, commissioned by the Archdiocese of Montreal, was premiered during the traditional mass held in St-Jean-Baptiste Church. It was performed by the soloists Denise Desjardins, Lise Blais, David Doane, and Jean-Clément Bergeron, a 150 voice choir and the organist Gisèle Guibord, under the direction of Jean-Pierre Guindon. In 1990 the show 'Aux portes du pays' was given alternately at the Plains of Abraham and St-Helen's Island. This event, led by the singers Gilles Vigneault, Paul Piché, and Michel Rivard, attracted some 200,000 people. In 1959 the St-Jean-Baptiste Society of Montreal initiated its annual acknowledgement of the merits of a composer or performer, the Prix de musique Calixa-Lavallée.
<urn:uuid:189e86e7-e5a5-4251-aa72-dd5c0d7639d8>
CC-MAIN-2021-43
https://www.thecanadianencyclopedia.ca/en/article/st-jean-baptiste-celebrations-emc
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588216.48/warc/CC-MAIN-20211027150823-20211027180823-00270.warc.gz
en
0.945297
2,255
2.890625
3
The British Poultry Council (BPC) is the trade association for those involved in the production of poultry meat—chicken, turkey, duck, and goose—in the UK. We’ve been the voice of the industry since 1967. Our member businesses account for nearly 90 percent of the production in this country and cover the whole food chain: breeding, hatching, growing, slaughter, processing, and packing. Our members promote our key issue of antibiotic stewardship (discussed below), protect the health and welfare of birds, produce safe food, safeguard the efficacy of antimicrobials, and build trust with consumers. British poultry meat farmers grow nearly a billion birds every year to standards that are among the best in the world. Facing Brexit, British food and confidence in British food producers are more important than ever. BPC members, who do not receive subsidy through the Common Agricultural Policy, are committed to producing safe, wholesome, and nutritious food for Britain. We also advocate production that respects the environment, food that is affordable and available for the average consumer, and sustainable, secure, and trusted supply chains. We are involved in several key issues: Access to Food Nothing is more important than ensuring our citizens have continued access to affordable and quality food. Despite great uncertainty over Brexit, we are doing everything we can to help the government deliver a national food strategy that ensures British families and communities are well-fed. Continuity of British food production and supply is critical to ensuring that British food, and the quality it represents, stays affordable and available for all. A dignified food system means that everyone has access to the same choice of safe, wholesome, and nutritious food products; yet Brexit threatens to create a two-tier food system based on affluence. To secure our future food production, the British poultry meat sector is working with the government to develop a robust transition plan that means we have access to the workers we need and to avoid any disruption in the smooth movement of perishable products across the EU. Poultry is half of the meat eaten in the UK, and we use less than 9.7 percent of the total antibiotics licensed for food-producing animals. We have successfully reduced our antibiotic use by 82 percent in the last 6 years and have stopped all preventive treatments as well as the use of colistin. (Colistin is given to poultry and other farm animals to make them gain weight faster and as preemptive protection against disease. But it is also used as a last line of defense in humans whose infections are not responding to other drugs.) Through BPC antibiotic stewardship, the British poultry meat sector is delivering excellence in bird health and welfare by monitoring and reviewing on-farm management practices and ensuring responsible use of antibiotics throughout our supply chain. Our farmers and veterinarians need antibiotics in their toolbox to preserve the health and welfare of our birds. Responsible use of antibiotics is about so much more than reduction targets. Zero use is neither ethical nor sustainable, as it goes against farmers’ duty to alleviate pain and suffering. We ensure antibiotic therapies are used with good animal husbandry techniques, “only when necessary,” and under the direction of a veterinarian to protect the health and welfare of birds under our care. According to the BPC’s 2018 report, the British poultry meat sector’s focus on excellence in bird health and welfare has helped achieve: - An 82 percent reduction in the total use of antibiotics from 2012 to 2017 - A 91 percent reduction in the use of fluoroquinolones (critically important antibiotics for human health) from 2012 to 2017 - A 39.36 percent reduction in the total use of antibiotics between 2016 and 2017 The responsible-use mandate stopped the prophylactic use of antibiotics, restricted the use of antibiotics classified as highest priority/critically important by the World Health Organization (WHO), and banned the use of third- and fourth-generation cephalosporins. Our stewardship priorities are to review and replace antibiotics used where effective alternatives are available, reduce the number of birds receiving treatment through systems based on risk assessments, and continue to refine existing strategies using data collection, rapid on-farm diagnostics, and understanding patterns of resistance. We ensure the successful delivery of the first principles of animal husbandry, hygiene, and stockmanship by sharing best practices across the entire poultry industry. We’re committed to upholding the UK’s position at the forefront of international efforts to keep antibiotics effective for future generations and to tackling antimicrobial resistance. The fact that we have met the government-approved sector-specific targets 2 years ahead of schedule shows that our approach is working. According to Dr. Marc Sprenger, director, Antimicrobial Resistance Secretariat, WHO, “The British Poultry Council has shown the world that reducing the use of medically important antimicrobials is a win-win situation. Production has increased by 10 percent, even with the reduction in the use of antibiotics by 82 percent. We hope this sets an example for the global poultry industry and, indeed, for other food and farming sectors.” Food on Every Table Campaign With the first major review of the nation’s food system in 75 years now under way, we have a once-in-a-lifetime opportunity to contribute to a national food strategy that ensures everyone is well-fed. We believe that government, businesses, and society must work together to deliver a food system that guarantees everyone access to the food that British growers are proud to produce. Our “Food on Every Table” campaign reinforces the position that feeding people must remain at the heart of our society and at the core of our businesses. Government must deliver a sustainable food strategy that guarantees safe, nutritious, and affordable British food grown to British standards for everyone. Along these lines, our submission to the National Food Strategy Consultation highlights the need for a national food strategy to focus on the purpose of food before the production of food. Purpose of Food Technology and innovation in British food ensure astounding efficiency and productivity, but a national food strategy must give that system both purpose and ambition, and in doing so, ask how best we can satisfy the needs of people. We believe our challenge for a national food strategy is to create a social structure in which everyone is fed healthily and sustainably while championing the values that give meaning to our relationship with British food. A Food Strategy That Is Fit for Purpose Our mental, emotional, and physical well-being begins with food. The self-belief and dignity that comes wrapped up in food can be a catalyst for social inclusion and can help transform lives. From an everyday customer in a supermarket to a patient in hospital to a child in school to someone who needs help from a charity or food bank, everyone should have the privilege to choose what they eat every day. A national food strategy must be built on fairness of food, of opportunity, and of education. This strategy must be delivered through cross-departmental and cross-societal collaboration with government, industry, and civil society working together. Food supply must be seen as a national security issue and the impact on food should be considered in all legislation. Leaving No One Behind For the British poultry meat sector to play its fullest role in delivering a food system that leaves no one behind, our national food strategy must: Put Food on the Table to Alleviate Hunger: With Brexit on the horizon, the cost of food is likely to rise. A national food strategy must guarantee safe, nutritious, and affordable British food grown to British standards for everyone. Maintain a Secure Supply of Food That Recognizes British Standards in Trade Deals: British farmers have worked incredibly hard to build a food system that enhances British food values and ensures high standards of production from farm to fork. It is vital that, following Brexit, any trade deals ensure that only food that meets our high British standards can enter the British market. A national food strategy must prevent the creation of a two-tier food system, in which only the affluent can afford to eat British food grown to British standards. Use British Food as a Catalyst for Improving Health, Well-Being, and Social Care: Coming together around the table, whether at school, at a community café, or at a local club, and eating nutritious food is good for our bodies, and good for our minds. A national food strategy must recognize the vital role that access to safe, nutritious, and affordable British food grown to British standards can play in improving our nation’s health, well-being, and social care. Ensure Access to Labor Post-Brexit: A national food strategy must ensure that food producers have continued access to labor to continue to put food on every table. Specifically, for the poultry meat sector, 60 percent of our workforce (24,100 people) are EU nationals, and every year we have about 7,200 vacancies that need to be filled with non-British workers. If these vacancies cannot be filled post-Brexit, it will have a significant impact on the production, and therefore cost, of food—all of which will pose a risk to affordability and potentially force people to go without food. Secure a Sustainable Future for British Food by Achieving the United Nations’ Sustainable Development Goals (SDGs): To meet the United Nations’ SDGs, our food system needs to become more sustainable. A national food strategy gives us an excellent opportunity to sustainably feed people in this country, with food producers, government, and civil society all playing their part in putting food on every table for the next 75 years. More information is available in our education video. As the voice of the British poultry meat industry, we have many issues to track for our members, with new challenges emerging every day: from antiparasitics to chlorine use to Campylobacter to impacts of trade and food waste. But we can’t do it alone. We’ve presented some of our key issues and programs with the hope of letting the broader food industry know we’re in the trenches to ensure safe and sustainable access to food.
<urn:uuid:414313f0-bd66-4baf-9097-6f1036dc9553>
CC-MAIN-2021-43
https://www.food-safety.com/articles/1798-ensuring-safe-food-for-britain-after-brexit
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585696.21/warc/CC-MAIN-20211023130922-20211023160922-00590.warc.gz
en
0.938104
2,083
2.609375
3
The Georgia Archives’ offers resources available on the Program and Education page of the Archives’ website. “Programs” is located under the “visit” tab on the navigation bar. Posted here is the video of the Georgia Archives’ virtual Lunch and Learn program Discovering Your Georgia Roots Using the Virtual Vault presented by Reference Archivist Tamika Strong. On this video, Strong explores genealogy resources available on the Virtual Vault. Included on the site to compliment the presentation are several handouts: How to use the Virtual Vault and instructions, presentation slides, and a Virtual Vault scavenger hunt. The Lunch and Learn video can also be viewed on the YouTube channel “Georgia Archives.” On the Program and Education page are also handouts and PowerPoints on genealogy, slave laws, and family research. You can view curated digitally accessible exhibits showcasing resources at the Georgia Archives. Exhibits illustrate subjects in Georgia history with primary sources and include useful information for the family history researcher. Look for future additions to the Program and Education page. If you have any questions, please email Georgia Archives Education Specialist Penny Cliff at [email protected]. The Georgia Archives is a unit of the Board of Regents of the University System of Georgia. The Georgia Archives identifies, collects, manages, preserves, provides access to, and publicizes records and information of Georgia and its people, and assists state and local government agencies with their records management. This work is done within the framework of the USG’s mission to create a more highly educated Georgia. Georgia’s public libraries and their partners continue to make new content freely available online during the COVID-19 pandemic. Newly digitized African American funeral programs are a boon to remote researchers, genealogists, and learners of all ages. ATLANTA– Over 11,500 pages of digitized African American funeral programs from Atlanta and the Southeast are now freely available in the Digital Library of Georgia. The digital collection of 3,348 individual programs dates between 1886-2019 and contains contributions from the Auburn Avenue Research Library on African American Culture and History, a special library of the Fulton County Library System; the Wesley Chapel Genealogy Group; and the Atlanta Chapter of the Afro-American Historical and Genealogical Society. Digitization was funded by Georgia HomePLACE, a program of the Georgia Public Library Service. “Funerals are such an important space for African Americans, said Auburn Avenue Research Library archivist and lead project contributor Derek Mosley. “The tradition of funerals is not reserved for the wealthy or privileged, but the community. It is that lasting document of someone’s life. In the program is the history and throughout this collection you see the evolution of the stories people left for future generations. I was amazed at the one pagers from the 1940’s, and by the 2000’s there was full color, multiple pages, and a ton of photographs highlighting the life and love shared by the families. This collection is public space for legacy.” Funeral programs provide valuable social and genealogical information, typically including a photograph of the deceased, an obituary, a list of surviving relatives, and the order of service. Some programs provide more extensive details about the deceased, such as birth and death dates, maiden names, past residences, and place of burial. This data that can otherwise be hard to find, particularly for marginalized populations. Records of these communities were often either destroyed, kept in private hands, or never created in the first place. “The challenge for African American genealogy and family research continues to be the lack of free access to historical information that can enable us to tell the stories of those who have come before us,” said Tammy Ozier, president of the Atlanta Chapter of the Afro-American Historical and Genealogical Society. “This monumental collection helps to close this gap, allowing family researchers to get closer to their clans, especially those in the metro Atlanta area, the state of Georgia, and even those outside of the state.” The Auburn Avenue Research Library on African American Culture and History began collecting funeral programs in 1994 with an initial donation by library staff. Since then, staff and the public have continued to add to the collection with a focus on the city of Atlanta. Although the materials have been physically open for research for decades, they can now be accessed beyond the library’s walls. In 2012, the Afro-American Historical and Genealogical Society Atlanta Chapter began its funeral program collection project in partnership with the Auburn Avenue Research Library on African American Culture and History and the Wesley Chapel Genealogy Group. Fulton County Library System Director Gayle Holloman said, “Funerals are filled, of course, with moments that allow expressions of great sorrow. However, for so many, especially in black communities, the funeral program is the written and preserved benediction to a life lived. It is my hope that the understanding of that fact will be treasured for generations to come.” Funeral programs are still being accepted by both organizations; to contribute to either collection, contact the Auburn Avenue Research Library on African American Culture and History or the Afro-American Historical and Genealogical Society Atlanta Chapter at the links below. Georgia HomePLACE encourages public libraries and related institutions across the state to participate in the Digital Library of Georgia, and offers a highly collaborative model for digitizing primary source collections related to local history and genealogy. HomePLACE is a project of the Georgia Public Library Service, a unit of the Board of Regents of the University System of Georgia. HomePLACE is supported with federal Library Services and Technology Act funds administered by the Institute of Museum and Library Services through the Georgia Public Library Service. Based at the University of Georgia Libraries, the Digital Library of Georgia is a GALILEO initiative that collaborates with Georgia’s libraries, archives, museums, and other institutions of education and culture to provide access to key information resources on Georgia history, culture, and life. The Digital Library of Georgia also serves as Georgia’s service hub for the Digital Public Library of America and as the home of the Georgia Newspaper Project, the state’s historic newspaper microfilming project. Anchoring the west end of the Sweet Auburn historic district, the Auburn Avenue Research Library on African American Culture and History opened May 1994 in Atlanta. A special library of the Fulton County Library System (formerly the Atlanta Fulton Public Library System), it is the first public library in the Southeast to offer specialized reference and archival collections dedicated to the study and research of African American culture and history and of other peoples of African descent. The Afro-American Historical and Genealogical Society, Inc., Metro Atlanta Chapter was established in February 2000. It is one of 39 chapters of the Afro-American Historical and Genealogical Society, Inc., a national non-profit membership organization of diverse membership committed to the preservation of the history, genealogy and culture of African-ancestored populations of the local, national and international communities. Created in 2007 in response to a strong interest in genealogy in South DeKalb County, the Wesley Chapel Genealogy Group is a monthly discussion group that strives to support attendees in their genealogical endeavor. Expanding its roots from its home base at the Wesley Chapel Library, the group has served the DeKalb County Public Library and the communities it serves by providing several genealogy workshops in the hopes of helping others trace their familial roots. The funeral program project is one of its most successful endeavors to date. Atlanta, Ga.– On April 20, 2020, the Society of Georgia Archivists’ Board of Directors voted to endorse the Society of American Archivists’ Ad-Hoc Salary Transparency Working Group’s open letter to the SAA Council in favor of a salary transparency policy. As of June 1, 2020, the Society of Georgia Archivists will no longer post professional opportunities (part-time/temporary jobs, full-time/permanent jobs, or internships) that do not include salary information through any of its organizational communication channels. We will also not accept postings for unpaid internships. SGA is taking this step for several reasons: Multiple surveys of the broader GLAM (Galleries, Libraries, Archives, and Museums) field specifically have affirmed that lack of transparency regarding salaries and earnings expectations is a significant concern for professionals at all stages of their careers. Recently a group of archivists have included recommendations for active steps to promote salary transparency and advocate for fair wages and hiring practices in our field. In this respect, we are also acting alongside other professional organizations including the Society of American Archivists, American Library Association, and regional archives associations. This will mean some open positions available in our field will not be posted on the SGA website or through our other organizational communication channels. We believe this step is justified. By keeping salary information secret, employers obscure structural inequalities and enable them to persist. Without salary information, it becomes harder to make the case that one is experiencing pay discrimination. Job postings with undisclosed salary information are a drain on everyone’s resources, wasting both the employer’s and the interviewee’s valuable time and money, even as candidates may not be able to work for the salary offered. As with salary transparency, a wealth of recent research and reports from the field emphasize the ways in which reliance on unpaid labor in the form of internships further perpetuates systemic inequities and economic injustice, and devalues the skilled labor performed in archival institutions and collections. In restricting employment postings to paid positions only, the Society of Georgia Archivists stands with archival workers to increase the visibility and accessibility of paid professional experiences for students and work for professionals at all career stages. SAA Update: Advocating for archivist pay, view here. Business Archives Section (BAS) Salary Requirement Survey, view here. Endorsement of a living wage for all library employees and a minimum salary for professional librarians, view here. It is now up to each of us to continue the much harder work of putting this statement into action. As archivists, we reckon with history deeply and often, and we acknowledge the existence and particular U.S. legacy of structural racism, white supremacy, militarism, gatekeeping, and institutional power. We also recognize moments of grace, collective uprising, community solidarity, cultural exchange, and the power of transformative justice. As we are each called to consider our spheres of influence and how within them we might effect change, I would also ask you to consider ways SGA might change, too. Your Board is in the process of identifying short-term internal and external actions we can take, as well as finalizing a proactive strategic plan for the longer term. We will be coming to you with questions that will help inform our priorities for future action, and we hope you’ll consider providing your thoughtful feedback. As always, your Board members are here for your concerns, questions, and ideas. Please don’t hesitate to reach out to any of us at any point if there is something you’d like to discuss. Wishing each of you and your families safety, health, and peace. On Friday, June 12, 2020, noon-1:00 p.m., the Georgia Archives’ first virtual Lunch and Learn program will be available to the public. Discovering Your Georgia Roots Using the Virtual Vaultwill be presented by Reference Archivist Tamika Strong. The goals for the presentation are to discuss and explore resources that can be utilized to trace family roots in Georgia and share the methodology and research tips to locate records in the Virtual Vault. The Georgia Archives’ Virtual Vault is a portal to some of Georgia’s most important historical documents, from 1733 to the present. The Vault provides virtual access to historic Georgia manuscripts, photographs, maps, and government records housed at the Archives. The live event is hosted through Microsoft Teams. Use browsers Chrome, Firefox, Microsoft Edge, or Internet Explorer 11. If you plan on using an iPhone or tablet, you may have to download the Microsoft Teams app. Click onJoin Live Eventto join the Lunch and Learn. If you have any questions, please email Georgia Archives Education Specialist Penny Cliff at [email protected]. Lunch and Learn Programs are free and open to the public and are sponsored by Friends of Georgia Archives and History (FOGAH).
<urn:uuid:c6b381eb-8487-434e-a4eb-259876bbf397>
CC-MAIN-2021-43
https://sogablog.org/2020/06/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00311.warc.gz
en
0.923514
2,587
2.578125
3
The hype surrounding Blockchains has exaggerated the realistic capabilities and applications of this new technology. Karl Wüst and Arthur Gervais from ETH Zurich have published a peer-reviewed paper¹ that presents a structured methodology that can help determine the suitable technical solution to solve a particular application problem. In this blog post, we will go through this methodology and explain some examples applied in the paper. The next question is “Do you need a blockchain?” Flowchart for choosing the right technology¹. The hype surrounding Blockchains has exaggerated the realistic capabilities and applications of this new technology. This frenzy made it hard on businesses, developers, and investors to understand the practical limitations and to identify the right applications that are appropriate for Blockchain or distributed ledger technology. Karl Wüst and Arthur Gervais from ETH Zurich have recently published a peer-reviewed paper¹ that presents a structured methodology that can help determine the suitable technical solution to solve a particular application problem. In this blog post, we will go through this methodology and explain some examples applied in the paper. Blockchains are append-only ledgers that basically persist (save) state. State can be transaction information, or program data, or hashed documents, etc. Basically, any information that needs to be persisted. Databases have been there for this task for decades. Moreover, Blockchains present a new class of technology used for state persistence — with additional features including digital signatures and tamper resistance. Let us revise the three main technologies: First of all, databases (single, parallel, or distributed) have been used for decades to persist state and query data. Decades worth of research have been invested to optimize the different layers of query processing and state persistence. Naturally, they have the highest performance in terms of transaction throughput and query latency. However, all along, they have been designed to be centrally managed by a single authority. Hence, no consensus mechanism is required across different parties. Permissionless Blockchains are public ledgers (state) that are not managed by a centralized authority. That is, the ledger is distributed across a dynamic network of peers that can include illegitimate entities too. The brilliance of Satoshi, was to present a design that maintains consensus on the distributed state in a dynamic and trustless network. This means that permissionless Blockchains can tolerate a (fraction of the) network with byzantine or untrusted behaviour. As everything comes with a price, the tradeoff here is performance cost (throughput and latency). In bitcoin, the drastic performance hit is because of the POW protocol itself which by design is slow. In comparison to normal databases, in any permissionless Blockchain, a performance hit is inevitable. Because no matter what, to maintain the consistency of the distributed state, there has to be communication between the different peers in the (geographically distributed) network. Permissioned Blockchains represent a hybrid design choice. In particular, they are not centralized to a single entity, yet they are authorized to a small set of preselected trusted peers that can write state. Since the database network is not scaled to a large number of public nodes, as in the case for permissionless Blockchains, its performance in terms of throughput and latency is much better. Nonetheless, its performance cannot compete with a centralized database. After looking at these different systems, it is easy to realize that there is no one-size-fits-all solution. Everything is a trade-off. Different applications have different requirements and hence different appropriate solutions. “Do you need a Blockchain?” Flowchart This section describes a generic high-level flowchart presented in the paper to find the appropriate technology for your application. Note that a writer is an entity that writes state into the database or blockchain. If your application does not require state to be persisted, then obviously there is no need for a blockchain or any database. Similarly, if there is one writer (of state), then a blockchain does not provide any additional guarantees than a regular database. On the contrary, a database would be more suitable as it is more efficient in terms of performance. Otherwise, if there is more than one state-writer we take another route. The question then becomes, is it sufficient to have a online TTP (Trusted Third Party), or in other words, does it need to be tamper-proof. If the application cannot rely on a single trusted entity we can further move forward to see if we still need a blockchain. Otherwise, a blockchain is not required, it would be more efficient -in terms of performance- to rely on a centralized entity. The next question is “is the identity of all state-writers known?”. If they are not known as the case in a dynamic trustless network, e.g., the Internet, then a permissionless blockchain is the right way to go. Otherwise, if the identity is known, then the next question is “do the writers trust each other?”, if it is a yes, then again a blockchain is not needed anymore, a database with shared write access is sufficient. Otherwise, if the writers do not trust each other, then the right technology to be used is a permissioned blockchain. Finally, if it is a permissioned blockchain, depending on whether public verifiability is required, anyone is allowed to read the state (public permissioned blockchain) or the set of readers may also be restricted (private permissioned blockchain). Examples of Applications Lets walk through a bunch of examples here to understand what applications do make sense on blockchains and which don’t and why. Applications that DO NOT need a Blockchain Supply Chain Management: This is indeed one of the applications that arise repeatedly in the space. Lets follow the flowchart to identify which technology suits it best. An SCM certainly requires to store data. Multiple writers are involved, i.e. the different participants of the SCM that own a certain share of the final product. Continuing our methodology, a SCM could technically likely always use an online TTP. For example, Skuchain acknowledged to only require a single source of trust, which would however remove the decentralized component of the blockchain, and thus be equivalent to a trusted central server. If that is not possible, at least all writers will be known, which leaves us to choose between a permissioned or no blockchain. SCMshave the inherent problem of the interface between the digital and the physical world. A human, or some machine under the control of a single writer, typically is required to register that a certain good has arrived in a warehouse, and if, for example, its quality is appropriate. If there is no trust in the operation of these employees, then the whole supply chain is technically compromised as any data can be supplied by a malicious writer. If, on the other hand, all writers are trusted, a blockchain is not needed, because a regular database with shared write access can be used instead. Note that if through some technical means, the connection between the digital and physical world could be realized in a secure manner, then the previous reasoning might change. Internet of Things: Many have suggested possible use cases for blockchain technology in the Internet of Things (IoT) in combination with smart contracts with the aim to provide autonomous systems that pay for resources that they consume and get paid for resources that they provide. As the system is inherently decentralized with entities that do not trust each other, using a blockchain seems natural. However, as with supply chain management, the interface between the physical and the digital world poses a potential problem. If computers supply values that were read from sensors to the blockchain, the blockchain does not guarantee the correctness of these values. If only automation is desired, a blockchain may not be necessary if a trusted party can be used instead. Applications Suitable on the Blockchain Interbank and International payments: For financial applications, blockchain technology seems well suited in general, since parties are generally risk averse and do not want to rely on strong trust assumptions. Following our In Interbank payments we have multiple parties (the banks) that act as writers and who want to exchange value and transactions. So there is state to be persisted. The banks are the writers, and hence there is more than one writer. In the case of single currency systems, the central bank can operate as a TTP. Otherwise, there is another setting where the central bank does not want to act as a verifier for every transaction but only act as a certificate authority giving out licenses to banks to participate in the system. This means that all writers of the system are known and we can usea permissioned blockchain Trading and Fair Exchange Protocols: Similarly, the exchange of digital goods is likely to be feasible without a trusted dispute mediator and hence it is the perfectly suitable for blockchains, while the exchange of physical goods still requires a trusted third party in case of disputes. E-Voting: Similarly, E-Voting has properties that blockchains can help with. For example, on one hand, privacy is a main requirement as votes should be anonymous to prevent coercion. On the other hand, e-voting should provide some sort of public verifiability. Due to the requirements, it seems reasonable that blockchain technology can help to achieve these desired properties. In contrast to conventional wisdom, Blockchains are not a solution for all technical problems. In fact, they are more appropriate for a class of applications that satisfy a set of requirements. In particular, those that sacrifice performance in favour of decentralization and tamper-proof consistent state. Nonetheless, many of the “promised” applications are currently still not applicable for the Blockchain, e.g., supply chain management. One should be really careful when being approached by enthusiastic developers and business owners who are strongly biased by the hype and who don’t really question the underlying technicals and necessities of their solutions. Until now, it seems that applications that deal with digital goods and services and that require trust are the most appropriate for blockchains.
<urn:uuid:b53cbb84-174d-4352-9f83-9fa87b4b2405>
CC-MAIN-2021-43
https://hackernoon.com/to-blockchain-or-not-to-blockchain-45004a23e8a7
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584554.98/warc/CC-MAIN-20211016074500-20211016104500-00190.warc.gz
en
0.938862
2,071
2.765625
3
Angela Carter’s Beauty and the Beast: Building a Feminist Romance When it comes to fairy tale retellings, no story is perhaps more popular than Beauty and the Beast. Created in seventeenth century France, and later popularized by Jeanne-Marie Leprince De Beaumont, the tale continues to be reimagined again and again. Everyone, from French filmmaker Jean Cocteau to Walt Disney, has adapted this particular love story. Even today’s popular literature such as Twilight, 50 Shades of Grey, and Of Beast and Beauty seek to emulate it. While undoubtedly popular, Beauty and the Beast is also famous for its treatment of both male and female characters. Some claim that it is not a love story but instead a tale of abuse. Others say it is a story about female empowerment and the healing power of love. But how are both these readings possible? According to fairy tale scholar Jack Zipes, De Beaumont intended Beauty and the Beast to teach self-sacrifice, modesty, virtue, and industriousness. Over time, many writers and creators have forgotten these intentions. Instead of focusing on building the romance itself, they have focused on the sensationalism of the romance. One writer that did get it right however, is British novelist and journalist Angela Carter. Known for feminist and magical realism, Carter published a short fiction collection The Bloody Chamber and other Adult Tales in 1979. This collection features not one, but two Beauty and the Beast retellings. In writing these retellings, Carter intended to bring out the latent meanings of said fairy tale. By that logic, Beauty and the Beast is a story about a young woman finding her equal, and in doing so, has a sexual awakening. Through comparing De Beaumont’s variant with Carter’s two variants, The Courtship of Mr. Lyon and the Tiger’s Bride, we can understand the “true” meaning of Beauty and the Beast. At its conception, Beauty and the Beast was first intended for adults and not young children. As stated in Formidable Fairy Tale: A Writer’s Guide, this particular story is a literary fairy tale. Literary fairy tales served as way for aristocratic men and women to take familiar stories and place their own ideas into it. For example, Beauty and the Beast has roots in the Cupid and Psyche myth, written by Apuleis in the second century AD. In that story, a young maiden named Psyche is whisked away into marriage by the god Cupid. Unable to a catch a glimpse of her new husband, Psyche worries she has married a monster. When she discovers his true identity, Cupid disappears on her. Psyche then risks everything to find him once again. Literary fairy tales took myths, like that of Cupid and Psyche, and rearranged them to suit ideas of love, arranged marriage, and fidelity from the women’s perspective of that time period. Beauty and the Beast, then, is an updated version of the Cupid and Psyche myth for the seventeenth century. Jeanne-Marie Leprince De Beaumont used this particular fairy tale to teach young men and women how to achieve happiness. In her mind self-sacrifice, honesty, industriousness, and virtue in both sexes could lead to happy marriage no matter the circumstances. Here in the twenty-first century, society’s perspective on love, arranged marriage, and fidelity has changed to a certain extent. Angela Carter acknowledges this, and puts her own ideas on those topics from a modern women’s perspective. She still uses common motifs associated with Beauty and the Beast. For example, the rose motif first used by De Beaumont is present in both retellings. The Courtship of Mr. Lyon, in particular, is heavily inspired by De Beaumont’s version. The Courtship of Mr. Lyon Angela Carter’s The Bloody Chamber and Other Stories features many fairy tales retold in a women-centered and sexually charged way. The Courtship of Mr. Lyon is but one of her Beauty and the Beast retellings. At the start, Beauty is consistently called “girl,” “child,” and “pet.” Her skin has the same “inner light” as the snow outside. Readers then have a very clear idea who Beauty is. She is childlike, innocent, and above all good. She is “untouched” by wickedness. The rose motif, which occurs in nearly all retellings, represents Beauty as a character. A single white rose is all Beauty has requested from her father, something that is rare in the cold winter months. The Beast too covets white roses. When Beauty meets the Beast, a lion-esque figure, she considers him terrifying. At the same time, though, she considers him beautiful because lions are, in their own way, beautiful. She is “bewildered” by his otherness and it pressures her. Beauty refers to herself as a lamb in his presence. The same purity and softness that accompanies Beauty is often attributed to the Beast, but in a different way. He first appears in the white light of the moon, a similar light that bathes Beauty in her introduction. His actions speak volumes about him. The Beast treats Beauty’s father kindly, until he tries to steal the Beast’s roses. Beauty’s father attempts to appease him by referring to him as “my lord,” but the Beast is not fooled. He fully acknowledges that he is a monster. The Beast invites Beauty and her father to come to dinner, where the Beast offers to help them with their money troubles. Beauty’s father is sent to London and the Beast suggests that Beauty stay with him in the meantime. When the Beast converses with Beauty around his fireplace the light from the fire puts halo around his mane. From that visual clue, readers can infer that the Beast is not bad at all. They can picture him as a good companion for Beauty. Another sign comes from Beauty herself, who acknowledges they both must overcome their shyness. At the end of each conversation they have, the Beast falls to Beauty’s feet and kisses her hands before fleeing away from her. As the “pressure” Beauty feels in the Beast’s presence begins to fade so too does her childishness. She begins to refer to herself as a house cat rather than a lamb. She is no longer called “girl” and her attachment to her father lessens until he phones her to come home. The Beast lets her go, but asks that she visit him some day. Despite Beauty’s feeling for him, she cannot make herself touch him, to give him a proper hug goodbye. Back home she discovers she is not the same girl she was. She realizes that she is at the end of her adolescence and she can no longer hang back. Beauty returns to the Beast to discover him dying out of loneliness and starvation. She begs him to live and tells him if he’ll have her, she’ll never leave. Before Beauty’s eyes, the Beast transforms into a human man and she can still detect the lion in him. The two now called Mr. and Mrs. Lyon head to the garden and step on fallen rose petals. Although not overtly sexual, The Courtship of Mr. Lyon is about a sexual awakening. The Beast is not the only one who undergoes a transformation, Beauty transforms from girl to woman. Readers know from the opening passage that Beauty is attached to her father and retains childlike innocence. When she arrives at the Beast’s home and he offers her a place to stay, Beauty reluctantly accepts and hates to see her father go. She feels dominated by him at first and fears him. But as she spends time with the Beast and she acknowledges that she can see a reflection of herself in him, she gradually begins to give up that part of herself. Her inability to touch the Beast when her father comes calling, shows us the Beauty is not completely ready to give up her innocence. It’s only from the time she spent with Beast and her reflection on that time, that Beauty realizes she would not mind losing her innocence to the him. The fallen petals at the end of story show that Beauty has at last become woman and she found someone “rare” and worthy of her. Carter’s variation of the tale focuses on Beauty owning her sexuality. Through discovering the Beast mirrors herself, Beauty is able to give herself to him. Much like women in the seventeenth century, modern women want equality in their relationships. Many women today and back then fear that they will enter abusive relationships; relationships where they have no power and are treated as objects and not human beings. Back when Beauty and the Beast was created, women could very easily get in this situation thanks to the popularity of arranged marriages. Carter still touches on the fear but in a modern setting. Other popular Beauty and the Beast inspired tales, such as Twilight and 50 Shades of Grey, look at the sexual implications in the original story. Twilight and 50 Shades use the Beauty and the Beast archetypes as a way to explore sexuality. Those stories are essentially about a dominant male falling in love with a submissive female. These stories allow readers to experience the dominant/submissive lifestyle without having to physically experience it. It’s the fact that he could hurt her but chooses not to (in most cases) that makes this archetype so popular. Therein lies the criticism many feminists have with the story. Why should Beauty be dominated by the Beast? Why can’t the power be shared between the two? In both Twilight and its carbon copy 50 Shades of Grey there is no equality. The beasts, Edward Cullen and Christian Grey, overstep their boundaries. They stalk their prospective lovers and consistently push them away. In their minds they are doing the right thing by telling their lovers they are no good. However, despite this thinking they come back for more. They control all sexual aspects to the relationships as well. No matter how many times they tell their lovers they have the power, this so called power is never used. Bella Swan and Anastasia Steele are used and are under the illusion that they have found their soulmate. The danger between the coupling is what the authors are selling and not a healthy romance. Other writers, such as Angela Carter, remedy the power dynamic by turning Beauty into a Beast as well. The Tiger’s Bride Angela Carter’s the Tiger’s Bride is narrated by Beauty herself, or what we as readers assume is Beauty. In this tale, Beauty is not the sweet innocent girl we know from other variants. She is tougher and wiser from growing up in the frigid North with her father. This Beauty is angry with her father for trading her away to a masked man after losing a game of cards. The masked man whom Beauty refers to as the Beast offers her a single white rose, for which she destroys immediately. It’s not her choice to become a prisoner of the Beast like in other versions. Although the motifs of pure white snow and roses appear again in this variant, they are not used to the same effect. These innocent symbols are tainted instantly. For example, Beauty’s father asks for a rose so he knows that she forgives him. When she hands it to him her hand is cut by the thorns and she hands him a bloodstained rose, indicating there is blood lost between herself and her father. On the way to the Beast’s home, Beauty remembers the tale of the tiger man and of a bear child born to a woman in town. She remembers squealing in disgust at these stories when she was young. She is under the impression that she is imprisoned by the real tiger man. Unlike Mr. Lyon, this Beast cannot speak and requires the aid of an inhuman valet. She realizes there are not any humans in her new home. Soon the valet makes an unexpected request from his master to Beauty. He tells her the Beast wishes to see her unclothed and then will return her to her father. Beauty laughs at him outright and refuses. She tells him she will let him see an ankle and then must immediately be sent to a church to be cleansed. The Beast, unable to respond, cries a single tear. In this instance, Beauty is more beast like, more inhumane then the Beast. She treats him as something less than human. Beauty discovers that the Beast isn’t comfortable in his clothes. She suspects walking upright causes him pain and he tries to hide his natural scent with perfume. It seems to her that he is hiding something from her, as if he is afraid of rejection. Beauty begins to feel for him, but not enough to accept him. She continues to reject his request until he removes his own mask. When he does, she discovers he is in fact a tiger dressed in human clothing. Beauty is surprised but not disgusted and finds him beautiful. She says to herself “a tiger will not lay down with lamb but the lamb could learn to run with tigers.” Beauty finally follows his request. The Beast in his natural state begins to lick off Beauty’s skin revealing tiger fur beneath her skin. In this tale, the Beast does not become a prince but Beauty becomes a Beast. Unlike earlier variants, Beauty is not idealized to perfection. Typically, Beauty is treated as the perfect woman, someone who is kind, forgiving, and honest. Instead the Beast is a far more fragile character. He does not even act beastly. In fact, he is kind to her even when she laughs at his face. In most variants it is Beauty that changes the Beast, but in this case it is Beast that changes Beauty. The Tiger’s Bride still focuses on building a relationship between equals. After all, it is only when the Beast reveals himself to her that Beauty is comfortable revealing herself. Beauty acknowledges that a tiger will not lay down with lamb, meaning she cannot be with the Beast unless she is a beast herself. When the Beast turns Beauty into a tiger, he is essentially cleansing her. She is giving up her life as human and presented a new life where she can start again. The only way this works is because these beastly qualities, that the Beast can relate to, are already in Beauty. It is their outer differences that keep them apart. In this variant, Carter again touches on the women’s perspective on love and sexuality. Beauty is again in charge of herself and her body. Again through self-sacrifice and honesty Beauty and Beast are able to fall in love. Until they become equals they cannot be together. Beauty and the Beast works as a feminist romance because Beauty forms a partnership with the Beast. Both parties make sacrifices for one another and in doing so they understand what they mean to each other. These are the decisions that build a lasting and believable romance. Twelve years after The Bloody Chamber and Other Adult Tales was published, Walt Disney Animation released their version of Beauty and the Beast. Like Angela Carter’s variants, this film too is a feminist love story. Belle, the Beauty, eschews the typical Disney tropes that her fellow Disney princess fall into. She is not dreaming of the day a prince will come to rescue her. Nor is she taken in by the first attractive guy she meets. Belle is independent, intelligent, and intensely loyal to her father. So much so she that is willing to sacrifice her dreams of adventure for his safety. Twenty years later, Disney’s Beauty and the Beast remains the definitive version for many people. But if not for Carter’s variants beforehand, Belle would not have a model to based upon. The loyalty, self sacrifice, and honesty we see in Belle are also present in Carter’s variants. In this way the Courtship of Mr. Lyon and the Tiger’s Bride serve as a guideline for adapting this beloved romance. Hopefully, Disney will keep these elements in their live action remake set for 2017. Carter, Angela. The Bloody Chamber and Other Adult Tales. New York, New York; Penguin Publishing Group. 1980. Print Zipes, Jack. The Oxford Companion to Fairy Tales. Oxford, United Kingdom; Oxford University Press. 2000. Print. What do you think? Leave a comment.
<urn:uuid:a89026ad-338d-4cd8-9088-eb1c2db4d822>
CC-MAIN-2021-43
https://the-artifice.com/angela-carter-beauty-and-the-beast-feminist-romance/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00349.warc.gz
en
0.970388
3,400
2.859375
3
More Remedies for Reducing Teacher Stress & Burnout Welcome back to our series on music teacher (and other professionals) self-care. First, as presented in this insightful article by Chris Mumford, we confirm the notion that “stress is inevitable,” but “how you respond to it can spell the difference between a long, rewarding career or one cut short by burn-out.” Based on new research, he offers some surprising (and even counter-intuitive) techniques to better deal with it, including these “9 Stress Management Strategies Every Teacher Needs to Know.” - Breathe (properly)… When you’re experiencing intense levels of stress, breathe in deeply (put your hands on your stomach and feel it expand out), for four seconds, then exhale evenly for four seconds. Keep this up for two-three minutes for maximum effect. - Embrace the stress… Viewing your stress in constructive ways [reframing] will actually cause your body to respond to it differently and prevent long-lasting physical damage. - Be imperfect… Teachers are often prone to perfectionism and its ill effects: they often feel that they aren’t doing enough, or that their mistakes are magnified because of the importance of their job. If you find yourself feeling this way, fight back. - Practice emotional first aid… Do you beat yourself up when you experience failure or make a mistake? [Find] ways to break the negative patterns of thought. - Be grateful… We have to stop, quiet our minds, and create “stop signs”—little reminders of things that we should be grateful for every day. - Limit “grass is greener” thinking… You will have challenges anywhere you go. - Work smarter, not harder… Find ways to delegate some of your work, or invest in tools or technologies that will make your life easier. - Ask for help… doesn’t make you weaker, it makes you better at your job. - Make a connection… When you connect with another person, your body produces oxytocin, which is a chemical that helps repair the heart. If you help your neighbors, family, etc., you’re much less likely to experience the negative effects of stress. Just Breathe… According to the Navy SEALS! The calming, deep-breathing practice (#1 above) can be learned by reviewing a host of resources, including the book Maximizing Your Human Potential and Develop the Spirit by former Navy SEAL Mark Divine, as well as these websites: - “Here, Have a Secret Breathing Technique From a Navy SEAL” - “How to Reduce Stress Like a Navy SEAL” - “These Navy SEAL Tricks Will Help You Perform Better While Under Pressure” Examples of two different NAVY SEALS breathing exercises advise us on how to reach a more relaxed state: TACTICAL BREATHING (to alleviate “fight or flight” tension) Place your right hand on your belly, pushing out with a big exhale. Then breathe in through your nostrils, slowly drawing the breath upward from your belly to your upper chest. Pause and exhale, starting from your chest and moving downward to the air in your belly. Imagine your belly button touching your spine. Once you’re comfortable with a full, deep breath, repeat it, this time making the exhale twice as long as the length of the inhale. For example, inhale to the count of four, pause briefly, and exhale to the count of eight. Repeat three times. BOXED BREATHING (to help ground you, sharpen concentration, and become more alert and calm) Expel all of the air from your lungs Keep them empty for four seconds Inhale through your nose for four seconds Hold for a four count (don’t clamp down or create pressure; be easy) Exhale for a four count Repeat for 10-20 minutes Mind Over Matter Our own minds may be our own worst enemies. Have you read the insightful article “Sustaining the Flame – Re-Igniting the Joy in Teaching Music” by Karen Salvador in the December 2019 issue of Music Educators Journal? She offers research-supported strategies for nurturing courage, peace, and resilience as well as suggested habits of thinking and action. Samples of “cognitive distortions,” a term of which I had never heard previously defining “irrational beliefs,” is addressed by “reframing” our inner voice during specific incidents of emotional distress. Her common examples of cognitive distortions include the following. Do any of these sound familiar? - Disqualifying (discounting) the positive events - Jumping to conclusions - Filtering (focusing entirely on the negative elements of a situation) - Double standard (placing unreasonable/unattainable expectations for ourselves) - Personalizing (or “taking something personally”) - Polarized (placing people or situations in unrealistic “either or” categories) Additional recommendations by Nicole Stachelski for combating stress and burnout are listed in the article: - Laugh with your students - Eat your lunch (take a break or enjoy social time) - Schedule regular physical activity - Drink more water (and visit the bathroom as needed!) - Prioritize your work and set boundaries - Keep a consistent bedtime - Delegate – don’t be afraid to ask for help - Focus on what’s really important More Ideas — Just Pick One! Take a gander at this excellent Scholastic.com teacher blog-post by Nancy Jang summarizing “15 Ways to Reduce Teacher Stress.” Can you try at least one new strategy this week that resonates with you and your life? - Close the door during prep time. - Make a SHORT and DOABLE “Must Do” and “May Do” lists. - Delegate items to parent volunteers. - Lay out your outfit and prepare your healthy lunch the night before. - Get a full eight hours of sleep. - Don’t correct every piece of paper. - Work out! - Get up early! - Stay away from negativity. - Don’t take things home. - Plan time every week/day to enjoy something that is not remotely related to teaching.* - Learn something new. - Plan a trip. - Don’t over-commit. - Take ten minutes a day and mediate. *Probably one of my own worst habits was not modeling number 11 above. No matter how busy you are with your daily in-school teaching and extra-curricular music/coaching activities, the full recommendations are important to consider: Spend time with your family and friends, travel, work on your garden, read for pleasure, take a hike. Learn how to turn off being a teacher. Balancing your time to just be YOU (not the teacher you) allows you to be renewed and have more mental energy for your students. A few more ideas are offered by Jennifer Gunn in her blog-post from Concordia University “How Educators Can (Really, Honestly) Unplug – And How Stress Affects Us.” As always, it is suggested that you read the entire article at the link provided. - Practice mindfulness - Get a change in scenery - Focus on some serious self-care - Make plans with friends - Unplug, literally - Schedule your work time and your fun time In almost every health and wellness article, we hear the emphasis of prioritizing and seeking a more equitable use of personal time, achieving what Ernie Zelinski, author of the best-selling book How to Retire Happy, Wild, and Free, refers to as “work/life balance.” Future blogs on samples of “super stress reducers” in “setting boundaries,” time management, and innovative organizational tools will be forthcoming. Several books are also recommended readings for addressing the issues of teacher health and wellness. We have already reviewed several of these. More to come. Our next journey to an in-depth look at music educator self-care will explore more fully TEACHER BURNOUT. To stay up-to-date on past and future articles, publications, and workshop presentations on this topic, be sure to revisit the “Care” section of this blog-site. - “15 Ways to Reduce Teacher Stress.” by Nancy Jang at Scholastic - “9 Stress Management Strategies Every Teacher Needs to Know” by Chris Mumford at HeyTeach - Exhausted by Paul Murphy - Fewer Things Better by Angela Watson - “Here, Have a Secret Breathing Technique From a Navy SEAL” by Reuben Brody at InsideHook - “How to Reduce Stress Like a Navy SEAL” by Michael Finn at Gear Patrol - “How Educators Can (Really, Honestly) Unplug – And How Stress Affects Us” by Jennifer Gunn at The Blog by Concordia University/Portland - I Love My Job But It’s Killing Me by Lesley Moffat - How to Retire Happy, Wild, and Free by Ernie Zelinski - “Sustaining the Flame – Re-Igniting the Joy in Teaching Music” by Karen Salvador in NAfME Music Educators Journal, December 2019 - The Weekend Effect by Katrina Onstad Photo credits (in order) from Pixabay.com - “laptop-woman-education-study-young” by Jan Vašek - “stress” by johnhain - “stress-despair-burden” by Davidqr - “boat-teamwork-training-exercise” by skeeze - “mental-health-wellness-psychology” by Wokandapix - “stress-relief-help-sign-relax” by Pete Linforth - “meditate-meditation-peaceful” by Pexels - “handstand-beach-sea-ocean-sand” by MatanVizel - “wooden-train-toys-train-first-class” by Couleur © 2020 Paul K. Fox
<urn:uuid:bd3fbb09-c37d-4c7d-b306-f836d6d901ad>
CC-MAIN-2021-43
https://paulfox.blog/2020/02/13/stressed-out/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00030.warc.gz
en
0.923025
2,211
2.734375
3
Below is the list of Sabbaths and Holy Days commanded by God The Father and His Son The Lord Jesus Christ, to be kept yearly at their set times. Remember that God commanded the Sabbaths be kept from evening to evening (i.e. sundown to sundown). [Leviticus 23:32] “And the LORD spoke unto Moses, saying, Speak unto the children of Israel, and say unto them, Concerning the feasts of the LORD, which you will proclaim to be holy convocations, even these are My feasts.” – Leviticus 23:1-2 Seventh Day Sabbath — begins sundown on Friday and ends sundown Saturday every week. The Holy Sabbath of The Lord; the fourth commandment of the Ten Commandments. Most likely the day referred to by the apostle John as the “Lord’s Day” in Revelations (Genesis 2:2-3, John 1:1-5, Luke 6:5 [Mark 2:27-28, Matthew 12:8-9]). God repeatedly commanded that it be kept on the seventh day (i.e. what we generally call Saturday). It is listed in Leviticus 23 as the first of the Sabbaths, an Holy Convocation (as His other Holy Days). [Leviticus 23:3, Exodus 20:8-11 (4th Commandment of the 10 Commandments), Exodus 31:13, Exodus 31:17, Ezekiel 20:12, Ezekiel 20:20, Hebrews 4:7-9, Hebrews 4:10-11, Matthew 5:18-20, Luke 6:46, Matthew 7:21]; Passover — evening of March 27th. Passover lamb was killed on the 14th of Abib before sundown (in the evening – or – between the evenings), and so the actual Lamb of God also died Passover day about 3pm in the afternoon and was buried at evening. The Passover representing The Lord Jesus Christ (Joshua the Messiah) the Passover Lamb’s blood saving those sanctified (repenting of sin, being baptized into Jesus Christ, and living a life of repentance and obedience) from the wrath of God (i.e. the judgment of God against sin). The first day of Unleavened Bread begins sundown that day. [Exodus 12:1-2, Exodus 12:18-19, Numbers 28:16-18, Leviticus 23:5-7, John 1:29, 1 Peter 1:19, Rev. 5:6, Matthew 26:2, Mark 14:22-25, John 19:34-37, 1 Thes. 1:9-10, Luke 6:46, Matthew 7:21]; First Day of Unleavened Bread — begins sundown March 27th. Ends sundown April 28rd. The Days of Unleavened Bread is a week long observance of the removal and abstaining from all forms of leavening (representing sin – i.e. the breaking of God’s Law [1 John 3:4 “Whosoever commits sin transgresses also the law: for sin is the transgression of the law.”]). [Exodus 12:1-2, Exodus 12:5-10, Exodus 12:11-14, Exodus 12:18-19, Numbers 28:16-18, Leviticus 23:5-7, Acts 20:6, 1 Cor. 5:7-8 (speaking to non-Jews), Luke 6:46, Matthew 7:21]; Last Day of Unleavened Bread — begins sundown April 2nd. Ends sundown April 3th. The last day of Unleavened Breads ends the Days of Unleavened Bread with a Holy Convocation (i.e. a “Holy Meeting” [i.e. gathering]). [Leviticus 23:8, Exodus 12:18-20, Luke 6:46, Matthew 7:21]; Wave Sheaf of the First Fruits — April 4th. This is not a Sabbath or Feast, but is never the less an important day to note here. It represents the presentation of our Lord Jesus Christ to God The Father after His resurrection the evening before. This is also the day which begins the 50 day count to Pentecost. The wave sheed of the first fruits was waved before God the day after the Sabbath following the Passover. [Leviticus 23:9-15, Exodus 34:25-26, Deut. 26:1-11, John 20:16-18, 1 Cor. 15:20, 1 Cor. 15:23, Luke 6:46, Matthew 7:21]; Pentecost — begins sundown May 22nd. Ends sundown May 23rd. Referred to in the New Testament as “Pentecost” (Pentecost means “fiftieth”) and in the Old Testament as “First Fruits” and “Feast of Weeks”. Represented, then and now, the receiving of those sanctified (made Holy) by The Lord’s sacrifice (the Passover Lamb [see Passover above]), and the Holy Spirit of The Lord Jesus being given. [Leviticus 23:15-16, Leviticus 23:17, Leviticus 23:18-21, Numbers 28:26, Deut. 16:9-12, Acts 1:4-5, Jeremiah 31:31-40, Hebrews 10:12-23, Acts 2:1-4, Acts 2:14-18, Acts 2:32-33, Acts 2:36, Acts 2:37-38, Romans 2:28-29, Romans 9:6, Galatians 3:7-9, Galatians 6:16, Romans 8:9, John 14:21, John 14:23-24, Luke 6:46, Matthew 7:21]; Feast of Trumpets — begins sundown September 6th. Ends sundown September 7th. Referred to as a “memorial of blowing of trumpets” (or memorial of acclamation [i.e. shout, jubile, joy]). The Holy Day represents the return of The Lord Jesus to reign as King and High Priest, raising His people from their graves into glorification, and ruling over the nations in righteousness with a rod of iron. [Leviticus 23:23-25, Numbers 29:1, Matthew 24:30-31, John 5:26-31, 1 Cor. 15:50-58, Luke 6:46, Matthew 7:21]; Atonement — begins sundown September 15th. Ends sundown September 16th. The atonement (At-One-Ment) [covering and removal] of sin. [Leviticus 23:26-32, Leviticus 16:29-31, Leviticus 25:8-9, Leviticus 16:30, Romans 5:8-11, 2 Cor. 5:18-21, Luke 6:46, Matthew 7:21]; First Day of The Feast of Tabernacles — begins sundown September 20th. Ends sundown September 21st. This eight day feast before The Lord begins with this Holy Day. Also referred to in the Old Testement as the “Feast of Ingathering”. [Leviticus 23:33-35, Numbers 29:12, Deut. 16:13-15, John 7:1-10, John 6:63, 2 Cor. 4:18-5:1, Luke 6:46, Matthew 7:21]; The Eigth Day (of The Feast of Tabernacles) — begins sundown September 27th. Ends sundown September 28th. Referred to in the New Testement as the “Great (or High) day of the Feast”. This day closes the year’s Holy Days and represents the return of God The Father; creating a new heaven and earth in which dwells righteousness and God dwells with men. He will be their God and they will be His people. [Leviticus 23:36, Leviticus 23:36, Numbers 29:35, Leviticus 23:39-43, John 7:37-39, 1 Cor. 15:23-28, Rev. 21:3-4, Isaiah 25:6-9, Luke 6:46, Matthew 7:21]; “These are the feasts of the LORD, which you will proclaim to be holy convocations, to offer an offering made by fire unto the LORD, a burnt offering, and a meat offering, a sacrifice, and drink offerings, every thing upon his day: Beside the sabbaths of the LORD, and beside your gifts, and beside all your vows, and beside all your freewill offerings, which ye give unto the LORD.” – Leviticus 23:37-38 Notice here God is speaking of the future – “My salvation is near to come, My righteousness to be revealed”. He still tells the people who are not of the fleshly lineage of Israel (i.e. Gentiles) to keep His Sabbath and covenant, to keep away from sin (sin as defined by God’s Word [i.e. breaking His Law]). “Thus saith the LORD, Keep you judgment, and do justice: for My salvation is near to come, and My righteousness to be revealed. Blessed is the man that does this, and the son of man that lays hold on it; that keeps the sabbath from polluting it, and keeps his hand from doing any evil. Neither let the son of the stranger, that has joined himself to the LORD, speak, saying, The LORD has utterly separated me from His people: neither let the eunuch say, Behold, I am a dry tree. For thus says the LORD unto the eunuchs that keep My sabbaths, and choose the things that please Me, and take hold of My covenant; Even unto them will I give in My house and within My walls a place and a name better than of sons and of daughters: I will give them an everlasting name, that will not be cut off. Also the sons of the stranger, that join themselves to the LORD, to serve Him, and to love the name of the LORD, to be His servants, every one that keeps the sabbath from polluting it, and taketh hold of My covenant; Even them will I bring to My holy mountain, and make them joyful in My house of prayer: their burnt offerings and their sacrifices will be accepted upon My altar; for My house will be called an house of prayer for all people. The Lord GOD which gathers the outcasts of Israel says, Yet will I gather others to him, beside those that are gathered unto him.” – Isaiah 56:2-8 “And every man that hath this hope in him purifieth himself, even as he is pure. Whosoever committeth sin transgresseth also the law: for sin is the transgression of the law.” – 1 John 3:3-4 “But if, while we seek to be justified by Christ, we ourselves also are found sinners, is therefore Christ the minister of sin? God forbid. For if I build again the things which I destroyed, I make myself a transgressor. For I through the law am dead to the law, that I might live unto God. I am crucified with Christ: nevertheless I live; yet not I, but Christ liveth in me: and the life which I now live in the flesh I live by the faith of the Son of God, who loved me, and gave himself for me.” – Galatians 2:17-20 “What shall we say then? Shall we continue in sin, that grace may abound? God forbid. How shall we, that are dead to sin, live any longer therein?” – Romans 6:1-2 Please recognize that Paul was never teaching that we did not have to obey The Law. He was simply showing that salvation did not come by the works of the Law. Since ever person (except Christ) has sinned (broken the Law) it is impossible to then obtain the righteousness of the Law [“Cursed be he that confirms not all the words of this law to do them. And all the people will say, Amen.” – Deut. 27:26; AND “You will do My judgments, and keep My ordinances, to walk therein: I am the LORD your God. You will therefore keep My statutes, and My judgments: which if a man do, he will live in them: I am the LORD.” – Leviticus 18:4-5]. Only by God’s redemption through The Lord Jesus Christ (through repentance) could we be cleansed to once again remove the guilt of breaking the Law. But as you see above (and those are only a few instances) Paul was saying that if we refuse to obey God’s Law (which John plainly shows is the DEFINITION of sin) then we are removing ourselves from the grace of God and putting ourselves back under the wrath of the Law (i.e. God’s judgement of sinners – the wrath to come). The above verses are just a sampling of what God The Father, The Lord Jesus Christ, Their apostles and prophets have all said. Please open your Bible and read. Accept what God has written – not what we prefer to say He meant.
<urn:uuid:31c329c4-1b78-47e2-9f57-0b194a31b55b>
CC-MAIN-2021-43
https://www.loveofthetruth.net/holy-day-calendar-dates/2021/03/28/2021-holy-day-dates/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584554.98/warc/CC-MAIN-20211016074500-20211016104500-00190.warc.gz
en
0.925385
2,879
3.046875
3
Equality between the sexes, particularly the equality and participation of women in society is something Canadians value. In fact, the Canadian Charter of Rights and Freedoms in Section 15 Equality Rights expressly prohibits discrimination based on sex. The Charter allows for the legislation of affirmative action laws designed for the “amelioration of conditions of disadvantaged individuals or groups including those that are disadvantaged because of race, national or ethnic origin, colour, religion, sex, age or mental or physical disability.” (Canadian Charter of Rights and Freedoms). Moreover, since 1971 among the departments of the government of Canada, you will find that of the Status of Women Canada. The mandate of Status of Women Canada is to promote “equality for women and their full participation in the economic, social and democratic life of Canada.” (Status of Women Canada) Historically, the division of labour in Canada was based mainly on sex. The norm was that men worked outside the home and lived with the understanding that Canadian citizenship included the duty to take up military service in times when Canada went to war. Women worked in the home and were called upon as a reserve labour force to step in and take on men’s jobs in the fields and factories while the men served in the Canadian military in wartime. This was the reality when Canadian men were away fighting during Canada’s participation in the First and Second World Wars. In the present, Canadian men and women compete for the same jobs in the Canadian Forces and the broader labour market. In the past, women were excluded from combat roles in the Canadian Forces and enrolment in Canada’s military colleges: Royal Military College and Royal Military College Saint-Jean. Following the mandate of Status of Women Canada, women were admitted to Canada’s military colleges starting in 1980. Sex-based segregation is mostly a thing of the past, but for a very long time, it was a reality. Some occupations were denied to women because they were deemed unsuitable for women. Yes, the status of women is taken very seriously in Canada. With the concern and emphasis on the status of women that is demonstrated in legislation and the devotion of an entire government ministry, the question remains: what about the situation of men in Canada? Regarding the status of men in Canada, it is widely assumed that for men–white English-speaking men in particular–their place in Canadian society is guaranteed. Consequently, it is primarily maintained that there is no need to worry about the status of men in Canada. This assumption that there is no need to be concerned about the situation of men in Canada is challenged by the emergence of a movement advocating for the well-being of men and boys in Canada. Of the various issues regarding the status of men in Canada that generate concern, suicide rates figure prominently. In fact, demographically, data generated by Statistics Canada indicate in 2012, show there were 3,926 deaths by suicide in Canada, of which 2,972 were men and 954 were women. The suicide rate in Canada in 2012 was 17.3 deaths per 100,000 men compared to a suicide rate of 5.4 per 100,000 women. As these data demonstrate, men were three times more likely to commit suicide than women. (Dustin K. Macdonald. Canadian Suicide Statistics 2016) Another concern with the situation of boys and men in Canada pertains to the participation of boys and men in secondary and post-secondary education. Once again, data compiled by Statistics Canada show that “in 2016, 8.5% of men and 5.4% of women aged 25 to 34 had less than a high school diploma, representing about 340,000 young Canadians.” (Sharanjit Uppal. Young Men and Women Without a High School Diploma) In 2016 in college and university enrollment in Canada, 1.15 million women were enrolled as opposed 883,000 men. (Statista) It is also the case that it is Canadian men who are at higher risk of injury and death in the workplace. Data compiled by the Association of Workers’ Compensation Boards of Canada shows that in 2016 864 men died on the job as opposed to 41 women and, 145,972 men were injured on the job as opposed to 95.479 women. (Association of Workers’ Compensation Boards of Canada) Groups such as the Canadian Association for Equality (CAFE) are concerned. There are groups affiliated with CAFE on university campuses across Canada currently that includes the University of Toronto Men’s Issues Awareness Society, the York University Men’s Issues Awareness Society, the University of Guelph Men’s Issues Awareness Society, the McGill University Men’s Issues Awareness Society, the Carleton University Men’s Issues Awareness Society and the Trent University Men’s Issues Awareness Society. The stated aim of CAFE is listed below: Our goal is to facilitate an inclusive, rational and civilized public conversation about the status of boys and men in Canada. Topics we think should be discussed include mental & physical health, suicide, family law, education, public policy, workplace safety, media & cultural stereotypes, and misandry. We believe this conversation must be based on facts and evidence-based research and not on ideology, e.g. gender profiling that assumes that only women can be victims and only men can be the perpetrators of abuse and discrimination. Moreover, CAFE took care to clarify its position on equality between the sexes affirming: “We do not believe that equal rights is a zero sum game, and we reject the notion that identifying and eliminating discrimination against men and boys will somehow increase discrimination against women and girls. By definition, equal rights means equal rights for everyone.” (CAFE) CAFE is well-represented by men and women in its leadership and organizational structure. The list of advisory fellows includes Janice Fiamengo who is an author, editor, and Professor of English at the University of Ottawa, Eleanor Levine who is a Field Educator at Factor-Inwentash Faculty of Social Work, University of Toronto, Jackie Orsetto who is a Course Instructor and Research Coordinator, Department of Sociology, Trent University and notably, Warren Farrell, author of Why Men Are the Way They Are and The Myth of Male Power. The advisory fellows lend their expertise in helping CAFE fulfill its mandate of consciousness-raising through events, campus outreach, research, press engagement, YouTube and blogging. In setting out to reach its stated goal, CAFE opened the Canadian Centre for Men and Families in Toronto in 2014 and the Canadian Centre for Men and Families Ottawa in 2017. The statement of values for the Canadian Centre for Men and Families states: We value equality, tolerance, respect, dignity and acceptance. We value all fundamental freedoms, including freedom of speech, freedom of expression, freedom of thought, freedom of association and freedom of the press. We believe in the importance of discussing different perspectives and we oppose censorship of controversial or politically incorrect ideas. We value peaceful and non-violent approaches to settling differences. We value the human rights of each and every individual. We believe the advancement of human rights is not a zero sum game where some will win only if others lose. We believe every human wins when any individual succeeds in advancing their human rights. We value people above ideas; we strive to ensure beneficial outcomes for our clients, personnel and our community. We value education; as an educational charity, we are committed to the highest standards of education and strive to continually improve educational content and experience. We value public policy that flows from fact-led and evidence-based scientific research rather than political or ideological commitment or special interest agenda. We value the wellness of people; we strive to improve the wellness of our personnel, our community and the public. We value excellence; at all times, we undertake to continually improve our business based on feedback, input and participation of our community, personnel and the public. We value transparency; at all times, we undertake to demonstrate transparency to our personnel, members and the public. We are an open and diverse community of individuals that embraces individuals regardless of sex, gender, gender identity, sexual orientation, disability, physical appearance, race, religion, age, marital status or national origin. (Canadian Centre for Men and Families) Notice CAFE refrains from collectivizing individuals according to superficial characteristics such as race, sex, and ethnicity. Still, a critical point in the Vision, Mission and Values of the Canadian Centre For Men and Families is the emphasis on boy’s and men’s issues as noted: - The CCMF will focus on the entire breadth of boys’ and men’s issues, including: ■ The “Boys’ Crisis” (education, bullying, suicide) – Creating a new sense of purpose for our sons, while preserving an equally purposeful environment for our daughters ■ Empowering boys and men with conflict resolution and communication skills that reduce violence in our communities and benefit all members of society ■ Educational and other resources to improve the mental and physical health of boys, men, and all those in their life ■ Workplace Issues (e.g. workplace safety and equality) ■ Family Law, Fathers Issues and working toward the best interest of all children ■ Crime and Punishment/Legal Issues focused on creating a fair system for all ■ Media, Social and Cultural Misandry ■ Academic Misandry (e.g. in Gender Studies and Culture Studies programs) The status of women in Canada, the drive for their full participation in economic, social and democratic is a laudable goal. Certainly, the drive for equality between the sexes in Canada is a good thing; but it is important that the status of boys and men is not overlooked, or so would you think. Unfortunately, there is vehement and hostile opposition to CAFE, the Canadian Centre for Men and Families and CAFE’s effort to establish Men’s Issues Awareness groups on university campuses in Canada. For instance, CAFE had its permit to take part in the parade at World Pride 2014 in Toronto revoked days before the event, despite having taken part in the event without incident in 2013. When asked about this by reporters, Pride executive director Kevin Beaulieu stated: “There has been some concern expressed about the activities and purpose of CAFE and whether they actually match the intent they express.” When asked to elaborate, Beaulieu replied, “I’m really not going to go into that.” (as cited in the Toronto Star) However, in 2015, Toronto Pride barred CAFE from participating in Toronto Pride in perpetuity. The Pride Toronto Dispute Resolution Process with Paul Bent as arbitrator was employed. Bent justified the ban stating in part: My decision is based on balancing of interests: I considered CAFE’s response that inclusion, diversity and equality are values the organization shares with Pride versus the numerous complaints filed against CAFE’s participation arguing that CAFE, as an organization and through its affiliation with men’s rights groups, contravenes Pride Toronto’s vision to, “create a safe space to engage communities in the celebration of their sexuality.” I must give the complaints of members of the LGBTTIQQ2SA community precedence when they indicate the participation of CAFE could directly undermine the participation of queer, lesbian and trans women in the Pride Parade. Consequently, I determined that the Pride Parade is not the right venue for CAFE given Pride Toronto’s vision to create a safe space for people of all genders and sexual orientation. (As cited in NOW Magazine) Regrettably, for opponents of the movement advocating for the well-being of men and boys, equal rights between the sexes is indeed a zero-sum game. In March 2013 three Ryerson University students, Anjana Rao, Argir Argirov and Sarah Santhosh, petitioned to open a men’s issues group on campus–the Ryerson Men’s Issues Awareness Society (MIAS). The stated aim was to “create a progressive and constructive voice and lend representation to any and all Ryerson students concerned with the issues of men and boys.” (The Eyeopener) The reaction from the Ryerson Student Union (RSU) was swift and uncompromising. Neda Hamzavi, Equity Issues Commissioner and RSU Board Member, was determined to block the opening of a men’s issues group at Ryerson University when she pushed through the following amendment to the Women’s Issue clause in the RSU Policy Manual: 4. Groups, Meetings or events [that] promote misogynist views towards women and ideologies that promote gender inequity, challenges women’s right to bodily autonomy, or justifies sexual assault 5. The concept of misandry as it ignores structural inequity that exist between men and women 6. Groups, meetings events or initiatives [that] negate the need to centre women’s voices in the struggle for gender equity. (As cited in Maclean’s) In defending this amendment Hamzavi stated: “We want to acknowledge that the additions that we added here are regarding the ideas of misandry and reverse-sexism, both of which are oppressive concepts that aim to delegitimize the equity work that women’s movements work to do.” Marwa Hamad, vice-president equity at the RSU, said the policy will preserve space for discussing misogyny and institutionalized gender imbalances. (As cited in Maclean’s) The President of the RSU, Rodney Diverlus, concurred with Hamzavi in asserting: “We know that oppression and the marginalization of men is something that doesn’t exist just like the oppression and marginalization of straight people or white folks in our society.” (The Eyeopener) In spite of the effort to block the opening of a men’s issues group on campus, plans to open a men’s issues group at Ryerson University during the Fall Semester in 2013 got underway with the support of CAFE. On February 6, 2014, CAFE held a talk on the Ryerson University campus, Are Men Obsolete? Feminism, Free Speech and the Censorship of Mens Issues, delivered by Karen Straughan, a member of Men’s Rights Edmonton and publisher of her YouTube channel as GirlWritesWhat. Initially, Ryerson University demanded that CAFE pay $1600.00 in security fees, but in the end the university absorbed the expenses as it was decided they were a barrier to free expression. The Ryerson Men’s Issues Awareness Society was established in 2015 and on October 19, 2015, an application for club recognition with the Ryerson Students’ Union (RSU) was filed. On October 27, 2015, the Ryserson Student’s Union informed the Ryserson Men’s Awareness Issues Awareness Society their application was rejected. The Ryerson Student’s Union justified their rejection of the application for club status on the grounds that “other groups like the Women and Trans Collective were already addressing many of the issues MIAS sought to focus on. Further, RSU claimed that men have “systemic privilege,” and that a group focused on men’s issues would “harass” women and make them feel “unsafe”.” (Justice Centre for Constitutional Freedoms) Not satisfied with this response, the Ryerson Men’s Issues Awareness Society appealed the Ryserson Student’s Union’s rejection. In doing so they emphasized their “pre-existing commitments to remain independent of any external control, to reject all forms of violence and hate speech, to take all precautions for safety at any group functions, and to provide a safe place for discussions free of fear for personal safety.” (Justice Centre for Constitutional Freedoms) In spite of this, on January 26, 2016, the Ryerson Student’s Union Board of Directors denied the appeal. This decision left the Ryserson Men’s Issues Awareness Society no alternative but to take the Ryserson Student’s Union to court. The Justice Centre for Constitutional Freedoms (a non-profit organization founded in 2010 with a mandate to uphold the constitutional freedoms of Canadians) agreed to represent the Ryerson Men’s Issues Awareness Society in court. As Marty Moore, lawyer for the Justice Centre for Constitutional Freedoms maintained: “Student union executives are not entitled to discriminate against students or groups whose expression they disagree with. Yet, students at Ryerson are forced to take their student union to court in order to have their fundamental rights and freedoms – which the student union itself recognizes – respected on campus.” (Justice Centre for Constitutional Freedoms) The case was heard by Justice Paul Perell heard in the Ontario Superior Court of Justice on January 24, 2018. Justice Perell handed down his judgement on February 26, 2018, in which he dismissed the case. Justice Perell ruled “turning then to the merits of Mr. Arriola’s and Ms. Godlewski’s case against RSU, there is no merit to it.” Justice Perell added “Mr. Arriola and Ms. Godlewski have no right nor entitlement to official Student Group status, which is a discretionary matter for the RSU to decide in accordance with its published policies and procedures.” Justice Perell found, also, the Ryserson Student’s Union’s appeals process “more than adequate.” (As cited in The Eyeopener) While Justice Perell’s ruling is a disappointment for the Ryserson Men’s Issues Awareness Society, they maintain their presence on the Ryerson University campus despite not having club status. In the last analysis, advocacy for the rights and well-being of men and boys is not at all unreasonable as the guarantees in Canadian law for equality between the sexes apply to men and boys, just as they do for women and girls. The emergence of the movement advocating for the well-being of men and boys in Canada is a necessary and worthy adjustment to Canadian society; just as is the drive to ensure the equality and full participation of women in Canadian society. The efforts of CAFE, the Canadian Centre for Men and Families and affiliated groups, are, in effect, striving to balance the scales in the status of men and women in Canada. The fact remains even if you disagree with CAFE, the Canadian Centre for Men and Families and affiliated groups; they have just as much right to present their evidence and express their thoughts as you do to challenge and refute them. CAFE and like-minded groups, who advocate for the rights of men and boys, carrying on the effort based on facts and evidence-based research and not on ideology are well worth hearing, and I wish them every success in their endeavours. Posted by Geoffrey
<urn:uuid:f59e55d1-671a-4947-bc58-3b36d600466e>
CC-MAIN-2021-43
https://geoffreyandmika.me/tag/misandry/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588053.38/warc/CC-MAIN-20211027022823-20211027052823-00150.warc.gz
en
0.954512
3,918
3.734375
4
Faith, science, and stargazing influenced everyday decisions in the Middle Ages. Humankind has always looked to the sky in wonder, with a desire to understand our place in the universe. Eclipses, comets, and star and planet sightings mesmerize us and inspire awe. In the medieval world, from about 500 to 1500, astronomy was a required field of study. From London to Baghdad and beyond, students of medicine, philosophy, and even theology carefully observed the astrological relationship between the 12 signs of the zodiac and one’s physical, mental, and spiritual well-being. Indeed, peoples of many religions believed that the radiant sun, full moon, twinkling stars, and distant planets held great power over their lives, the seasons, and daily activities. The Getty Center’s exhibition The Wondrous Cosmos in Medieval Manuscripts (April 30 to July 21, 2019) invites you to marvel at the complexity of the celestial realm in European faith and science traditions, with a glimpse at how similar beliefs held sway in Asia, Africa, and the Americas. The illuminated manuscripts show how astronomy and astrology infused everyday life in the Middle Ages, from medicine to religion and beyond. Astronomy and Astrology Faith and science—or the humanities and the sciences—were closely aligned in the Middle Ages. Universities across Europe organized their courses and bookshelves around the seven liberal arts: grammar, rhetoric, logic, music, geometry, arithmetic, and astronomy. As the study of the physics of cosmic orbs and other astral phenomena, astronomy was the foundation for astrology, which seeks to correlate these celestial events with happenings on Earth and individual human affairs. By looking at a range of manuscripts containing texts from astronomy and astrology, the exhibition shows the close relationship between the two. A cutting from the manuscript The Consolation of Philosophy, written by the fifth- to sixth-century writer Boethius, depicts the author speaking to Philosophy, who leads personifications of each of the aforementioned subjects. The last personification is Astronomy, who gazes up at the sun and moon while holding an armillary sphere, a model of the celestial universe. Another example from Boethius proposes a relationship between music and astronomy. In a scheme known as “the music of the spheres,” Boethius assigned musical value to each of the known planets based on their positions in the sky relative to the Earth, similar to a musical scale. The basic scale begins with the Moon, followed by Mercury, Venus, the Sun, Mars, Jupiter, and Saturn. An illumination in an early-fifteenth-century copy of the text shows Boethius explaining his method to a group: a hovering golden orb indicates a musical tone, the diatessaron (a fourth above the tone), and diapente (a fifth above). (The movement of the celestial spheres has inspired composers and musicians to the present, from Palestrina to Beyoncé, and from Franz Joseph Haydn to Nico Muhly, Sufjan Stevens, and Ariana Grande. See astrophysicist and musician Matt Russo’s brilliant TEDx talk, “What Does the Universe Sound Like? A Musical Tour” for a captivating demonstration of this long history.) The Influence of the Stars All year round, from sunrise to sunset, people in medieval Europe regulated their lives based on the position and movement of heavenly luminaries (the sun and moon), the planets, and the stars that constitute the signs of the zodiac. Even the language for the days of the week shows this influence, with Latin-based names derived from planets: - Monday is moon day, and moon in Latin is luna, from which we get lundi (French), lunes(Spanish), and lunedì (Italian). - Tuesday is Mars-day (mardi, martes, martedì). - Wednesday is Mercury-day (mercredi, miércoles, mercoledì). - Thursday is Jupiter-day (jeudi, jueves, giovedì). - Friday is Venus-day (vendredi, viernes, vendredì). - Saturday is Saturn-day, but in Latin languages is the Judeo-Christian day of Sabbath (samedi, sábado, sabato). - Sunday is the day of the sun or day of the Christian God when derived from Latin. A manuscript with various astronomical texts—called a miscellany—illustrates the degree to which cosmic forces were thought to influence one’s life. It features a series of watercolors personifying planets or celestial bodies, including the Sun as an emperor, the Moon as a woman, Mars as an armored knight, Mercury as a doctor, Jupiter as a bishop, Venus as a lady holding an arrow of love, and Saturn as an elderly man. Each figure is associated with a color and adorned accordingly: golden yellow (the Sun), green (the Moon), red (Mars), silver (Mercury), blue (Jupiter), white (Venus), and black (Saturn). Several pages later, circular diagrams declare the relationship between the luminaries or planets and the days of the week. For example, “Friday belongs to Venus.” At the center of the concentric circles is a representation of the planet named after the Roman goddess of love and beauty imagined as a white, six-pointed burst emanating red rays. The 24 hours of the day—indicated by Roman numerals I through XII repeated twice—are color-coded to the heavenly body that governs quotidian activities. Thus at noon on Friday we are under the influence of the moon, whereas at six o’clock in the evening Mars holds power over us. Representations of the zodiac signs Pisces, Libra, and Taurus are also found on these pages, each accompanied by planets or a luminary (Pisces features Jupiter and Mars, Libra the moon, Saturn, and Jupiter, and Taurus Mercury, the Moon, and Saturn). Month by Month Devotional or liturgical manuscripts often feature calendars that provide a wealth of information about faith and the cosmos. One such codex type, the book of hours, contains prayers and readings for daily to annual use. A calendar for the month of May in a mid-15th-century book of hours from Paris, for example, begins with an inscription stating that May has 31 days and 30 appearances of the moon. The first column includes Roman numerals to help readers determine the phases of the moon. They used this information to make decisions, such as when to fast or seek medicinal remedies. The second column indicates the days of the week, lettered A through G. At the bottom of the page, the artist included the so-called Labor of the Month, a seasonally appropriate activity such as picking flowers in April or sowing a field in October. Each sign of the zodiac was assigned to a full month during the Middle Ages, whereas today’s astrology follows a slightly different dating system. A diagram from a 1518 calendar manuscript indicates 54 major veins that may be drained according to the phases of the moon or the season of the year. This practice of bloodletting, an ancient medical process of withdrawing blood, seeks to balance bodily fluids known as humors (such as black and yellow bile and phlegm). Visions of the Universe in the Christian Tradition A selection of manuscripts in Wondrous Cosmos provides insights into Christian theology and celestial themes in sacred scripture and art. These include a music manuscript showing the creation of the world; the Book of Good Manners detailing the cosmic battlebetween warrior angels and rebel angels; and numerous episodes from Christ’s life (the angelic annunciation of Jesus’s birth to shepherds, the magi following a star to find the Christ child, the eclipse during the Crucifixion, and Christ’s ascension into heaven). The images and accompanying texts demonstrate the central role of heavenly lights, angels, and demons in church services and private devotional practices. A centerpiece of the exhibition is the Getty Apocalypse, a mid-13th-century English manuscript containing the biblical book of Revelation (also called Apocalypse), which describes enigmatic visions of the end of time. One of the most stunning page spreads features the so-called Woman Clothed in the Sun, with the moon at her feet, stars in her hair, and sunlight wreathing her body. The commentary tells us that the woman represents the Church, which gives light to both day and night. She gives birth to souls saved by angels, while a dragon, representing the devil, gathers one-third of the stars of the heavens in its tail, a symbol of Apocalypse. Out of this World Connections Across the Globe Several manuscripts and printed books in the exhibition reveal the global entanglements of astronomical or astrological ideas during the Middle Ages. For example, two miscellanies at the Getty contain constellation diagrams with the names of star groupings sometimes provided in Latin, Greek, and Latinized Arabic. This linguistic diversity confirms the connections among universities in Western Europe and centers of learning in Eastern Europe, Western Asia, and the vast Muslim world, where texts in many languages were copied, translated, and transmitted. The tale of Barlaam and Josaphat by Rudolf von Ems, from about 1200 to 1254, illustrates cosmic themes through a story in India. At the beginning of the tale, the imaginary King Avenir of India consults astrologists to interpret omens of planetary and astral alignment related to the birth of the future prince Josaphat. They predict that the young prince will convert to Christianity, which angers the king, who then confines his son to the palace. Inspired by encounters with sickness, poverty, old age, and death, the prince still becomes Christian, fulfilling the celestial prophecies. The saying “written in the stars” expresses the belief that cosmic or universal forces control the future, a theme found in this story as well as works of history, literature, and oral tradition around the world since time immemorial. The architecture of sacred structures built or enlarged during the medieval period and sites of pilgrimage also often evoked ideas of the cosmos and the place of humans within it. A major pilgrimage site in India, the Great Stupa at Sanchi, offered Buddhists a metaphorical microcosm of the universe. For Muslims, the Dome of the Rock in Jerusalem commemorates the Night Journey, when the angel Jibril (Gabriel) transported the Prophet Muhammad from Mecca to Jerusalem and into Heaven. Meanwhile, sculptors adorned the façade of Amiens Cathedral in France with the Virgin and Child and saints, making it a heavenly portal into the church space. Art and Wonder Across Time I have always been fascinated by the celestial realm. This exhibition is inspired by a range of sources in my life, including my childhood spent stargazing on camping trips and watching Star Trek and Star Wars. Carl Sagan’s Cosmos: A Personal Voyage is a long-time favorite (as is Neil deGrasse Tyson’s edition). More recently, I’ve become fascinated by an event that captured the attention of people worldwide many centuries ago. In 1054, people witnessed the light burst of what is now known as the Crab Nebula, a supernova. Contemporaneous texts describing the fantastic cosmic event exist in Japan and Iraq; later references to the awesome astral phenomenon can be detected in China and Central Europe. Pictographs, carvings, rock art, and cave paintings found across North America may also memorialize the sighting. Clearly an interest in the cosmos has a long history, and there is still so much to learn about our shared global past. Archeoastronomers and archivists continue to piece these clues together, drawing connections between distant communities, the medieval world, and our own time. I hope visitors to the exhibition will take a moment to pause from the business of life to ponder these connections, inspired by medieval illustrations about the cosmos.
<urn:uuid:fe275a81-c5a8-41d3-b00b-27b3c0ce8c53>
CC-MAIN-2021-43
https://brewminate.com/written-in-the-stars-astronomy-and-astrology-in-medieval-manuscripts/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585322.63/warc/CC-MAIN-20211020152307-20211020182307-00430.warc.gz
en
0.92995
2,507
3.84375
4
The Gospel of liberation, as it can be termed, originated in Latin America during a series of meetings in the 1960’s at the Second Vatican Council that focused on church unity and renewal. It wasn’t until the second Latin American Bishops’ conference held in Medellin, Colombia as a response to poverty and social injustice, that its best-known exponent Gustavo Gutiérrez, a Dominican theologian and priest from Peru, first presented and articulated the concept of liberation theology. These principles were later more clearly laid out in his 1971 magnum opus, “Teología de la liberación” (Eng. tr., A Theology of Liberation, 1974) that he defines as: “A theological reflection born of the experience of shared efforts to abolish the current unjust situation and to build a different society, freer and more human.”It’s overarching goal, he later states, is to give a reason for the hope from within a commitment to become more radical, total and efficacious, reconsidering the theme of Christian life and the new questions posed by this commitment.Answering these basic questions through liberating action and political practice will balance the social-economical scale in relation between faith and human existence. Human and political reason are interrelated and the emphasis on the preferential option of the poor is the responsibility of us all in the building up of the world. Christianity can no longer be dismissed as the opium of the people and an active commitment to those considered “nonpersons,” are denied the basic dignity and rights as designed by the creator.A thorough theological reflection on the philosophical foundations and reasoning will be analyzed in greater depth within this research paper. In the centre of its philosophical framework, liberation theology seeks for a ‘Copernican change in theology and approach that maintains a critical reflection on praxis. This is considered a necessity by Gutiérrez in theology for both spirituality and rational knowledge. The influence of Marxist thought in regard to its socio-analytical tools are found in theory but the argument of its commitments on religion or materialism are left out of the equation. The methodology of liberation theology can be found in Marx and Hegelian dialecticism within three different mediations; socio-analytical, hermeneutical and practical.Hegel’s Phenomenology is adopted by Gutiérrez for placing the self-creation of man as a process, offering the possibility of a conception of the religious consciousness and man’s objective experience.This allows for a genuine freedom through the essence of labor that seeks to transform and educate the rest of the world. Marxism is purely seen as an instrument and is never treated as a subject on its own but always from and in relation to the poor that focuses on economic factors, class struggle and ideologies according to Gutiérrez. This aids in the insight of the present state of the poor societies at large and provides a political program by which the unjust social systems can be dismantled and a more favorable one installed. The empirical, functional and dialectical explanation to the phenomenon of the poor place’s poverty as a vice and as a means of oppression. This is called the historico-structural approach that views poverty as a collective and also conflictive phenomenon whereby the social system is replaced through revolutionary transformation.This is what Gutiérrez refers to as “the historical process of human liberation” in developing a mentality for a new Christendom. The Marxist language is evident throughout liberation theology in showcasing not only the institutionalized violence of the poor and weak but in its efforts to critical understand the situation of the poor and classes of the oppressed. The connection between Marxism and liberation theology are apparent but their claims presume differences in theory and practice. While doctrine is somewhat maintained and a strong adherence to biblical hermeneutics, capitalism and the affirmation of socialism is not considered a fundamental or political practice but instead, a call to the commitment of the poor is the centrality of the Gospel message. Salvation for the Poor One of the questions that Gutiérrez imposes is on the relationship between salvation and the process of human liberation throughout history. Before we probe into the question, Robert McAfee Brown provides a robust definition in his book Liberation Theology; An Introductory Guide that explains liberation theology as: The God of the poor” and we are not poor. It’s about “the view from below” and we ’re on top. It’s about “good news to the poor” and that’s bad news to the rich. It’s about the third world and we live in the first world. It’s about social structures as carriers of evil and those same social structures are very beneficial to us. It’s about “subversion” and that’s simply an unacceptable word in our circles. There is a direct correlation between salvation and that of liberation in which encompasses aspects of social, political and economic endeavors. Salvation is considered the central theme of the Christian mystery from a quantitative to the qualitative that seeks to liberate the oppressed in their totality as persons, body and soul.The universality of salvation is considered in its theological reasoning for the option for the poor. God is the sustainer of all life and desires to communion with human beings. The mystery in which He conveys the salvific message is expressed and communicated to a crucified people. One of the main biblical text used to justify the redemption of the poor is that of the Exodus story and Israel’s oppression of the Egyptians. The servants in Pharaoh’s court refer to the lower echelon of people who are members forced to live in a society that governs the affairs unreasonably and unfavorably. It wasn’t until Moses and the encounter with God on Mt. Sinai that the heart of the Father is revealed (Ex. 3:7,9). The Exodus recounts the epic of the politicoreligious liberation of a slave society who, through the omnipotence of God, became the people of God. History has recorded these events and according to Gutiérrez, there is only one unique dimension of Christianity that signifies the destiny of humanity in the salvific horizon. Two themes are seen to illustrate this point between creation and salvation and the eschatological promises. Beginning with creation, Gutiérrez refers to two dimensions of God’s action in history; the creation of the universe as the first salvific act inserted in the process of salvation and the second Isaiah which contains the exile in Babylonia is considered a new creation.Creation language is used in the Exodus as the creation of God’s nation and people but Gutiérrez argues that structural sin is due to the society rather than the individual because of the mandate to have dominion over creation by God which has been abused. The creation and exodus stories reveal the “self-creation” of humanity by labor and social praxis and humankind should work towards revitalizing the handiwork of God towards a new creation. The second theme is Eschatological and as human beings, we are rightful heirs to the promise, which in the Greek is rendered epangelìameaning word pledged, announcement or notification, and Gutiérrez attempts to draw the connection of the Old and New Testaments. As God’s promise of salvation unfolds gradually in redemptive history, Gutiérrez explains that: “it is already fulfilled in historical events, but not yet completely; it incessantly projects itself into the future, creating a permanent historical mobility.”Gutiérrez adopts a Barthian eschatology that focuses on the transcendent and views eternity and time as end time affairs but with no ultimate reality and acknowledges a historical event as in all their completeness and significance. What this means for liberation theology is how the Bible presents eschatology as the driving force of salvific history which is radically oriented toward the future.Its critics would say that this approach reduces salvation to just a worldly affair that focuses exclusively on humanity rather than the eternal purpose of salvation. This type of impact on the church may cause a dividing line from a fundamental and traditional standpoint that would see this type of historical outlook as veering off the salvific path and what the true Gospel means. This leads to our next account from the vantage point of Christ as the ultimate liberator and deliverer of the poor. Jesus the Liberator The problem of sin is of utmost importance that has entered into this world through the fall of the first Adam. Gutiérrez regards sin as a social, historical fact, the absence of fellowship and loving relationships that separates humanity from a loving God and others.It alienates our community from embracing one another and instead seeks to cause division. The answer to this dilemma is found in the second Adam. This new image of Christ becomes an important Christological fact in Latin America that conveys the relevance of Christ to an oppressed and poor people group. The identity of Christ is a liberating reality, crucial in the soteriological understanding of the good news and proclaiming the release to the captives (Luke 4:18). This historical Jesus set the stage becoming human through the incarnation that allows a view of Christology from below were liberation theology can begin from. This historical framework is what Jon Sobrino says is a new Christology that must give history of the flesh and blood Jesus its full weight and revelation. The public ministry of Jesus was centered on the establishment of the kingdom of God and admonished those who hear the good news to repent and believe (Mark 1:14-15). According to Sobrino, the Q source sums up Jesus’ mission programmatically in terms of good news to the poor which is equivalent to the good news of the kingdom.This expression of the kingdom of God is particularly intended for the poor as demonstrated in the fulfillment of the law of love as seen in the good Samaritan. This message is viewed independently from Jesus as an example to His followers in expressing their faith in the context of poverty. The kingdom of God becomes God’s initiative in gift and grace that comes out of gratuitous love and not in response to human actions.The first beatitudes in the gospel of Luke state, “Blessed are you who are poor, for yours is the kingdom of God” (6:20). This relationship between God’s kingdom and the poor is established within the Gospels as facts according to liberation theology for those who are considered at the bottom of the heap of history, the oppressed who are socially casted out by those on top. This radical liberation from sin and oppression is found in Christ through his death and resurrection that redeems and sets free the poor. The cross becomes the means of liberation and the center of Christian faith that becomes a symbol which forces us to change our way of thinking about the most human realities: liberation, the meaning of history and God.Christ died for a crucified people (poor) who are viewed as Yahweh’s suffering servants in a continuation by which the world deprives them of a reasonable livelihood. In the book of Isaiah, we see the suffering servant as a man acquainted with infirmity, despised, rejected, numbered with the transgressors and yet done no violence (53:3-9). The servant was chosen by God to bring forth justice to the nations and brings salvation to a martyred people who share in this same suffering. The Role of the Institutional Church The church is a key theme in liberation theology as the sign and instrumental model in the sacrament of salvation. The early church took part in becoming the salvific love of God for all people in celebration of the universal salvation for the world.Its involvement in society on all fronts became the staple for modernizing its structures in order to fulfill its role in meeting the real needs of the people. The base ecclesial community becomes a place where a true democracy of the people is practiced, where everything is discussed and decided as one and were critical thought is encouraged.The overall scope and function of this universal church all share in the common good of the poor and utilizes all resources for their benefit. It’s in this existential element of faith that Leonardo Boff explains this experience as; “Truth is lived as a transforming encounter (metanoia) rather than being the mere presentation of facts, thus helping to ground the church as a community of faith.” The poor are to be seen as one with the church and not a separate entity in its identity. The sole characteristics of the church are to reflect the unity and fellowship of all people who are considered excluded from any participation in society. The liberation strategy or new ecclesiological perspective of the church see it as the “visible sacrament of this saving unity” that imparts to reality the “union of God” and the “unity of all humankind.”The position of the church is significant in its internal structure to serve the task of engaging the poor, allowing the poor themselves to become the church, helping the whole church to become truly a poor church and a church of the poor.The responsibility is not just a command but a challenge to use its power towards social upheaval as it was understood throughout western society. This also includes human dignity, rights and as a representative of the image and likeness of God to revitalize the communities in unity, love and service. In summary, Gutiérrez explains that the obligation to care for the poor means that the poor are not persons being punished by God but rather God’s friends.“He who is kind to the poor lends to the Lord” (Prov. 19:17). The marginalized are considered a people in search of God for a more excellent way (1 Cor. 12:31). The departure from Egypt during the Exodus meant a break from the power of death (enslavement) towards a journey of liberation, led by a liberator, who was called by the Father.Solidarity with the poor and oppressed is prominent throughout liberation theology that acknowledges a new way of life as a people of faith to one another and the community. What liberation theology teaches us is that unification in the body of Christ has been neglected over the time. Its contextualization of doing ministry praxis has stretched our theological reasonings and biblical biases towards who we deem our neighbor. What liberation theology has failed to do is focus more on orthopraxy and minimalize orthodoxy which is detrimental in living out the Christian life. An overemphasis on practice shouldn’t be a replacement for doctrine as a means of creating a freedom from injustice by implementing social revolution in return for an abundant life in Christ. The very meaning and mission of the church go beyond our present comforts and its message is made available to all who would hear its call. Gutiérrez, Gustavo. A Theology of Liberation History, Politics, and Salvation. Maryknoll, NY: Orbis Books, 2014, xiii.
<urn:uuid:4d197dfa-02b9-4954-9491-59e23002e3bb>
CC-MAIN-2021-43
https://breachingthewalls.org/2018/08/26/the-study-of-liberation-theology-in-latin%E2%80%8B-america/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587593.0/warc/CC-MAIN-20211024173743-20211024203743-00110.warc.gz
en
0.956383
3,082
2.8125
3
Impressive environmental protests have been organized by a wide range people calling for an end to radical energy and a transformation to a clean energy economy. Radical energy includes fuel derived from extreme extraction methods like tar sands, hydrofracking and off-shore drilling for oil or methane gas and mountain top removal for coal. This is costly energy, not only in dollars but in its impact on the environment; and it is causing an impressive growth in people taking action to protect the planet. Rather than building the upgraded energy infrastructure we need to reduce wasted energy and to efficiently store and transport energy from the sun and wind, the United States has embarked on building pipelines as well as relying on trains to carry oil and gas. This has resulted in inevitable oil spills, leaks and other damage. On August 1, a study of Exxon Mobil’s Pegasus pipeline—which flooded a Mayflower, Arkansas neighborhood with over 200,000 gallons of tar sands oil—revealed known “manufacturing defects,” with grave implications for the tens of thousands of similarly built pipelines still in the ground and operating. The old energy industries are grasping every piece of profit they can get, no matter what the cost to the planet (like this oil leak in Thailand). One reason the movement has grown is because there have been so many leaks, oil spills and eco-disasters recently, that it has been impossible for people to ignore. And, the effects are long lasting. People in Kalamazoo, Michigan are still dealing with a tar sands spill from the Enbridge Line 6 that occurred three years ago; problems will continue into the foreseeable future. The TransCanada pipeline that brings tar sands from Alberta to the Midwest experienced 12 leaks in its first year beginning in June 2010. And, dozens of “anomalies” (which can be seen in the video) were found in the newly laid pipeline in Southern, Texas. This summer a TransCanada whistleblower testified in Canada that there was a “culture of noncompliance” and “coercion,” with “deeply entrenched business practices that ignored legally required regulations and codes” and carries “significant public safety risks.” One underreported environmental “leak” is not coming from pipelines but from the tar sands pit itself. And, if people think they can avoid the inevitable problems of pipelines they should not forget the horror of the train wreck in Lac-Megantic, Quebec where a train transporting oil derailed. The destruction of the environment is so intense that it is leading to an intense opposition by growing numbers of people. We know that the planet cannot speak for itself and those of us who are conscious and aware of the ecological destruction to air, water, soil and climate, must take action to speak for the planet. Sometimes it takes confrontation, and other times efforts to build consciousness. The Healing Walk in Alberta this July brought more than a thousand people to march together and pray for healing of the land, water, air, and the people themselves. At the heart of the event were indigenous people, who came from all over North America to join Alberta First Nations to see for themselves the destruction and degradation from the out-of-control tar sands expansion. They found that even those who earn their living from the tar sands voiced their concern and support. The big energy scare of the week is what is happening in Fukushima, Japan. The recent news about the rising radiation in the Pacific Ocean occurred around the anniversary of the US bombing of Hiroshima and Nagasaki. Historical review shows the ruthlessness of President Truman’s decision as “American military leaders from all branches of the armed forces, among them Generals Eisenhower, Arnold, Marshall and MacArthur; and Admirals Leahy, Nimitz, and Halsey strongly dissented from the decision to use the bombs – some prior to August 1945, some in retrospect – for both military and moral reasons.” Today the issue is nuclear energy and the horrendous impact of Fukushima is making headlines. Nuclear Regulation Authority officials in Japan report highly contaminated water may be leaking into the soil from a number of trenches, allowing the water to seep into the site’s groundwater and eventually into the Pacific Ocean. Reuters reports that the bolts in Fukushima’s storage tanks will corrode in just a few years, and a plant worker reveals, “Tepco says it doesn’t know how long tanks will hold.” These tanks hold 380,000 tons of radioactive water. The fact that radioactive substances are still being released into the ground, the sea and the air is irrefutable proof that the nuclear disaster of March 2011 is not over. Former high-level nuclear industry executive – Arnie Gundersen says that Fukushima has “contaminated the biggest body of water on the planet”, and that the whole Pacific Ocean is likely to have cesium levels 5-10 times higher than at peak of nuclear bomb tests. The reality is now clear: TEPCO is unable to handle the emergency at Fukushima. There is good news too. The Nuclear Information Research Service reports some major victories for activists working to stop nuclear energy. Duke Energy cancelled its two proposed new reactors in Levy County, Florida. And, Electricite de France announced that it is pulling out of the U.S. nuclear market entirely. EDF wanted to build new reactors at Calvert Cliffs, Maryland and Nine Mile Point, New York. This follows victories earlier this summer in California and Kentucky. But there is more to do. In Washington State, a tank storing radioactive waste at America’s most contaminated nuclear site, Hanford, has sprung a leak. And, your help is needed to stop an absurd plan by the nuclear energy industry to get their radioactive waste off their property by transporting it on the nation’s highways to temporary holding centers. Activists dub this plan “Mobile Chernobyls” and “Fukushima Freeways!” Members of Congress actually support this dangerous plan and the Nuclear Information Research Service is asking your help to stop them. Click here for more information about ways you can help. Years of activism, organized resistance, civil resistance and pressure by people opposed to nuclear energy is winning. Investors will not invest in nuclear, companies are dropping projects and the dangers of nuclear energy are becoming more obvious to everyone. The nuclear renaissance heralded just a few years ago is in retreat. Throughout the summer there have been numerous actions against new radical energy sources, including the fearless summer, sovereign summer and summer heat protests, along with so many others. We really liked this one organized by Peaceful Uprising in Utah – “If you build it we will come” – which occurred at a tar sands strip mine, the first in the United States. Native Indians on the Nez Perce Reservation are in the midst of three days of protests to stop the transport of a tar sands megaload’s ten proposed tar sands shipments, measuring over 250 feet long, 23 feet high, and 21 feet wide, through the cherished lands and waters that sustain the Nimiipuu (Nez Perce) people. Another inspiring protest in Oregon to blockade the transport of carbon-based energy, brought out hundreds of people gathered on the Interstate Bridge and in kayaks and canoes in the Columbia River below to protest fossil fuel shipments on the Columbia. The group hung a banner from the bridge that said “Coal, oil, gas, none shall pass.” The great potential of water damage from hydrofracking was on display in drought-stricken New Mexico. Hydrofracking requires millions of gallons of water, and a terrible drought has led some farmers to sell their water to the oil and gas industry in order to pay their bills; even worse news, many farmers are actually pumping the water out of the aquifer to do so, risking long-term water supplies. Fracking poisons the water so that it cannot be reused and can penetrate and contaminate local aquifers. The destruction of water supplies by hydrofracking reinforces the conclusion of a Citigroup economist on water as a commodity who said “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” Protest movements in the U.S. and around the world are fighting back against hyrdrofracking. After a protest at the Democratic Governor’s meeting in Aspen, even the pro-fracking Governor of Colorado, John Hickenlooper, admitted what many in Colorado have been saying for years, “none of us want fracking in our backyard.” Colorado is a state with more than 2,000 documented fracking-related spills. Protests and government action against Chevron for a fire that occurred a year ago which caused more than 15,000 people to be hospitalized with respiratory problems escalated on the anniversary. Two thousand people came out to protest at the Richmond, CA facility, and more than 200 were arrested. On August 5, Chevron pleaded no contest to six criminal charges related to the fire and agreed to submit to additional oversight over the next few years and to pay $2 million in fines and restitution as part of a plea deal with state and county prosecutors. Investigative journalist Steve Horn continues to expose the corruption of the State Department’s KXL pipeline investigation. Now he shows how the firm writing the environmental impact assessment has ties not only to tar sands but also to hydrofracking. People are calling for the study to be thrown out and re-done because of the ties between corporate interests and the firm doing the study. One of the great threats to the environment is President Obama’s push for the Trans-Pacific Partnership. This trade agreement will make transnational corporations more powerful than governments and make it very difficult to pass laws to protect the environment and move to a green energy economy. Activists are urging people to join in this letter to President Obama, click here. And this Tuesday night at 9PM Eastern Time, there will be a massive twitter party to spread the word about the TPP and build the movement to stop it. Follow #TPPTuesdays to participate. Also, “like” and follow this Facebook page. The movement against the TPP is growing. Get involved by going to FlushTheTPP.org. There may finally be some justice in a corporate environmental crime that is 29 years old. Leaders of the five organizations of survivors of the Union Carbide disaster in Bhopal welcomed the decision of the District Court this week to summon Dow Chemical, USA in the ongoing criminal case on the world’s worst industrial disaster in December 1984. Union Carbide, USA has been avoiding charges of manslaughter and other serious offenses and the US has been sheltering their CEO, Warren Anderson, from extradition to India. This could be a major step toward accountability. But, after that horrendous train wreck in Lac Magentic, Quebec that caused an oil explosion which killed 47 people and left a town destroyed, the Montreal, Maine & Atlantic Ltd train corporation filed for bankruptcy in the United States and Canada. It faces mounting pressure from authorities to pay for the disaster clean-up, but they want to avoid paying for the damages to preserve the value of their company. It seems capitalists always prefer to socialize the costs whether they are human, environmental, or economic; whether trains or banks. People are recognizing that there are inherent conflicts between the economic system that demands profit before protection of the planet, and requires constant growth to survive; with the need to protect the environment. And, this conflict relates to the conflict of the wealth divide, John Foster Bellamy points out you can’t have substantive equality without ecological sustainability and vice versa. And, Vijay Prashad points out that at the root of many of these conflicts of wealth and the environment is a system that puts property rights first. All of this points to the need for a transformation of our energy supplies. The United States needs to set a goal of a carbon-free, nuclear-free energy economy by 2030. Can it be done? Do we have the technology? Arjun Makhijani, who wrote a book on the roadmap to a clean energy economy, wrote on the anniversary of Fukushima that: “We can do better than making plutonium just to boil water or polluting the Earth with fossil fuel use. When I finished Carbon-Free Nuclear-Free in 2007, I estimated it would take about forty years to get to an affordable, fully renewable energy system in the United States. Today, I think in can be done in twenty-five to thirty years. Are we up to the challenge?” Research shows that wind, water and sun are safer, healthier and less expensive. It is not a question of money or feasibility, but of priorities. There is no doubt the country and world would be better off if it committed to this transition. Americans want to live in a clean, carbon-free/nuclear-free energy economy. People are moving in that direction, protesting what we do not like and building the clean energy world we want. What is lacking is leadership from elected officials. As is so often the case, the people must lead.
<urn:uuid:b939e791-736e-4ffd-a1d5-5e68c7999caa>
CC-MAIN-2021-43
https://popularresistance.org/popular-resistance-newsletter-vibrant-movement-for-green-energy-economy/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584913.24/warc/CC-MAIN-20211016170013-20211016200013-00030.warc.gz
en
0.955883
2,719
2.890625
3
SUNDAY SCHOOL LESSON FOR THE WEEK OF NOVEMBER 25–DECEMBER 1, 2020 AIM: REVIEW the powerful familiar story in which Mary is called to be the mother of God’s Son. RECOGNIZE our significance and purpose in being a “vessel” for His Word; RESPOND by identifying ways to live out God’s plan for our lives when we are an empty vessel; and know that God uses REGULAR people to accomplish great things! The cast of characters in the lineage of Jesus consists of some of the greatest people of the Bible! You would expect that. It’s no surprise that great people were used by God to achieve the greatest moment in history, the birth of the Messiah, the Lamb of God who would save the world from its sins. Yet when one takes a closer look at all of the characters that are listed in the ancestry of Jesus, there are some unlikely people included in the list as well (we will take a closer look in next week’s lesson). - Oftentimes God uses those most likely to succeed. - Oftentimes He uses those who make wise choices. - Oftentimes God selects those with the most potential. - But sometimes God uses the least likely vessel. - Sometimes God uses the person least likely to succeed. - Sometimes God includes in His plan that individual no one would believe was a part of His grand plan. Sometimes (Okay, a lot of times really) God uses the least likely vessel to carry His Word! - In reality we are ALL UNLIKELY VESSELS! - All that matters is that God wants to USE YOU to bring the MESSIAH to the WORLD! 2 Kings 4:1-5 (NKJV) 1 A certain woman of the wives of the sons of the prophets cried out to Elisha, saying, “Your servant my husband is dead, and you know that your servant feared the Lord. And the creditor is coming to take my two sons to be his slaves.” 2 So Elisha said to her, “What shall I do for you? Tell me, what do you have in the house?” And she said, “Your maidservant has nothing in the house but a jar of oil.” 3 Then he said, “Go, borrow vessels from everywhere, from all your neighbors—empty vessels; do not gather just a few. 4 And when you have come in, you shall shut the door behind you and your sons; then pour it into all those vessels, and set aside the full ones.” 5 So she went from him and shut the door behind her and her sons, - Empty Vessel - Seek The LORD - Not Family - Not Friends - Not Fortune Tellers Isaiah 55:6 (NKJV) – Seek the Lord while He may be found, Call upon Him while He is near. Psalm 34:10 (NKJV) – The young lions lack and suffer hunger; But those who seek the LORD shall not lack any good thing. - Obey the Word - Prepare for A Blessing - No healing until the leper had dipped seven times 2 Kings 5:10 (NKJV) – And Elisha sent a messenger to him, saying, “Go and wash in the Jordan seven times, and your flesh shall be restored to you, and you shall be clean.” - No Messiah until the way had been prepared Isaiah 40:3 (NKJV) – The voice of one crying in the wilderness: “Prepare the way of the Lord; Make straight in the desert A highway for our God. - No vision without obedience John 9:7 (NKJV) – And He said to him, “Go, washin the pool of Siloam” (which is translated, Sent). So he went and washed, and came back seeing. - No Resurrection until the stone is removed John 11:39 (NKJV) – Jesus said, “Take away the stone.” Martha, the sister of him who was dead, said to Him, “Lord, by this time there is a stench, for he has been dead four days.” - No Entrance into Heaven without cleansing Revelation 7:13-14 (NKJV) – 13 Then one of the elders answered, saying to me, “Who are these arrayed in white robes, and where did they come from?”14 And I said to him, “Sir, you know.” So he said to me, “These are the ones who come out of the great tribulation, and washed their robes and made them white in the blood of the Lamb. - Shut The Door - Pushy People - Prying eyes - Provoking tongues Matthew 6:6 (NKJV) – But you, when you pray,go into your room, and when you have shut your door, pray to your Father who is in the secret place; and your Father who sees in secret will reward youopenly. Point to Ponder: Have you ever been in a situation which looked absolutely hopeless? Have you ever felt empty and all prayed out? Point to Ponder: What has caused you to feel empty, alone and wondering “where is God?” Thought 1: If you are an “empty” vessel – seek the LORD and He will fill you. Jeremiah 18:2-4 (NKJV) 2 “Arise and go down to the potter’s house, and there I will cause you to hear My words.” 3 Then I went down to the potter’s house, and there he was, making something at the wheel. 4 And the vessel that he made of clay was marred in the hand of the potter; so he made it again into another vessel, as it seemed good to the potter to make. 2 Corinthians 4:7-10 (NKJV) 7 But we have this treasure in earthen vessels, that the excellence of the power may be of God and not of us. 8 We are hard-pressed on every side, yet not crushed; we are perplexed, but not in despair; 9 persecuted, but not forsaken; struck down, but not destroyed— 10 always carrying about in the body the dying of the Lord Jesus, that the life of Jesus also may be manifested in our body. - Earthen Vessel - Easily Broken or cracked - Great Value - This Treasure is. . . - Holy Spirit - God given Gifts 1 John 4:4 (NKJV) – You are of God, little children, and have overcome them, because He who is in you is greater than he who is in the world. Thought 1: The treasure is NOT you but the treasure is on the INSIDE of you! Thought 2: God wants to use us! Ephesians 2:10 (NLV) – For we are God’s masterpiece. He has created us anew in Christ Jesus, so we can do the good things he planned for us long ago. Thought 3: We have been divinely equipped and empowered by God! Thought 4: You (the vessel) can be full of things that hinder the infilling of the Holy Spirit. Thought 5: Examine yourself – you could be full of sin! It could be pride, anger, bitterness or unforgiveness. You must empty yourself and allow the Holy Spirit to fill you. Remember thought 2 God wants to use us! Luke 1:26-38, 49 (NKJV) 26 Now in the sixth month the angel Gabriel was sent by God to a city of Galilee named Nazareth, 27 to a virgin betrothed to a man whose name was Joseph, of the house of David. The virgin’s name was Mary. 28 And having come in, the angel said to her, “Rejoice, highly favored one, the Lord is with you; blessed are you among women!” 29 But when she saw him, she was troubled at his saying, and considered what manner of greeting this was. 30 Then the angel said to her, “Do not be afraid, Mary, for you have found favor with God. 31 And behold, you will conceive in your womb and bring forth a Son, and shall call His name Jesus. 32 He will be great, and will be called the Son of the Highest; and the Lord God will give Him the throne of His father David. 33 And He will reign over the house of Jacob forever, and of His kingdom there will be no end.” 34 Then Mary said to the angel, “How can this be, since I do not know a man?” 35 And the angel answered and said to her, “The Holy Spirit will come upon you, and the power of the Highest will overshadow you; therefore, also, that Holy One who is to be born will be called the Son of God. 36 Now indeed, Elizabeth your relative has also conceived a son in her old age; and this is now the sixth month for her who was called barren. 37 For with God nothing will be impossible.” 38 Then Mary said, “Behold the maidservant of the Lord! Let it be to me according to your word.” And the angel departed from her 49 For He who is mighty has done great things for me, And holy is His name. - Elevated Vessel Who Mary wasn’t: - She was not perfect - She was not sinless - She was not a perpetual virgin - Mary was a person full of grace, not because of her own self-righteousness or her own worth. - She should be honored but not worshipped. Who Mary was: - Average young girl (possibly 13-15 years old) - From poor village in Israel - A virgin - Betrothed to Joseph - Because of God’s sovereign choice for her to be the mother of Jesus: - She was a vessel - She was a servant, even to her own Son. - She needed a Saviour and salvation the same as you and I. - She was highly favored - The Lord was with her - She was blessed among women Thought 1: Since Christ has come, every person can now. . . (1) be highly favored; (2) have the Lord’s presence and (3) be blessed among all others. - His name is to be Jesus - Jesus is a very superior name - There is Power in the name of Jesus - There is Pardon in the name of Jesus - Praise the name of Jesus - Jesus is a very significant name Philippians 2:9 (NKJV) – Therefore God also has highly exalted Him and given Him the name which is above every name, Acts 3:6 (NKJV) – Then Peter said, “Silver and gold I do not have, but what I do have I give you: In the name of Jesus Christ of Nazareth, rise up and walk.” Ephesians 5:20 (NKJV) – giving thanks always for all things to God the Father in the name of our Lord Jesus Christ, Acts 4:12 (NKJV) – Nor is there salvation in any other, for there is no other name under heaven given among men by which we must be saved.” - Rule over House of David - Reign over the world Thought 2: Mary couldn’t understand but she believed. There was no doubting or distrusting the message. Believers are to believe the miraculous even when we don’t understand. Thought 3: We, like Mary, are to believe and be encouraged that “with God nothing is impossible!” Thought 4: Mary was submissive. Her response was immediate and brief. Thought 5: Surrender to God is absolutely essential both for salvation and service. Point to Ponder: What type of “vessel” are you? PRAYER PRINCIPLE: Be thankful for the opportunity that God has given you to be vessel. SOCIAL JUSTICE PRINCIPLE: When you allow yourself to be of service, you share the blessings God has provided you with; this fosters others wanting his blessings EVANGELISM PRINCIPLE: Share with others how Christ became a blessing for us to exist and live. STEWARDSHIP PRINCIPLE: Your giving demonstrates your willingness to be a vessel; give persistently and consistently. DISCIPLESHIP PRINCIPLE: Many times we don’t feel worthy of being a blessing; God has birthed within you gifts that we only scratch the surface in displaying because He’s deemed you blessed. NEXT WEEK’S TITLE: Called to be an Heir NEXT WEEK’S READING ASSIGNMENT: Matthew 1:1-17; Luke 3:23-38; Genesis 38:1-30; Joshua 2:1-16; Ruth 1:1-18; 2 Samuel 11:1-9; Romans 3:23; Ephesians 2:9; Hebrews 1:1-5; Genesis 3:15; Genesis 12:3; 18:18; 22:18; Genesis 49:10; 2 Samuel 7:13; Micah 5:2; Isaiah 7:14; Exodus 19:19; Deuteronomy 5:22; I Kings 19:12; Isaiah 1:1; I Samuel 3:5; Matthew 28:18; John 5:22; Romans 14:9; 2 Peter 3:10-13; Revelation 21:1-2, 23-26; Isaiah 9:6-7; Hebrews 1:8; Revelation 5:22; Php. 2:9-10
<urn:uuid:20eb1c29-80ae-4fff-ad1c-3080069c4fd4>
CC-MAIN-2021-43
https://www.ssclive.org/2020/11/23/called-to-be-a-vessel/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585768.3/warc/CC-MAIN-20211023193319-20211023223319-00150.warc.gz
en
0.950436
2,980
3.0625
3
Elementary Workshop: Take Cover, a Storm’s Brewing Teacher Student Overview • Students will use a computer to study weather systems and then will be tested on the information. • I chose that students be tested on weather because it is crucial for students to learn about weather and understand why it is important to have a disaster plan in mind. TargetAudience • This lesson will be directed towards 3rd and 4th graders to help them learn about some different weather systems. • The audience can have any range of income. This lesson is targeted towards those who have good reading skills. The teacher can assist if necessary. LearningContext • Students in the urban area of Michigan City, IN will be needing a computer and internet access in order to study and pass this elementary workshop on weather. • The environment should be quiet so students can concentrate and the teacher may help the student if needed. Goals • This lesson is being provided so students can learn aspects of science in an intriguing manner. It is important to provide this lesson because Indiana is affected by weather. LearningObjective • Students will learn about different weather systems: thunderstorms, tornadoes, hurricanes, and snowstorms. • They then will be tested on the information they learned by taking a quiz within the workshop. • Students then will draw a concept map to ensure they know the information. • A group discussion will be held and together the class will create a weather calendar. Procedure • Students will read the information provided on hurricanes, tornadoes, snowstorms, and thunderstorms on a computer. • They then will take a quiz to assess their knowledge of the material, followed by making a concept map and creating a weather calendar. VideoProduction • Students will learn how to make a tornado in a bottle. • It is important for the students to understand how tornadoes affect the population of Indiana economically. Assessment • Students will have a group discussion when everyone has taken the exam individually to see what was learned. Author’sNotes • www.weatherwizkids.com • http://www.clipartpal.com/clipart/science/sun6.html • http://eo.ucar.edu/webweather/story_hurricane.html • http://plastic-stars-graphics.xanga.com/517269321/item/ • http://environment.nationalgeographic.com/environment/natural-disasters/hurricane-profile/ • http://www.picturesofwinter.net/snowflake_clipart.html • http://www.northmobilepost.com/category/weather-2/ • http://www.clker.com/clipart-weather.html • http://christmascarolsrecipes.com/frosty-the-snowman/ • http://www.picturesofwinter.net/snowflake_clipart.html • http://www.wallpapers-free.co.uk/background/weather/tornadoes/Tornado-Touching-Down-by-Country-Road/ • http://www.fluids.eng.vt.edu/msc/gallery/vortex/weather/spout1.htm • http://www.personal.psu.edu/jea4/earth/tornado/index.html • http://www.in.gov/dhs/files/Chapter_3_Risk_Assessment_c.pdf • http://www.sodahead.com/fun/love-it-or-hate-it-thunderstorms/question-936931/?link=ibaf&q=thunderstorms&imgurl=http://i387.photobucket.com/albums/oo318/insaneyou3/4LEE_Lightning.jpg • http://www.best-of-web.com/search_term_pages/thunder_storms.html LessonHomePage HurricanesSnowstorms TornadoesThunderstorms Hi! I’m Sid the Sun and today we are going to learn about weather! To start today’s lesson click on the highlighted optionabove. This is the home button, click on it to go to the home menu. This button means go to the next slide This means go to the previous slide HurricaneLesson • A hurricane is a storm with violent winds in the ocean • They can be up to 600 miles across and have high speeds up to 200mph. HurricaneLesson • Hurricanes can form over warm waters and winds move the warm water air up into a cool atmosphere. • This unstable meeting of two different temperatures cause the storm to form, winds create the storm to make a spiraling effect. HurricaneReview • What temperature do hurricanes form over? a)Warm water b)Cold water HurricaneReview • Warm water Correct! You are on the right track to becoming a weather wiz! Click on me to continue on with the weather lesson! HurricaneReview • Cold water Incorrect! Oh no! It looks like you chose the wrong answer. Click on me, Indigo, the Cloud whenever you see the wrong answer and go back and review the material. SnowstormLesson • Snowstorms get their energy from two different air masses. • Cold air moves from Canada to warm air from the Gulf of Mexico. SnowstormLesson • Snow forms when vapor changes into ice in the atmosphere. • If the temperature in the atmosphere is less than 32 degrees Fahrenheit, snow will be created. SnowstormLesson • Snowflakes are formed of many tiny ice crystals. • They form by pieces of dirt carried also by the atmosphere. • When the crystals form they are heavy enough to fall to the ground. SnowstormLesson • Why is snow white? • The ice crystals allow light to reflect back to the atmosphere. SnowstormLesson • Lake effect snow forms when cold air moves over warm lake water. • The warm air cools down and in combination with cold air creates heavy masses of snow. SnowstormLesson • During a winter storm, it is best to stay inside and keep warm • If you are outside, you could catch a cold or even worse get frostbite. SnowstormReview • How cold does the atmosphere have to be in order to form snow? a) 50°F b) 72°F c) 32°F d) 43°F SnowstormReview • 50°F • Incorrect! Go back to the question, you will get it the next time. SnowstormReview • 72°F • Wrong! That’s too hot! Think about it again and go back to the question. SnowstormReview • 32°F • You got it! You are on a roll! Continue on to the next lesson! SnowstormReview • 43°F • Wrong! Not cold enough! Try again! Tornado Video Click on Ms. Bennett to watch this great video! TornadoLesson • A tornado is a storm column which has huge winds with it on land. • In order for a tornado to form warm air from the Gulf of Mexico and cool air from Canada need to meet. TornadoLesson • When cold and warm air meet winds form and wind with high speeds are created. • Soon a column of rotating clouds form and sweep up everything in its path. TornadoLesson • A waterspout is generally a tornado over water. • Sometimes they can move onto land and now are considered tornadoes. TornadoLesson • Sometimes hail comes with tornadoes. • Water is caught in a thunderstorm within a tornado at times. When lifted into the atmosphere farther, the hail drops to the ground. TornadoLesson • Tornadoes can occur at anytime. • In southern states like Texas and Oklahoma, tornado season is March through May. • This tornado region is known as Tornado Alley. • They most likely take place between 3 and 9 pm. TornadoReview • When do tornadoes occur? a)Never b)3-9pm c)January 3rd d)always TornadoReview a) never Wrong! Try again! TornadoReview b) 3-9pm You got it!! TornadoReview c) January 3rd Wrong! Look over the lesson again! TornadoReview d) Always Wrong! ThunderstormLesson • A thunderstorm is formed by a large cloud called a cumulonimbus cloud. • It usually has thunder and lightning with it. ThunderstormLesson • Moisture, unstable air, and uplift cause a thunderstorm. • You always need moisture to form the rain which accompanies thunderstorms. ThunderstormLesson • There are about 1,800 thunderstorms everyday! • Lightning accompanies thunderstorms. • Produced by electricity, lightning can cause severe injuries , killing 75-100 people everyday. ThunderstormLesson • Lightning is caused by frozen water droplets hitting one another which causes an electric charge. • Thunder is caused by lightning hitting the ground and channeling back towards the clouds. ThunderstormLesson • How can you tell how far away a storm is? • Count seconds between lightning and hearing thunder • Take the number of seconds and dived by 5 and that tells you how far away the storm is. ThunderstormReview • What causes thunder? a)Lightning hitting the ground and channeling back towards the atmosphere. b)Drums c)A stampede d)Electrons clashing ThunderstormReview Lightning Correct! You are a weather wiz! ThunderstormReview b) Drums Try again! ThunderstormReview c) Stampede Wrong, not caused by animals! ThunderstormReview d) Electrons clashing Wrong! You almost got it! Quiz time! Click here to take the quiz! Quiz • Up to how many miles wide can a hurricane be? a)2 miles b)8 miles c)600 miles d)50 miles
<urn:uuid:ef8dfc95-ef25-481a-b286-bc7daef10e70>
CC-MAIN-2021-43
https://www.slideserve.com/kenda/teacher-powerpoint-ppt-presentation
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587719.64/warc/CC-MAIN-20211025154225-20211025184225-00069.warc.gz
en
0.847012
2,076
3.609375
4
Powerpoint module 1 testOn 21.10.2020 by Vishura Teachers Pay Teachers is an online marketplace where teachers buy and sell original educational materials. Are you getting the free resources, updates, and special offers we send out every week in our teacher newsletter? All Categories. Grade Level. Resource Type. Log In Join Us. View Wish List View Cart. View Preview. Grade Levels. File Type. Presentation Powerpoint File. Product Description. PowerPoint Presentation slides : The NYS Common Core teacher's instruction guides for the first module, first unit is almost pages this includes student handouts. I have created a PowerPoint slideshow that walks both the teacher and student through the module. I thought it might be helpful to other teachers as it helped me to become familiar and confident with the unit. I thought some of the student material was confusing for twelve-year-olds, so I created outlines and a final assessment that was much clearer. I put a free sample of the paragraph 2 expectations on this site. At the end of the unit there are instructions for students to follow to organize all their papers and write an extended response. The PowerPoint includes the lessons that correspond with the Module. In addition, there are 30 new slides added in that serve as post reading activities. The entire unit required them to close read, gather evidence, and answer the essential question: "How do culture, time, and place influence Salva or Nya's identity? The assessment was challenging, but an excellent culmination for gathering and organizing information in addition to making thought provoking inferences. There are many colorful photographs and maps embedded within as well. I hope you find this useful. Total Pages. Report this Resource to TpT. Reported resources will be reviewed by our team. Add one to cart. Buy licenses to share. Add to Wish List. Share this resource. Education Island Followers. Keep in Touch! Sign Up.Forgot your password? Speak now. Please take the quiz to rate it. All questions 5 questions 6 questions 7 questions 8 questions 9 questions 10 questions 11 questions 12 questions 13 questions 14 questions 15 questions 16 questions 17 questions 18 questions 19 questions 20 questions 21 questions 22 questions 23 questions 24 questions 25 questions 26 questions 27 questions 28 questions 29 questions 30 questions 31 questions 32 questions 33 questions 34 questions 35 questions 36 questions. Feedback During the Quiz End of Quiz. Play as Quiz Flashcard. Title of New Duplicated Quiz:. Duplicate Quiz Cancel. More Icdl Quizzes. Featured Quizzes. Related Topics. Questions and Answers. Remove Excerpt. Removing question excerpt is a premium feature. A laptop computer would be used:. Hardware refers to:. Which of the following is NOT an output device? A device external to the computer but controlled by it is called a:. Which of the following devices provides extra ports and drives for a laptop computer? To test if a problem is with the keyboard you should:. The Windows Task Manager enables the user to:. Which organization uses large scale computer applications to book flights? Which of the following offices would provide information on health and safety laws and guidelines on the use of IT?PowerPoint 2016: Getting Started with PowerPoint (Module 1 of 30) You should back up data to a removable storage device:. Why are Access Rights important? Because they prevent access to sensitive data by unauthorized personnel. What is used to legally protect the ownership of software? Shareware is:. Where can you find the Product ID number of your operating system software? Back to top. Sign In with your ProProfs account. Not registered yet? Sign Up. I agree to the Terms of Services and Privacy Notice. Already have an account?In Grade 5, students deepen their knowledge through a more generalized understanding of the relationships between and among adjacent places on the place value chart, e. Resources may contain links to sites external to the EngageNY. Skip to main content. Find More Curriculum Print. Grade 5 Mathematics. Prev - Grade 5 Mathematics. Grade 5 Mathematics Module 1. Like Grade 5 Mathematics Module 1: Full Module 9. Toggle Topic A Topic A. Lesson 1. Lesson 2. Lesson 3. Lesson 4. Toggle Topic B Topic B. Lesson 5. Lesson 6. Toggle Topic C Topic C. Lesson 7. Lesson 8. Toggle Topic D Topic D. Lesson 9. Lesson Toggle Topic E Topic E.Speak now. Do you think you know how to use Microsoft PowerPoint like a pro? Get ready to put your computing knowledge to the ultimate test and click to add a title, create a slideshow, and showcase your presentation — your presentation of PowerPoint skills, that is! Good luck! Microsoft Powerpoint Exam Quiz! Take this exam to see how well you know some PowerPoint basics. Content in this quiz was excerpted from Training on Sample Question. Create layouts for slides, handouts, and notes using the Master Layout dialog box in slide master view. For each new slide, select a layout from the Slide Layout task plane. Apply templates from the Slide Design task plane. Microsoft Powerpoint - Set 1. Slides and Handouts. All of the above. A Microsoft Powerpoint Quiz. Microsoft PowerPoint is an application software used to present data and information by using text, images, diagrams with animations, and transitional effects in slides that helps to explain the topic or idea in front of the Text slide. Title, text, graphs. Drawn objects, shapes. Clipart, drawn art, visual. Any of the above. Microsoft Powerpoint - Set 3. Presentation Quizzes.Played times. Print Share Edit Delete. Live Game Live. Finish Editing. This quiz is incomplete! To play this quiz, please finish editing it. Delete Quiz. Question 1. Any type of motion or movement that occurs in your presentation is called? The arrangement or order of slides as presented to the viewing audience. The individual page that includes any combination of text, graphics, images, video, or sound. The first slide in the presentation; frequently contains special formatting so that it is easily distinguishable. An animation effect that occurs when a presentation moves from slide to slide in Slide Show view. Which tab lets you insert clipart? How To Convert PowerPoint Into An Interactive eLearning Module Daniel wants each slide to appear with a checkerboard effect. Which of the following would you apply to cause this effect? A predefined set of slides is called a. What tab can you add Clip Art from? Which term refers to the size of alphabetic and numeric characters on a slide? What does the wavy, red line under a word in a presentation mean? What are each individual "pages" of a Power Point called? What is it called when one slide changes to the other? What is it called when one line of text comes in at a time? Can I put a specific picture inside a shape? Which command is used to specify the length of the transition effect for each slide in a presentation? What is this icon? Which baseball team won the World Series? Quizzes you may like. Inherited vs. Learned Behaviors. Animal Classification. Plant and Animal Classification. Structures and Functions. Adaptation Study Guide. Animal Adaptations. Find a quiz All quizzes.By signing in with LinkedIn, you're agreeing to create an account at elearningindustry. Learn more about how we use LinkedIn. We use LinkedIn to ensure that our users are real professionals who contribute and share reliable content. When you sign in with LinkedIn, you are granting elearningindustry. We also use this access to retrieve the following information:. Knowledge and time are the 2 most valuable resources in the world that we currently live in and, now, we have many opportunities to benefit from learning quickly and easily with the help of eLearning technologies. Moreover, almost everyone who has something to share with the public can become a guide in the world of knowledge, whether their strength is math, psychology, computer science, business strategy, photography, cooking, knitting, or anything else one can imagine. Of course, there are probably a lot of people who would want to share their knowledge but have no idea how or where to start. In this article, I would like to present the steps you can easily follow in order to build your first eLearning course using PowerPoint and authoring tools. This article will be helpful for people who are going to launch an eLearning website or use an LMS platform and need to prepare content for it. Though I understand that there is no one-size-fits-all solution, and each project will likely have their own peculiarities, I will only propose some of the possibilities and give some tips that I uncovered during my research that will be most valuable for everyone. It is a common practice that any course should be divided into modules dedicated to a certain theme. On completion of each module, students may either proceed to the next module, obtain a certificate, or take part in some type of activity, to sum up, what they learned pass a quiz, write an essay, complete a peer-to-peer check, etc. On the practical side, each module can be made of one PowerPoint presentation. To create an interactive training PowerPoint course, you will only need PowerPoint, which usually comes in the basic MS Office package, and one authoring tool they will be discussed later on. PowerPoint is really powerful and almost an all-in-one solution that opens numerous opportunities for you, as a course creator. It allows you to transform a boring slideshow watching into an interactive and effective process. It is always easier when you have a plan in front of you. Before you move to animation, create a static slideshow where all slides with texts and images are structured in a logical order. This will be a preview of your course. You may add programming instructions in "Notes" View - Notes to every slide to escape the mess. This tool helped me many times with slides that contained a lot of objects. This is where the magic starts. Here is what you can do:. Grade 5 Mathematics Some elements of your presentation should move for better visualization of the explained material. To make them act as you want, you can use the "Animations" tab to select from about effects: Appear, Fade, Float Inetc. Tip: In some versions of PowerPoint, the delay time is limited to 59 seconds. Often educational materials may include some explanations, glossary, citations, comments, and references.It covers four, multi-part questions and reviews key vocabulary and procedures for solving problems from Module 1, Lessons It is meant to be used with a printed copy of a practice testbut it can definitely be used on its own. The PowerPoint is perfect for students who struggle with the assessments in the Engage New York mathematics curriculum, even though they did well in the lessons and with the exit tickets. I modeled the questions in this PowerPoint after the actual test, so students can get exposure to the language and practice with the skills in a mixed review format. This is for your personal classroom use only. Thank you for not distributing this product or any adaptations of this product. Please direct those interested in this PowerPoint to my TpT page. Teachers Pay Teachers is an online marketplace where teachers buy and sell original educational materials. Are you getting the free resources, updates, and special offers we send out every week in our teacher newsletter? All Categories. Grade Level. Resource Type. Log In Join Us. View Wish List View Cart. Grade Levels. PowerPoint PresentationsTest Prep. File Type. Presentation Powerpoint File. Happy Teaching! Total Pages. Report this Resource to TpT. Reported resources will be reviewed by our team. Add one to cart. Buy licenses to share. Add to Wish List. Share this resource. Lani Browne 61 Followers. - Free worksheets - Pwk 21mm carb - Enter the gungeon online co op pc mod - Mansfield ohio indictments june 2020 - Gmod fbi playermodel
<urn:uuid:6fdc5a09-6d26-43c7-b267-0d36f9681acd>
CC-MAIN-2021-43
https://fys.educmadpusad.pw/powerpoint-module-1-test.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00550.warc.gz
en
0.90503
2,488
2.828125
3
The transformation of tensile architecture. By Mark Zeh It’s probably a search for neatness, or some sort of clarity, that leads humans to search for “the“ definitive inventor or designer of any given thing. This kind of search for simple attribution is embedded in the historical narrative of every culture. For instance, every American is taught that Alexander Graham Bell invented the telephone in the U.S. in 1876. But perhaps the inventor was Johann Phillipp Reis, in Germany in 1861—or Antonio Meucci in 18601—or was it even someone else, in yet another country? And what about the assistants, helpers and development partners of these named inventors or designers? Were they all insight-free “doers,” were they contributing collaborators, or did they actually come up with the key insights while the studio head was away on a business development trip or something? The first instantiation of any technology or design emerges somewhere at some point in time, but knowing who managed to take attribution for that invention or new design is not nearly as interesting as understanding where the underlying ideas came from, how they were combined and how they were transformed into reality. We know that ideas and inventions arise as a result of flows of information and technology. Ideas are always built up from earlier thinking and are the result of collaboration between people possessing different knowledge and talents, applicable to enable something to come to be. For instance, the age-old idea of sending people into space was not useful for anything other than inspiration and storytelling until centuries of different types of innovation and technological application had finally reached a key development point, enabling this to happen. Within this framework, it’s interesting to examine the roots of membrane and tensile architecture, along with a key collaboration that sped its development. In 1950, Frei Otto, an architecture student at the Technical University of Berlin (TU-Berlin), was awarded a stipend by the German National Academic Foundation for a semester of study at the University of Virginia. While in the U.S., he saw a model of Matthew Novicki’s2 Raleigh Arena (later J.S. Dorton Arena)3 in the New York office of engineer Fred N. Severud. Upon returning to Berlin in 1951, Otto published a paper4 describing the Raleigh Arena’s “pre-stressed” cable network structure5 in good detail, including its “hängende Dach” (hanging roof) and a description of the method of fastening its planned aluminum-coated neoprene membrane cover to the cable network. The publication of this paper apparently inspired Hans Stettbacher, a Swiss architect from St. Gallen, to copy the roof form at a smaller scale in his design for the Swiss Pavilion at the 1952 Berlin Industrial Trade Fair. Rather than using a single layer of high-tech fabric proposed for the Raleigh arena roof, a double layer of cotton fabric was installed in the pavilion. The second, inner layer of fabric was used because Stettbacher did not like the way the exposed steel cable net looked. Critically, tentmaking firm L. Stromeyer & Co, of Konstanz, Germany, was the fabricator of the roof of this novel, futuristic building.6 According to Otto’s recounting: In the fall of 1952, after he had received his diploma from TU-Berlin, he was awarded a 10-month grant by the German National Academic Foundation to continue his study of lightweight tent structures, with the stipulation that he deliver his doctoral dissertation at the end of this time (“Das hängende Dach” [The Suspended Roof”]). While conducting research for this book, Otto contacted four tent manufacturers to learn more about making tents. One of them answered—L. Stromeyer & Co. Peter Stromeyer, the young principal of the large tentmaking division of this company (perhaps the largest tentmaking concern in the world at the time) was curious about Otto’s doctoral thesis and work, so he invited Otto to Konstanz, at his own expense, to learn more about the work. After a period of friendly correspondence, Otto finally went to Stromeyersdorf, in Konstanz, and spent a week there learning about tentmaking and working with Stromeyer’s craftspeople.7 This was the beginning of an extraordinary collaboration that lasted into the early 1970s. From today’s perspective, it seems likely that Stromeyer’s experience fabricating the novel fabric roofing concept for Stettbacher’s 1952 Swiss Pavilion and whatever he had learned about the Raleigh Arena plans and Otto’s paper, during that activity, probably whetted his interest. Gisela Stromeyer, daughter of Peter Stromeyer, says, “I think that the original invitation to Otto and the collaborations that followed happened since my father was curious about what Frei Otto was thinking and was just very open to new possibilities.” Joachim Schilling, who worked with Frei Otto at the original Institut für leichte Flächentragwerke (Institute for Lightweight Structures) at the University of Stuttgart during the planning and construction of the German Pavilion at the 1967 International and Universal Exposition (Expo 67) in Montreal, Quebec, Canada, and later at L. Stromeyer & Co. GmbH, told me about Peter Stromeyer. “He had a background in mechanical engineering, but confessed himself to not knowing anything about the tentmaking business,” Schilling says. “At the time the Stromeyer company was quite large and the tentmaking part was just one of three divisions. Peter Stromeyer was in charge of developing the tentmaking and architectural division.” The outputs of this collaboration are well documented, but the actual work processes and interactions between the parties are less so. In his writings, Otto describes his work with Stromeyer during their first week together in Konstanz in 1953 as “the most productive working weeks in his entire life.”8 Otto goes on to describe a personal interaction with Stromeyer, starting with them agreeing that in order to understand how to work with membranes, they had to begin with “the simplest” possible forms. He describes their process of discovery by doing, where the saddlemakers, carpenters and other craftspeople at Stromeyer would quickly fabricate prototypes of the ideas created by Otto and Stromeyer. I asked Schilling how this collaboration process had evolved by the time the Expo 67 structure was being built. By that time, Otto and Stromeyer had created many landmark structures together and had come a long way in transforming tensile and membrane architecture from a tentmaker’s craft into an architectural and engineering discipline. “The German Pavilion design and engineering work was being done by a very-international team at [the Institute] in Stuttgart. I led the work in formfinding, model building, wind tunnel work and pattern making,” explains Schilling. “We had a team onsite in Stromeyersdorf to work out the actual detailing and manufacturing of the structures. The team was living on-site there for the project. “The mood of that work and interactions was very casual. The entire project was worked on in an interdisciplinary way, which included manufacturing partners, suppliers, architects, structural engineers, students from [the Institute], craftspeople from Stromeyer and so on,” says Schilling. ”These projects involved solving every problem in close collaboration since this was the predigital age—there wasn’t any CAD and the engineering wasn’t understood yet. We had to constantly invent ways to realize our designs.” Unfortunately, the story of the L. Stromeyer & Co. GmbH does not have a happy ending. Because of the economic conditions in the textile trade in the early 1970s, the company was forced into bankruptcy (one of its divisions wove commercial fabrics). The result was one of the most complicated bankruptcies in German legal history as the giant company was split up. An unfortunate result of the eight-year-long bankruptcy process is that much of the craftsmanship knowledge was lost, along with the company’s archives, models and documents. Peter Stromeyer, and the craftspeople and capabilities within his tentmaking company, were the key to developing the technology of wide span, lightweight roofs. L. Stromeyer & Co. GmbH was the “knowing” and “doing” side of a collaboration that enabled Frei Otto’s curiosity and creativity to take form and develop. Peter Stromeyer also, critically, added commercial pressure to the equation, transforming the development of membrane architecture from an academic and intellectual curiosity into a commercial proposition, competing against other types of construction. Contributing editor Mark Zeh writes regularly about design and innovation from his base in Munich, Germany. His cover story about dynamic, responsive buildings appeared in the May/June issue. *German for “collaboration,” “cooperation.” “Das Telefon und der Streit um eine Erfindung” (“The Telephone and the Argument about an Invention” [author’s translation]) by Matthias Maetsch, (accessed May 27, 2012) 2“Nowicki’s Other Masterpiece: The Erdahl-Cloyd Wing at NC State” by John Morris, Sept. 16 , 2011, from Goodnight Raleigh (accessed May 27, 2012) 3“Extended History of the J.S. Dorton Arena,” (accessed May 27, 2012) Published in: Die Bautechnik, Volume 28, Issue 10, 1951, pp. 254/255—a portion of this paper can be read on the website of the German-language magazine Spektrum in a retrospective published October 1, 2001 5“Story No.4,” Frei Otto, 1976, from IL 16 Zelte Tents, edited by Berthhold Burckhardt, Frei Otto, Ilse Schmall, (Stuttgart Germany: Institut für leichte Flächentragwerke, 1976), pp. 14, 15, 103, 116, 117 7ibid, pp. 8, 115 8ibid, pp. 14, 117
<urn:uuid:c7150fdd-ca4e-4da6-bda1-a14c29ffa504>
CC-MAIN-2021-43
https://fabricarchitecturemag.com/2012/07/01/zusammenarbeit-collaboration-of-frei-otto-and-peter-stromeyer/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00669.warc.gz
en
0.958992
2,227
2.875
3
There are different ways to illustrate objects’ spectral brightness variation when moving between different spectral ranges. If it has to be shown for a single pixel of an image or generalized for a group of pixels, then spectral brightness curves are used. And what has to be done when one wishes to display spectral characteristics of every pixel of the satellite image? In this case we will make use of the multidimensional scatter plot. An n-Dimensional scatter plot is a graph which has spectral brightness values plotted on its axes. Every axis refers to an individual spectral range (image band). In the simplest case having two axes we get a 2-D scatter plot. If there are more than two axes, the plot becomes volumetric (multidimensional). All the brightness combinations that exist in the image form a point cloud in this space. Each image pixel has a corresponding point in this cloud. ENVI has a dedicated n-D Visualizer tool to work with the n-Dimensional spectral feature space. It can be used to solve various tasks. For example, choosing an optimal algorithm of the supervised classification and training areas’ quality assessment. This article covers the usage of the n-D Visualizer for satellite images interpretation. Workflow of all the automated interpretation (classification) algorithms can be represented as the processing of the n-D scatter plot displayed as the data cloud. From this perspective, classification comes to division of the point cloud into separate classes. This is done with mathematical formulas that the classification process is based on. In case a user wants to distinguish classes manually using their own criteria, they can do that as well. The practical part of our article covers image classification in ENVI using the n-D Visualizer tool. Let’s discuss the work with the n-Dimensional scatter plot by the example of the Landsat image interpretation. Image fragment (fig. 1) covers territory on the right and left banks of Pechenihy Reservoir. This territory has various surface types – water bodies, coniferous forests, deciduous forests, open soil etc. Pechenihy Reservoir is blue in the presented Landsat image (band combination 7:5:3). Deciduous woodland (Pechenihy Dacha) on the reservoir’s right bank is grassy-green. Coniferous forests that grow primarily on the reservoir’s left bank are dark-green (fig. 1). Our goal is to create a map of water bodies’, and coniferous and deciduous woodlands’ distribution. In order to accomplish it we have to: ① create a scatter plot; ② inspecting the scatter plot, identify various earth surface types in the data cloud; ③ distinguish classes corresponding to various surface types on the ④ export classes from the scatter plot to a 2-D cartographic image. So, let’s view in detail the content of each of these four steps. Figure 1. Landsat image fragment Creating a scatter plot from the existing region of interest To create an n-D scatter plot select: Spectral→ n-Dimensional Visualizer→ n-Dimensional Visualizer New Data. In the next dialog (n-D Visualizer Input Data) choose an image a scatter plot will be created for. Next, a dialog box will appear where you have to select a ROI which the information on the specific pixels will be taken from (you have to create the ROI covering the proper part of the image in advance). Two windows will appear: n-D Visualizer and n-D Controls. The first window (n-D Visualizer) is an n-Dimensional visualizer displaying a data cloud. The second window (n-D Controls) is used to adjust the data cloud display. n-D Controls has a menu, n-D Selected Bands section and buttons for navigating the spectral feature space/scatter plot. At first, this plot will be empty in the n-D Visualizer. If we click the band numbers in the n-D Selected Bands section, data points will appear in the n-D Visualizer window. Its shape depends on the bands selected. In figure 2 these are bands 3, 4 and 5. In n-D Selected Bands section they have white background, and the rest of the bands that were not used have black background. It is clear, that in order to create a spectral feature space we need at least two bands. This way it will be a 2-D feature space. For a volumetric appearance, we need at least three bands. Figure 2. n-D Visualizer (left) and n-D Controls (right) windows Navigating the scatter plot Navigating the scatter plot in ENVI is just rotating the data cloud. There are two rotation modes: automatic and manual. To start an automatic rotation, press the Start button. To adjust rotation speed, enter a value in the Speed input line (the default value is 50). If you want to display the axes of the n-D scatter plot, select Options → Show Axes. To manually rotate the data cloud select Options→3D: Drive Axes. Now you can spin the data cloud manually by clicking and dragging it. When rotating the data cloud it is necessary to inspect it from all sides. By doing this, it is possible to see individual point clots corresponding to certain surface types. But what are the surface types they correspond to? ENVI has two ways of solving this question. Firstly, we can import spectral brightness curves (in ENVI they are stored in the spectral library format) and see where they appear. In the multidimensional space of spectral features, a spectral curve will transform into a separate point. Secondly, we can directly view the spectral brightness curves for every point displayed in the n-D Visualizer. Every surface type has its own specific curve shape. They can be distinguished by their curve shape. Spectral brightness curves are also called spectral signatures (i.e., a signature similarly to a person’s individual signature). Importing spectra into the scatter plot To import spectral signatures stored in the spectral library into the scatter plot, in the n-D Controls window select Options→Import Library Spectra… The n-D Visualizer Import Spectra dialog will appear (fig. 3). There go to the Import menu, choose the type of the spectral signatures source (spectral library, ROI, ASD-file etc.). Open individual spectral curves and they will appear in the n-D Visualizer Import Spectra dialog. Figure 3. n-D Visualizer Import Spectra dialog Press Apply in the n-D Visualizer Import Spectra dialog. After that, spectral signatures will appear in the n-D Visualizer window (fig. 4). Figure 4. Spectral curves on the scatter plot Once imported, a spectral brightness curve will be displayed as a color asteriks in the scatter plot. Names of the spectral signatures are displayed beside these asterisks. In figure 4, water bodies’ signature is displayed in cyan, coniferous forests’ signature is dark-green, and deciduous forests’ signature is light-green. The next figures (fig. 5-8) use the same color key. Viewing a spectral signature There is another way to identify surface types in the data cloud. It is the opposite of the previously discussed method. Choose Options→Z Profile… Then right-click any point. N-D Profile dialog will appear displaying spectral plots (fig. 5). At first, it will be empty. In order to display a spectral curve, it is necessary to click the point in the data cloud which you want to display the spectral curve for. By default these curves are black. For distinguished classes, spectral signature’s color corresponds to the class color. For example, when you click the white point, a black plot is displayed; and when you click a colored point, the plot has the same color as that point. Figure 5. Spectral plots for water bodies, deciduous and coniferous forests In figure 5, you can see a typical spectral responces of water bodies (blue plot), coniferous (dark-green) and deciduous (bright-green) forests. For water bodies the typical spectral signature’s shape has a gradual brightness decline when transiting from blue spectral range to infrared spectral range. For forests (and for vegetation in general) spectral brightness curve has a dip in the red spectral range and a peak in the infrared. For coniferous forests the difference between these spectral ranges is greater than for deciduous forests. Defining classes in the scatter plot Once you have identified surface types in the data cloud, you can proceed to the classes determination. To do this, in the n-D Controls dialog menu select a Class section and choose the class color. Then in the n-D Visualizer window encircle a part of the data cloud like the one shown in the figure 6 (highlight the desired pixels on the n-D Visualizer by left-clicking to set vertices, and right-clicking to close the polygon). Figure 6. Defining classes in the n-D scatter plot Exporting classes from the scatter plot Classes defined in the n-D scatter plot can be exported to the region of interest (ROI). To do this, in n-D Controls window choose Options→Export Class or Options→Export All. The first command exports a currently active class. The second command exports all classes. To find out which class is currently active or to activate a different class select Options→Class Controls… n-D Class Controls dialog will appear (fig. 7). Figure 7. n-D Class Controls dialog The upper part of the n-D Class Controls shows the currently active class. The lower part of the dialog has a list of all the classes. To activate any class, press a corresponding colored square in the classes list. Pay attention to the Export button in the n-D Class Controls dialog. It can also be used to export the currently active class to the ROI. Exported classes won’t be displayed in the table of contents. But they exist in the program memory, so we have to create a classification image from them. To do this, select Regions of Interest → Classification Image from ROIs. As a result, an image similar to the one shown in the figure 8 will be generated. Figure 8. Classified image In general outline, figure 8 correctly represents the geography of the three types of surface (water bodies, coniferous and deciduous forests). Some areas were misinterpreted. We will discuss how to assess the classification accuracy in the next post.
<urn:uuid:fc770970-502c-494a-baa5-c2625c7664eb>
CC-MAIN-2021-43
http://www.50northspatial.org/n-dimensional-spectral-feature-space-envi/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587593.0/warc/CC-MAIN-20211024173743-20211024203743-00110.warc.gz
en
0.862021
2,248
3.359375
3
One of many twin Keck Telescopes at Mauna Kea, Hawaii, fires a laser information to create a synthetic star picture to assist right for atmosphere-induced blur. Photograph: Keck Observatory web site. On October 6, the Nobel Prize for physics was awarded to Reinhard Genzel and Andrea Ghez for the invention of a supermassive compact object on the centre of our galaxy, and to Roger Penrose for the invention that black gap formation is a strong prediction of the final concept of relativity. Black holes are probably the most enigmatic objects within the universe, and so they have fascinated scientists and non-scientists alike. Within the 18th century, primarily based on Isaac Newton’s work, John Mitchell and Pierre-Simon Laplace first proposed the thought of objects so heavy that even mild couldn’t escape their gravitational pull. In 1915, Albert Einstein proposed an ‘upgraded’ concept of gravity known as the final concept of relativity. He postulated that gravity as a power was created when objects with mass bent the space-time continuum. The heavier the thing, the extra it bends space-time round itself, and so extra its gravitational pull is felt to be. Einstein’s concept contained a set of equations that could possibly be used to find out the energy and path of the power of gravity exerted in any pure scenario. The German physicist Karl Schwarzschild, whereas serving within the military through the First World Conflict, revealed the primary precise options to those equations. In his calculations, he decided the curvature of space-time round a spherical object, which physicists later present in nature – within the type of black holes. Curiously, Schwarzschild discovered that at two areas, the idea breaks down and turns into unable to foretell what might occur there. One was on the centre of the sphere, and the opposite at a sure radius from the centre, known as the Schwarzschild radius. Following the work of the American physicists Robert Oppenheimer and Hartland Snyder in 1939 and of David Finkelstein in 1958, we now perceive these ‘areas’ a bit otherwise. The centre of the thing is called the singularity. The floor of the sphere described by the Schwarzschild radius is named the occasion horizon. The singularity on the centre of a black gap is fashioned when an excessive amount of matter is crammed into too small an area, and the density turns into infinite. The occasion horizon is the ‘level of no return’: as soon as one thing, together with mild, has crossed past this level within the black gap, there is no such thing as a escape. Nonetheless, primarily based on his personal work Einstein had beforehand speculated that such ultra-compact plenty can’t exist. A number of different physicists additionally thought that such ‘singularities’ may be artefacts of approximations and assumptions within the concept itself, and never one thing we would observe within the pure universe. Roger Penrose, a mathematician and physicist on the College of London, wished to analyse the Einstein equations with out assuming a spherical geometry, like Schwarzschild had. For this, he employed a department of superior geometry known as topology and launched a brand new idea to assist his calculations, known as trapped surfaces. His work expanded on the concepts of the Indian physicist Amal Kumar Raychaudhuri and the Soviet physicist Lev Landau – particularly, the Raychaudhuri-Landau equation. In case you have a bunch of particles sitting at relaxation with respect to one another, they are going to finally come collectively and type a singularity. It is because gravity is a horny power. In actuality, there are different forces in play between particles that forestall them from collapsing right into a singularity each time they arrive shut sufficient (‘like fees repel’ is certainly one of them). Penrose confirmed that if mild turns into trapped inside some area and can’t escape, then a singularity should happen and the trail of sunshine will result in the singularity. This trapped floor is the occasion horizon of a black gap. When the core of a sufficiently huge star collapses on the finish of its life, the gravity at its centre is so sturdy that no different power can forestall it from imploding right into a small, ultra-dense area, bending the space-time continuum infinitely at its centre and trapping mild inside its occasion horizon. Penrose proved that some stars will inevitably collapse right into a singularity surrounded by an occasion horizon, forming a black gap. His concept, nonetheless, doesn’t account for quantum physics, which describes how physics works at very tiny scales. Coronary heart of darkness Within the Fifties and Sixties, astronomers working with radio telescopes discovered tiny dots of their knowledge that gave the impression to be the supply of sturdy radio waves. Once they noticed these dots with visible-light telescopes, the dots gave the impression to be blue in color and gave the impression to be stars in our galaxy. They have been thus named quasi-stellar objects, or quasars. (The prefix ‘quasi-‘ means ‘virtually’.) Later, astronomers discovered that these weren’t stars in our galaxy however objects related to distant galaxies, lots of which have been greater than a billion light-years away. Even at such superior distances, their mild was hundreds of occasions brighter than all the sunshine originating from the Milky Means. Their brightness additionally appeared to flicker throughout a matter of days and months. In astronomical phrases, this can be a blink of the attention. Solely a supremely dense object might produce such excessive brightness and speedy flickering. No surprise then that astronomers rapidly suspected quasars could possibly be supermassive black holes surrounded by superhot, radiation-emitting plasma. Donald Lynden-Bell, a physicist on the Royal Greenwich Observatory, offered one of many first theoretical descriptions of quasars, and recommended that the majority galaxies comprise supermassive black-holes at their centres. In 1971, Lynden-Bell and Martin Rees, of the College of Cambridge, compared a map of quasars to radiation coming from the Milky Means. Primarily based on their evaluation, they predicted that the Milky Means must also host a large black gap at its centre. When you regarded on the centre of the Milky Means by a visible-light telescope, you’ll discover a considerable amount of mud blocking your view. However whereas mud blocks seen mild, radio-waves can penetrate it, so astronomers choose radio telescopes. In 1974, two astronomers named Bruce Balick and Robert Brown used the US Nationwide Radio Astronomy Observatory’s radio telescope to check the Milky Means’s centre. They found a small ‘core’ on this area that was powerfully emitting radio waves. Brown known as it Sagittarius A* (pronounced ‘Sagittarius A-star’, and shortened as Sgr A*). Astronomers subsequently used infrared telescopes to check this area and in addition discovered a big cluster of stars. The compact radio supply Sgr A* was on the centre of this cluster. They studied the obvious motion of Sgr A* (by evaluating its place towards the background of faraway galaxies) and concluded that Sgr A* was a part of the galactic centre, and never a distant background object. All of this proof pointed to this area being the Milky Means’s nucleus. Estimates within the late Nineteen Seventies recommended Sgr A* had a mass of 5 million occasions that of the Solar, clumped collectively in a really small quantity of house. However one query remained: was Sgr A* a supermassive black gap or one thing else? Regardless of the burden of information, answering this query turned out to be fairly troublesome. Because the early Nineties, two worldwide groups – one on the Max Planck Institute for Extraterrestrial Physics, Germany, led by Reinhard Genzel and one other on the College of California, Los Angeles, led by Andrea Ghez – have been finding out the galactic centre for this objective. Each groups studied the infrared radiation coming from the Sgr A* area, which the mud couldn’t block, for details about what could possibly be occurring there. Genzel’s staff used the European Southern Observatory’s (ESO) infrared telescopes in Chile, and Ghez’s staff used the Keck Telescope in Hawaii. The primary few light-years from the galaxy’s centre comprise a whole lot of stars, all orbiting the nuclear level. By finding out their orbits, astronomers can inform if Sgr A* is a single, huge object or a lot of stars or stellar remnants, like neutron stars or small black holes, shut to one another. Observing these stars just isn’t straightforward. Turbulence in Earth’s environment blurs the starlight, so it’s onerous to find out their place precisely utilizing ground-based telescopes. The lengthy remark time required makes using house telescopes unfeasible. To beat this problem, the 2 groups developed a way known as speckle imaging: taking many short-exposure photos of stars and stacking them collectively to enhance the standard of photographs. However this system labored just for the brighter stars. They’d their subsequent breakthrough when the telescopes they have been working with have been upgraded with adaptive optics. This know-how creates ‘synthetic stars’ within the area of view by firing sturdy lasers; then, through the use of the lasers’ mild as a reference, the telescope can right for the blur (see picture on high). This fashion, the groups found dozens of stars inside 0.1 light-years of Sgr A*. These are known as the S-stars. One in every of them, S2, has an orbital interval of solely 16 years, and it comes inside 17 light-hours, or 120-times the Earth-Solar distance, at its closest strategy. The groups studied S2 and a number of other different stars within the S-cluster for a few years, significantly their distances, speeds and orbits. Ultimately, they have been capable of decide that Sgr A* comprises a mass of 4 million Suns inside a area of house the scale of our Photo voltaic System, and the one manner that is potential is that if Sgr A* is a supermassive black gap. In 2008, each groups introduced the outcomes of their lengthy observations and analyses, confirming the presence of a black gap on the centre of the Milky Means. For this work, Genzel and Ghez collectively acquired one-half of the 2020 Nobel Prize for physics. Physicists have subsequently additional noticed SgR A* utilizing a brand new approach known as infrared interferometry, with the GRAVITY instrument aboard the ESO’s Very Massive Telescope. They have improved Genzel’s and Ghez’s measurements a hundred-fold, and have also reported that S2’s orbit exhibits results predicted by the final concept of relativity, additional confirming the outcomes. The Event Horizon Telescope is poised to check the shadow of this supermassive black gap within the coming years. Abhijeet Borkar is a postdoctoral researcher on the Astronomy Institute of the Czech Academy of Sciences, Ondřejov.
<urn:uuid:b29a5928-536b-4073-8dc4-650e845c20de>
CC-MAIN-2021-43
https://diaspora9ja.com/the-story-of-how-scientists-discovered-the-black-hole-at-the-milky-ways-centre/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585916.29/warc/CC-MAIN-20211024081003-20211024111003-00270.warc.gz
en
0.939576
2,351
3.578125
4
WHY SHOULD I GET VACCINATED? The vaccine will help keep you from getting COVID-19 and is a much safer way to help build protection. COVID-19 can have serious, life-threatening complications and there is no way to know how it will affect you or others around you. This is an important tool to help stop this pandemic and keep everyone safe. IS THIS VACCINE SAFE? Yes. The COVID-19 vaccine was developed and tested the same way as every other vaccine used in the United States. Like all vaccines, COVID-19 vaccines have gone through a careful trial process with several phases. For every vaccine in the United States (including COVID-19), trials start with Phases 1 and 2, when small groups of people are vaccinated and then monitored. In Phase 3, tens of thousands of people are vaccinated to be sure the vaccine is both safe and effective for all types of people. After a vaccine is authorized or approved, it enters Phase 4, where long-term effects are studied. These trials, which include people at high risk for COVID-19, will help identify any common side effects or other safety concerns and will help clarify how long protection lasts after vaccination. HOW DOES IT WORK? The vaccinations being used are considered mRNA vaccines. The mRNA tells the cells to make a harmless piece called a “spike protein”. The immune system recognizes that the protein does not belong there and begins building an immune response by producing antibodies. At the end, our bodies have learned how to protect against future infection, and you will have protection without having to get sick with COVID-19. IS COVID IN THE VACCINE AND DOES IT AFFECT OUR DNA? mRNA vaccines do not use the live virus that causes COVID-19 and do not affect or interact with our DNA in anyway. The vaccine cannot give someone COVID-19. HOW DID THEY DO THIS SO FAST? mRNA vaccines are a product of decades of studies on RNA therapies and treatments and have been used to develop successful personalized cancer treatments, as well as vaccines for infectious diseases such as Zika virus. There was also a lot of groundwork laid during the search for SARS (2002) and MERS (2012) vaccines. Therefore, scientists did not start at square one. Researchers also benefited from a budget of $4.5 billion from the US government, which gave manufacturers all the resources they needed to accelerate their process. WERE STEPS SKIPPED TO GET THIS APPROVED? No steps were skipped and over 75,000 individuals of different ages, races, and ethnicities, including those with underlying medical conditions, were part of the trials for the two vaccine options available. Development of vaccines in the US are strictly controlled by the FDA, who agreed to allow emergency use of the COVID-19 vaccinations we have available today. Vaccines, regardless of timeline, must meet the highest standards of safety and have minimal side effects. The US currently has the safest, most effective vaccines in its history. HOW MANY SHOTS AM I GOING TO NEED? With the Moderna and Pfizer COVID-19 Vaccinations, two shots are needed for the best protection, which are given 3-4 weeks apart. WHY DO I NEED TWO SHOTS? The first shot primes the immune system, helping it recognize the virus, and the second shot strengthens the immune response. With the two, approximately a 95% effective rate was achieved for preventing COVID-19. The measles and polio vaccinations are two examples of vaccinations that have proven to be more effective with multiple doses. IF I HAD COVID-19, DO I STILL NEED TO GET VACCINATED? Yes. Due to severe health risks associated with COVID-19 and the fact that re-infection is possible, vaccination should be obtained regardless of whether you have already had it. Some early evidence suggests that natural immunity from having COVID-19 may not last very long. Anyone currently infected should wait to get vaccinated until after their illness has resolved and criteria to discontinue isolation has been met. WHAT IS THE COST? There will be no cost. Any administration fees can be reimbursed by your public or private insurance company. For uninsured individuals, the Health Resources and Services Administration’s Provider Relief Fund will cover any potential administrative fees. HOW OFTEN WILL WE NEED THIS? The length of protection is still being studied due to this being a new disease. We do know that COVID-19 has caused very serious illness and death for a lot of people and if you get sick you also risk giving it to loved ones who may get very sick. Getting a vaccine is the much safer choice. WHAT ARE THE SIDE EFFECTS OF THE VACCINATION? As of Fall 2020, fewer than 10% of participants experienced side effects. The most common side effect is soreness around the injection site, which is typical for most vaccines. Some people experienced fatigue, joint pain, headache, and short-term fever. This short-term discomfort is the effect of your body developing immunity and is normal. This discomfort does not mean that the vaccine has given you COVID-19. Even if you experience discomfort after the first dose of vaccine, it is very important that you still receive the second dose a few weeks later for the vaccine to be effective. SHOULD I BE GETTING THE COVID-19 VACCINE IF I HAVE OTHER MEDICAL CONDITIONS? If you have an underlying medical condition, such as diabetes, asthma, or obesity, you may be at higher risk for severe COVID-19. When COVID-19 vaccine is available, you are encouraged to get vaccinated to protect yourself from serious COVID-19 illness. WHAT THREE GROUPS OF PEOPLE HAVE SPECIAL COVID-19 VACCINE CONCERNS AND SHOULD SPEAK TO THEIR PHYSICIAN PRIOR? 1. People with weakened immune systems due to HIV or other illnesses or medications can receive COVID-19 vaccine, but they should be aware that there is only limited safety data available and that they may have a lower immune response to the vaccine. 2. People with some autoimmune conditions are also able to be vaccinated but also need to be aware of the limited safety data for people in their category. 3. People with a neurologic disease history of having previously had either Guillain-Barre syndrome or Bell’s palsy can receive COVID-19 vaccine but need to be closely monitored for the re-development of one of those conditions. I HAVE ALLERGIES NOT RELATED TO VACCINES, SHOULD I GET THIS? CDC recommends that people with a history of severe allergic reactions not related to vaccines or injectable medications—such as food, pet, venom, environmental, or latex allergies—get vaccinated. People with a history of allergies to oral medications or a family history of severe allergic reactions may also get vaccinated. WHAT IS IN THE VACCINES? THE PFIZER-BIONTECH COVID-19 VACCINE... includes the following ingredients: mRNA, lipids ((4-hydroxybutyl)azanediyl)bis(hexane-6,1-diyl)bis(2-hexyldecanoate), 2 [(polyethylene glycol)-2000]-N,N-ditetradecylacetamide, 1,2-Distearoyl-sn-glycero-3- phosphocholine, and cholesterol), potassium chloride, monobasic potassium phosphate, sodium chloride, dibasic sodium phosphate dihydrate, and sucro. THE MODERNA COVID-19 VACCINE... contains the following ingredients: mRNA, lipids (SM-102, polyethylene glycol [PEG] 2000 dimyristoylglycerol [DMG], cholesterol, and 1,2-distearoyl-sn-glycero-3-phosphocholine [DSPC]), tromethamine, tromethamine hydrochloride, acetic acid, sodium acetate, and sucrose. WHO SHOULD NOT GET VACCINATED? • People who are allergic to polyethylene glycol (PEG), polysorbate, or any ingredient in the vaccinations (listed above) should not get an mRNA COVID-19 vaccine. • People who have severe allergic reactions or immediate allergic reactions such as hives, swelling, or wheezing (respiratory distress) within four hours to the first dose of the vaccine, should not get another dose of an mRNA COVID-19 vaccine. • Individuals under 16 years of age for the Pfizer vaccination and under 18 years of age for the Moderna vaccination should not be vaccinated. WHAT SAFEGUARDS ARE IN PLACE DURING ADMINISTRATION? All individuals will be monitored on site for at least 15 minutes after getting the vaccine. If there is a history of severe allergic reactions to injections for the individual, they will be monitored for at least 30 minutes. Trained emergency personnel will be available with appropriate medications and equipment, such as epinephrine, antihistamines, stethoscopes, blood pressure cuffs, and timing devices for pulse checks. I AM PREGNANT OR LACTATING, SHOULD I GET THE VACCINE? Yes. The American College of Obstetricians and Gynecologists recommend that COVID-19 vaccines should not be withheld from pregnant individuals who meet criteria for vaccination. COVID-19 vaccines should also be offered to lactating individuals like non-lactating individuals when they meet criteria for receipt of the vaccine. Several vaccines have safely been given to pregnant and lactating individuals for decades. HOW ABOUT PLANNING TO BE, IS INFERTILITY AN ISSUE? Given the mechanism of action and the safety profile of the vaccine in non-pregnant individuals, COVID-19 mRNA vaccines are not thought to cause an increased risk of infertility. WHAT IS THE VACCINATION PROCESS FOR HEALTHCARE PERSONNEL/EMPLOYEES? We are in constant contact with the local health department and are providing them lists of individuals who are willing and eligible to become vaccinated as requested. Please be sure you’ve taken the vaccination survey. When vaccination resources within the local health department become available, the employee is then loaded into a system called Vaccine Administration Management System (VAMS). When this occurs, the employee will receive a registration email sent to them from [email protected] with a link to register their account (please be sure to check the junk or spam folder). The employee will then use their VAMS access to register, schedule an appointment, track the follow up vaccination, and receive proof of vaccination. An email is required for anyone to be vaccinated during this phase.
<urn:uuid:d9d53563-130b-4dff-9379-3bdbf3649c21>
CC-MAIN-2021-43
https://www.careadvantageinc.com/covid-blog/covid-19-vaccination-faqs
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585828.15/warc/CC-MAIN-20211023224247-20211024014247-00430.warc.gz
en
0.936483
2,268
3.5
4
Who's Behind Listverse? Jamie founded Listverse due to an insatiable desire to share fascinating, obscure, and bizarre facts. He has been a guest speaker on numerous national radio and television stations and is a five time published author.More About Us 10 Crazy Things You Should Know About Our Solar System When most of us were in school, we learned about the differences in gravity between planets in our solar system. We also learned about how enormous the Sun is and that the gas giants are prone to some seriously unusual storms. But over the course of the last few years, modern astronomy has evolved, revealing our solar system to be more peculiar than we ever imagined. 10 The Crazy Surface Of Mars Mars is seriously misunderstood. Most of time—in the media—astronomers are discussing the possibility of Mars once being home to oceans of liquid water or ancient forms of bacteria. Most recently, it was revealed that the most primordial forms of earth microbes likely originated on Mars—before they were transferred to Earth via asteroid impacts. Rarely do we see some of the mind-blowing images of the most bizarre surface features Mars has to offer, which is a shame, since most of these images would reinvigorate interest in Mars—a planet with an exciting past. Since the Mars Reconnaissance Orbiter began orbiting the Red Planet in 2006, its HiRISE camera has unveiled some of these incredible regions. One of the most incredible of these depicts trails left by massive dust devils, the Martian equivalent of tornadoes. They carry away the outermost layer of iron oxide (the agent responsible for the reddish hue of the soil), revealing the dark grey color of the basalt located just underneath. 9 The Missing Planet Astronomers have long seen a discrepancy in the orbits of the outermost gas giants, particularly since they seemingly contradict most of our models that depict the early years after our solar system’s formation. The idea is that, at one point, our solar system was home to a rather large planet—containing the mass of more than a dozen Earths. The planet in question—sometimes called Tycho—was likely flung out of our solar system and into interstellar space billions of years ago, where it will roam the celestial ether until the end of time. This theoretical planet would have been located billions of miles beyond Pluto in a region that receives little illumination from the Sun. Its orbit would also have been highly elliptical, taking millions of years to complete one full orbit around the Sun. Taken together, these factors could partially explain why such a planet has never been detected. 8 Diamond Rain On Neptune And Uranus Other than the mystery surrounding their eccentric orbits, the planets also have magnetic poles that are misaligned by as much as 60 degrees from their geological poles. One explanation for this is that the planets once collided with—or consumed—an unknown planet, but another theory (one that is more logical) suggests something much cooler. Based on the information about their strange inclinations and their large concentration of carbon, astronomers believe that Neptune and Uranus are home to enormous oceans of liquid carbon, with solid diamond icebergs floating on top. Tiny diamond bits could also fall on these planets like rain. 7 Earth Is Shrouded By A Halo Of Dark Matter Dark matter is one of the most profound mysteries of modern cosmology. Astronomers know that we’re missing the key calculations needed to decipher its exact properties, but it’s known to make up a huge fraction of the overall mass of the universe. Currently, we do know some of its behaviors. Particularly, dark matter acts as an anchor to keep galaxies and solar systems from flying apart. As such, dark matter also plays a role in the inner workings of our solar system, which is particularly noticeable when observing its effects on space-based technologies. One keen observation, known as the flyby anomaly, notes that some of our spacecraft and satellites inexplicably change orbital speeds when traveling to or away from Earth. The theory for this discrepancy says that Earth itself is enshrouded by a huge halo of dark matter. If it were visible at optical wavelengths, it would appear similar in size to Jupiter! 6 On Titan, You Could Strap On Wings And Fly Titan, a moon of Saturn, is one of the most fascinating places in our solar system. Not only does it rain a gasoline-like substance, but the moon also has large concentrations of liquid methane and ethane, which can be seen on its surface. But there’s one bit of information that should convince you to spend a day exploring Titan—thanks to a combination of low surface gravity and the low atmospheric pressure, if humans visited Titan equipped with an artificial set of wings, we would be able to take flight. Granted, you’d still die without the proper equipment, but what’s breathing compared to flying anyway? 5 Our Solar System Has A Tail A month ago, NASA revealed that one of its missions had successfully mapped the tail of our solar system, discovering it looked similar to a four-leaf clover. The tail, dubbed the heliotail, is comprised of neutral particles that can’t be seen through traditional means. As such, specialized instruments were needed to properly image the particles before scientists subsequently pieced the separate images together to produce a coherent picture. This picture revealed that the heliotail extended more than 13 billion kilometers (8 billion miles) beyond the outermost planets, with fierce winds causing the material to stream in every direction—traveling at more than 1.6 million kph (1 million mph). 4 The Sun’s Magnetic Field Is About To Flip The Sun is actually pretty predictable. It goes through a continuous 11-year cycle, in which solar activity peaks before declining again, culminating in the Sun’s magnetic field flipping its polarity. According to NASA, all signs point to this event occurring very soon—perhaps in the next few months. The north pole has already begun its changes. When this happens, don’t expect fiery doom to rain from the sky. The flip just signals the second half of solar maximum, when the Sun sees an increase in sunspot activity. 3 We’re Surrounded By Black Holes Black holes come in several varieties. First, there are stellar-mass black holes—the most common type—which form when massive stars collapse. This occurs when a star no longer has the necessary hydrogen for nuclear fusion, causing it to resort to burning helium. This causes the star to become unstable, resulting in one of two scenarios: contraction into a neutron star or collapse into a black hole. Eventually, many of these black holes merge, combining to form a supermassive black hole, and our galaxy—like millions of others—orbits a central supermassive black hole. Another type of black hole, called a micro black hole, might bombard Earth constantly. These tiny, atom-like singularities can theoretically be produced in particle accelerator collisions when proton beams are slammed together at near-light speed. There’s need to worry though. In most cases, they evaporate immediately without doing any damage. Even if they didn’t, it would still take a significantly longer time than the universe’s current age for a micro black hole to consume a single atom of matter, let alone an object with as much mass as Earth. 2 The Sun Could Fit In Jupiter’s Magnetosphere Jupiter is the king of our solar system—with enough room to accommodate approximately 1,400 Earths. The only thing larger than Jupiter is the Sun. Jupiter’s magnetosphere (magnetic field of influence) is the largest and most powerful magnetosphere in our solar system (even stronger than the Sun’s). Jupiter’s magnetosphere could easily engulf the Sun itself (with some room to spare), including the entirety of the Sun’s visible corona. To make that a bit more accessible (if the above image somehow doesn’t impress you in terms of size comparison), if we could see the magnetosphere here on Earth, it would look bigger than the full moon in our sky. Furthermore, some parts of the magnetosphere have temperatures hotter than the surface of the Sun. 1 Weird Life Could Exist On Gas Giants Once upon a time, our list of key components needed for life to form were much more stringent. These days, we know things aren’t that simple, especially upon the discovery of certain bacterium thriving in deep geothermal vents on the ocean floor, where the temperatures can exceed boiling. Regardless, when you think of life, Jupiter likely isn’t the first place that comes to mind. It’s essentially a giant cloud of gas, right? There’s just no way life could develop—let alone thrive—there. As it turns out, that could be wrong. An experiment done in the early ’50s—known as the Miller–Urey experiment—demonstrated that we can generate organic compounds, a prerequisite to life, with little more than lightning and the right chemical compounds. Considering this information and the fact that Jupiter already meets several requirements, such as having water (Jupiter may even have the largest ocean of water in our solar system), methane, molecular hydrogen, and ammonia, it’s possible the gas giant could foster life. That said, Jupiter has the highest atmospheric pressure of any planet in our solar system. It also has strong winds that could hypothetically help circulate the appropriate compounds. All of this indicates that life would have a hard time getting the necessary foothold, but many have suggested that certain ammonia-based life forms could thrive in the cloud deck that makes up the upper atmosphere—the region in which the temperature and pressure would allow for a layer of liquid water to remain. While it’s still outside of the realm of theoretical astrobiology, Carl Sagan was a huge proponent of this idea, not ruling out the possibility of extreme forms of life based on our limited knowledge. In his view, the life-forms living in Jupiter’s atmosphere would be diverse. There would be sinkers, floaters, hunters, and scavengers, each playing a necessary role in their own Jovian food chain. Jaime devotes all of her time toward writing about the various wonders of the universe (on top of writing for a slew of science-based organizations). Those of you with the same keen sense of admiration should join her.
<urn:uuid:763e080b-e0ea-41cc-8a52-f263366d9f44>
CC-MAIN-2021-43
https://listverse.com/2013/09/13/10-crazy-things-you-should-know-about-our-solar-system/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00350.warc.gz
en
0.943817
2,169
2.96875
3
Victorianism in Sense and Sensibility and The Scarlet Letter 1. Compare and contrast between the female protagonists in the novel “Sense and Sensibility and “The Scarlet Letter.” 2. How do you access the quality of Victorianism in the novels “Sense and Sensibility” and “The Scarlet Letter.” 1. Compare and contrast between the female protagonists in the novel “Sense and Sensibility and “The ScarletLetter.” 2. How do you access the quality of Victorianism in the novels “Sense and Sensibility” and “The ScarletLetter.” John Dasharod Mrs. Dasharod Fanny Dashwood Elinor The victory of the reason and the defeat of the facility of emotion is the same in the case of the novels “Sense and Sensibility” and “The ScarletLetter.” Where apart from sane of the similarities these novels also share some of the differences. In both novels the characters who support the reason are victorious, and at the same time the use of emotion causes the degradation in the life of the female characters. In “Sense and Sensibility”, Elinor is in love with her cousin Edward but her love is not guided by the emotion and over sentimentality, Rather she is capable to control her emotions. Time and again Edwards activity tortures her but she does not give anyone the hint that she is tortured. Even in the conversation with adward she does not exceed over the liminality of the situation. In other words when she is in with contact of Edward she presents herself as a rational character. Her action to console Marianne in the time of Willoughby’s betrayal, her auctions of maintaining the balance between the pre-occupation of Colonel Brandon towards Marianne and Marianne’s direct rejection of Brandon, and at the same time her behave with her mother and her dialogues present that she is a rational character who does not exceed the limit of rationality. The news of Edward’s massage with Lucy stale is the situation of heart rending. In this situation she might have been suffered from that anxiety but she does not let her anxiety manifest on the level of surface. In the anxiety manifest on the level of surface. In the situation she becomes repressive towards her internal feelings only to prove her rational character. But in contrast to Etinor, Marianne is a girl to passes to the faculty of sensibility or emotion. She gives free rein to her emotion which makes her surrender to the sexuality of John Willoughby. Her emotionality and sentimentality emerges from her reading of romantic novels which makes her, what to entice man. Her first meeting with Willoughby immediately changing in the love, her direct rejection to the Colonel Brandon, her criticizing of her sister for not choosing a romantic her and her flirting nature with her male partner are the sinister (o men) to show her dark future. Because of her lack of reasoning faculty se fails to choose the appropriate male partner which becomes a matter of trageoly for her. After Willoughby’s betrayal she is compelled to choose the fellow whom she had rejected in the past. Her failure is the failure of emotion and sentimentality. Likewise, Hester Prynne in “The ScarletLetter” is a female of male dominated society to counter the male dominated ideology. When her husband Roger Chillingworth becomes old and bookish to fulfill her passion, she comes to the conclusion to rank Roger Chillingworth as a criminal because his out of avoiding himself from the duties that he has to perform upon her. Because of this decision, She is deterred to choose another male partner, where Arthur Dimondale becomes the victim from whom Hester Prynne conceiver Pearl. The strict Puritan society cannot digest her revolutionary struggle which makes her climb on the Scaffold and wear the ScarletLetter ‘A’ which is the symbol of public defaces. But the physical isolation from the society does not make her weak because she is psychologically bold and she determines that one day she will be successful to the worn out rule and regulations a patriarchy. her act of involving n the public warfare finally regains her lost fame. In The Scarletletter also becomes the symbol of prestige. Her action to protect the lover, her activities to use the faculty of reasoning and her determination make her the heroin of the novel. In contrast to the per-marital love relationship of “Sense and Sensibility”, “The ScarletLetter” exposes the extra-marital love relationship. The character of Elinor and Hester Prynne in the novels “Sense and Sensibility” and “The ScarletLetter” respectively show how a person psychologically strong and mentally capable becomes victorious at the end despite the several ups and dorwns. But the character of Marianne in the “Sense and Sensibility” shows what will be the situation of a teenier girl if she gives free rein to her emotion and sentimentality. In the novel “Sense and Sensibility” we do not have any implication of sexual relationship but we have it in the context of “The ScarletLetter.” In conclusion, the demination upon the female character, the reification of them, the vitorian setting, the female heroine and the victory of the uses of the mind and the defeat of the people of sensibility are the common elements in the novels “Sense and Sensibility” and “The ScarletLetter”, but in contrast to the pre-marital level relationship having multiple heroines without any implication of sexual relationship in “Sense and Sensibility” and “The ScarletLetter” is an epitome -vDjf_ of the extra-marital love relationship having a single heroine where the love relationship is coloured by sensuality and passionate afffairs. Sense and Sensibility Mr. Dashuood Mrs. Dashuood John Dashuood Elinor Fanny Dashuood Margaret Lady Middleton Sophia Grey colonel sir John Middleton manages the Barton cottage. They were living in northern part before they got Barton cottage 1. Victorian Novel 2. Narrative technique 3. Delineation of female 4. Irony 5. Topic tracking 6. Compassion between the female character. Money Romance hierocracy 7. Role of females in the novel 8. Compressions between the Victorian life seen in the novel and present post-modern life. i. Women not allowed to work Now (Pomo) ii. domination, not economic freedom ii. Individual family iii. Joint family iii. Individuation (Sarah) iv. The love and marriage were controlled by the experior members iv. Disruption of the hierarhy by the help of cultural indistry. v. Division of the social class high, medium, law v. No chastity Victorian Novel (Social Realism) in sense and sensibility. - Industrialism leading to the money minded rationality focusing upon the utilitarianism - Search for money good spouse, Christianity. - Victorian optimism (due to industrialism) - Victorian pessimism (due to industrialism) - Protective husband, submissive life, obedient child i. Edward’s betrayal of Elinor ii. John Dashuood betrayal of his step mother an half sister iii. Willoughby betrayal of Marianne iv. Lucy’s betrayal of Edward. - It is written in 3rd person paint of view - Elinor is the pivotal element on which must all the incidents veer. - Though the novel exposes the third person paint of view all the actions and incidents veer around the character of Elinor who combine sense and sensibility. - Tracking the novels into - Money Romance HyporacyThe story of “Sense and Sensibility” is told from the third person point of view especially concentrating in the character of Elinor where the novelist at the sometime evokes the story of money, romance and hypocracy by bifurcation the Victorian society into the sense and sensibility through the presentation of the victory of those characters who combine the element of sensibility and sense with the rein of the former by the latter. Though the novel is produced in the cursor line between the Neo-classicism and romanticism, it’s confirmation of the Victorian values developed between 1837-1901. In the whole story of the novel we find the novelist’s sympathy as well as empathy in the character of Elinor. Elinor behaviour to balance between emotion and reason proves her to have what Schiller calls the “Play drive” or she is proved to be the “Superman” in her combination of sensuality of emotion and rationality of mind. The secret behind the writer’s faith in Elinor is to advocate for the combination of the sense and sensibility which will heal the human beings from what Schiller call “The Sickness of Modern Science and Civilization”. This character of Elinor serves as the antidote to save the human beings from being mechanical without the emotional capabilities. This tendency leads Jane Austen to rack her narrative in the modes of monody, romance and hypocracy. There parallel stories are being told at the same time which is also one of the narrative techniques in the novel. The story of money, the story of romance and the story of hypocarcy forwai together in the novel with crisis-crossing each other John Dashuood’s betrayals of his step-mother and half sister, Willoughby’s deception of Marianne and is being deceived by Sophia Grey in the marital life and the relationship between Edward, Robert, their mothers and luck Steele being dismantled are the examples of the story of money minded rationality which is an infection for the wealthy and Elinor and Brandon and Marianne constitute a reparator story of love and Romance, Likewise, the snobbish nature of John Dashuood, lady Middleton and Mr. Palmer in saying one thing but doing another thing also constitute a separate story of hypocracy. Finally, though these are reversal stories and several characters, the main narrative focus of the novel lies in the constitution of the separate ideologies of sense and sensibility. The valorizers of sense and sensibility are the victor where as the persons to emphasize the sensibility over the sense are the vanquished though Edward ultimately achieves the heart of Elinor, and though Marianne and Willoughby ultimately united with colonel Willoughby are ultimately united with colonel Brandon and Sophia Grey respectively, they are proved to be vanquished because they either have to compromise at the last or they have to suffer ether their marriage. This defeat in the characters of Edward, Marianne and Willoughby is the result of the emotion they valorize. Counterpart to the story of sensibility, the narrative mode moves along with the story of the victory of sense. The self command, self restraint and the emphasis to control the emotionality using the weapons of sense or reason found in the character of Elinor and colonel Brandon is victorious in the novel. As a result of this Eliner’s will and Colonl’s desir eto be bounded in the matrimonial alliances with Edward and Marianne respectively gets fulfilled. In conclusion, the narrative mode of “Sense and Sensibility” in reconciling the Neo-Classical rigidity upon the reason and Romantic over emphasize upon the emotion with the cross-crossing parallel stories of money, Romance and Hypocarcy ultimately, are bifurcated into the sense and sensibility where the characters having the capacity to control the emotionality with reason are the victors and others are vanquished who promoted or give free play to their senses, in which the satire and irony are prominent in the development of the story having the characters with one intention but achieving the another.
<urn:uuid:51fe095b-08bd-4af1-af00-902f1e050d88>
CC-MAIN-2021-43
https://dotnepal.com/victorianism-in-sense-and-sensibility-and-the-scarlet-letter/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00669.warc.gz
en
0.943178
2,483
3
3
Environment and International Relationships By Ismaël El Yamani - Analyst, Ambassadeurs de la Jeunesse Since the Permian period, 250 million years ago, around 90% of the Earth species have been extinct. Since 1880, temperatures have risen by 0.9°Cwith sea level rising at 17.78 cm, which means that today Atmospheric CO2 is 408.53 ppm, which is higher than the period of pre-industrial revolution. Moreover, 16 of 17 warmest years occurred in the 2000's causing the loss of 281 Gigatons of ice in Greenland and 2016 was the hottest year on record. Thus, what we call climate change can be defined by the abrupt rise of temperatures due to human activity and 97% of the scientists working on this field of expertise agree on this definition. What could be the link between environmental issues and international relationships ? Through the facts described in this article, we will see that the link is strong and that many decisions to limit the consequences of rising temperatures are of a geopolitical nature. Countries including the powerful ones have their share to play and some carried out courageous local actions. Environment and America - Costa Rica : An ecological model in Latin America "Half of our territory is covered by forest and we have an ample system of protected areas that not only protect an important part of the planet's biodiversity, but also sustain important sectors of our economy, as for example tourism"said Carlos Alvarado, President of Costa Rica. Indeed, this country, that is the first to have abandoned its army in 1948 under Jorge Fernandez Ferrer rules due to a civil war, has an area 10 times smaller to that of Spain and 25 times to that of Peru. It is however currently positioned as an ecological model in Latin America. Costa Rica concentrates 5% of the world's biodiversity, runs on 98% of renewable energy and tries to decrease deforestation. As a matter of fact, a National Forest Finance Fund has been created, it is fed by resources coming from volunteer farmers willing to protect their environment and some companies aware of environmental problems. The forest coverage went from 21% in 1987 to 52.3% in 2019. Costa Rica has an annual economic growth of 4% since 2000, which is higher than other Latin America or OECD countries. It is ranked 31st in the Legatum Prosperity Index and has a life expectancy higher to that of the US. However, numerous challenges await this exemplary country. It is ranked 78 on GDP per capita worldwide and is the 5th in Latin America with a GDP per capita of 40% of the average OECD countries; public debt doubled in 10 years with 1 out 3 dollars used to fund the 7.2% deficit. While in 2008, taxes financed 70% of all Central Government expenditures, in 2017 they were only enough to finance 50% and the difference had to be covered with indebtednessdeclared Jorge Corrales Quesada, economist. However, the tax on corporate rate is one of the highest of the world with 30% whereas the labor participation rate is low which might be an explanation. Recent reports about the surge violence in the country worried the government for which drug trafficking is the main cause. Finally, the victory of Carlos Alvarado should not make us forget that an evangelical pastor named Mauricio Alvarado won the first round of the February elections with radical discourses. Unleash angry and radical speeches that are also found in the greatest power in the world. - President Donald Trump and the environment "The concept of global warming was created by and for the Chinese in order to make U.S. manufacturing non-competitive," declared President Donald Trump in 2012. When he arrived in the White House, President Donald Trump decided to name Scott Pruitt -that asserts publicly his denial of humans causing climate change-, as head of the Environmental Protection Agency (EPA). Scott Pruitt has begun slowly to dismantle the organization by rewriting the government's rulebook on environmental regulations ;and he has cut funding for several programs deemed not useful. He had to resign in 2018 as he was facing to numerous ethics investigations. Andrew Wheeler, a former coal lobbyist replaced him and he continued a policy, which weakened the EPA. In the same time, President Donald Trump strengthened the part of fossil fuel and the oil industry in the energy. He declared the following executive order : "The heads of agencies shall review all existing regulations, orders, guidance documents, policies, and any other similar agency actions (collectively, agency actions) that potentially burden the development or use of domestically produced energy resources, with particular attention to oil, natural gas, coal, and nuclear energy resources". President Donald Trump assertion is that climate change means a loss of jobs; however, now US clean energy jobs surpass fossil fuel jobs by 5 to 1. Moreover, despite the US President pledge to focus on American resources to strengthen American industry, Keystone, the new US pipeline will use steel from Canada and not from the US. The energy policy of President Donald Trump that focused on fossil energy could also affect health of American people. Canada oil pipelines spilled 2,000,000 liters on aboriginal land; an Iowa pipeline leaked nearly 1,400,000 gallons of diesel (64,000,000 L) and another one leaked 18000 gallons (82,000 L) of crude oil onto Kingfisher co farmland. Indeed, these elements demonstrate possible harmful effects for crops and people living in these areas. As President Donald Trump won Iowa in 2016, the possible environmental consequences of his energy policy might prevent his potential reelection in this state. Last but not least, President Donald Trump also reversed an executive order of former President Barack Obama which would have made it possibleto respect the US commitments regarding the Paris Climate Agreements. Yet, it might be accurate to state that President Donald Trump harms the environment but protest marches against his environmental policy are also the existence proofs of an alternative thought in the US, despite the huge place taken in this country by cars as a means of transport. Geopolitics of cars, sustainability and cities - The decline of cars "When you put all these trends together, you're going to see a cap on personal vehicle ownership start to emerge. We are near "peak car"", declared Trevor Noren, Director at 13D Global Research & Strategy. The "peak car" concept is defined by a maximum of vehicle sales achieved during a fixed period with evidences coming from R&D, needs and consumer appetite that show that they can only decrease. Indeed, there are around 75 million cars sold worldwidesince 1990 with 15 million of employees in automotive sector, knowing that this industry spends more than $100 billion in R&D. German automakersplan to spend $45 billion on electric vehicles in the next three years and Volkswagen, the giant of the German automotive industry, is the third world company in terms of expenditurein R&D behind Google and Apple. The "peak cars" advocates esteem that cars become useless in a context where there is a plethora of modes of collective transport and services such as Uber and Lyft. In addition, competition is fierce since Google and Microsoft are planning on investing massively on autonomous vehicles. However, this picture of radical change in the automotive industry needs to be qualified. Indeed, in 1985, in China, there were less than 3% of car owners in the country and they were mostly high ranked officials of the Chinese government. The number of cars in China was less than in London. However, since 1994, China has become the world's largest market that reached 28 million sales in 2016 which is 11 million of cars sold more than in the US. General Motors, the US giant sold more cars in China than in the USA. Due to environmental issues such as air pollution, China proposed a policy aimed at restraining cars sales. Thus, auctions for license plates in some important Chinese cities such as Shenzhen, Beijing or Guangzhou are proposed. It also plans to take up to 6 million vehicles/year that don't meet emission standards off the roads. All these improvements have been possible throughout the growth of the Chinese middle class driven by raising awareness on environmental issues. By 2050, 70% of the world population will live in urban areas. For instance, currently in Japan, more than 90% of Japanese live in urban areas, 30% of them live in the greater Tokyo. The city has 38 million inhabitants and the motor vehicles per 1000 inhabitants are higher than in China with nearly steady sales. "Right now, everyone still hopes to sell more cars. I haven't come across a single company that forecasts a decline," says Philipp Kampshoff, a McKinsey partner who specializes in transportation.However, with more than 1.3 billion inhabitants, India piped Germany and became the 4th largest automotive market; the Japanese juggernaut Suzuki owns 50% of the Indian car market. The government plans on building 20,000 km green roads. Last but not least, the 1.1$ billion invested by Daimler, BMW and Tesla to implement in China electric car factories to take into account the Chinese government ambitions towards climate change. These figures show us not only that the car industry is not in decline in the big countries but that new markets are to develop for greener automobiles, even if the situation could be questionable in other part of the planet. - The war against cars "Más vida, menos humos"declared the Mayor of Madrid about her policy to forbid to use cars that are not hybrid. Indeed, pollution caused the death of 7 million people in the world and concomitantlythe number of people using cars increased heavily in some cities such as Mexico where it has multiplied by 2.5 in 22 years. The objective of numerous cities is to reduce the car traffic. The Madrid system generated many negative externalities. The system is very rigid and make difficult the movement of people, it doesn't reduce car traffic since hybrid cars replace classical ones, and doesn't give to the city council the opportunity to invest in public transport. Londonand Milan opted for an alternative solution. The two cities propose to charge the car users when entering in some areas. Milan even invented an "Area C" where cars are totally forbidden. Manhattan plans to apply this congestion pricing policy around 2020-2021 and the fee should cost from 10 to 15$. In Shanghai, license plates cost around 150,000$ ; it is part of a larger lottery system that is generalized in Beijing. These high prices are due to the rarity of license plates. Indeed, in Beijing only 6460 license plates were available for 12 million of Chinese participants willing to get one. Guangzhou chose to implement a three pillars system: car auctions, public lottery and environmentally friendly measures. The localities used money coming from auctions to improve the roads and public transports. In 1975, the government of Singapore created The Singapore Area Licensing Scheme (ALS).The purpose of this policy was to regulate car traffic with the concept of supply and demand. The supply is the available roads in Singapore and the demand is the traffic density. The more drivers there are on the roads the higher is the price to use them. Restricted Zone of 2.0 square-mile central was identified in the business area as well as a pricing period between 7:30 and 9:30 in the morning; this system was a success as the traffic decreased by 44% from the first year of application. In 1998, the Electronic Road Pricing (ERP) replaced the ALS system; the new system is based on a coast that could vary every hour or even half hour depending on the supply and demand, it reduced by 10% to 15% cars congestion. As seen previously, global warming affects humankind in a largest scale; it could provoke many changes such as scarcity resources, drought, frequent hurricanes, etc. China has taken some initiatives in order to limit the consequences of temperature increase, knowing that the majority of people live close to sea or rivers such as Mekong, the Red River or the Irrawaddy where the consequences of rise of the water level could be terrible. Waves of refugees or failed states could occur in some Asian countries such as Vietnam and lead to important threats such as piracy. The case was demonstrated in Africa where Cameroon, Ethiopia and the conflict belt that links the two countries led to a huge violence and might impede the regional development. Other countries might be the winner regarding increase of temperatures: Russia could access more easily to the oil in Alaska via the Bering Strait; Denmark or Canada could be advantaged for agriculture. Indeed, some of those countries are the top wheat producing and occurrences of drought and flooding in other parts of the world could enhance this position. Last but not least, the military also alerted the White House on the effects of climate change on the world. The possible regional conflicts could push the US to intervene more frequently in the world. The opinions in this text are the sole responsibility of the author © All rights reserved, Paris, Ambassadeurs de la Jeunesse, 2020. How to cite this publication : Ismaël El Yamani, « Environment and International Relationships », Ambassadeurs de la Jeunesse, April 18, 2020.
<urn:uuid:5fb98495-82db-4aba-ae91-708bf08fa4e6>
CC-MAIN-2021-43
https://www.institut-ega.org/l/environment-and-international-relationships/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00550.warc.gz
en
0.959551
2,678
3.21875
3
(1815 - 1883) Anthony Trollope was born on 24th April 1815 in Bloomsbury, London. He was the fourth son of Thomas Anthony Trollope and Frances (née Milton). His father, who suffered from bouts of depression, was an unsuccessful lawyer and farmer. The family's humiliating state of poverty formed a lasting impression on Trollope, who was a tall, poorly dressed unhappy lad amongst the aristocratic youth of the famous schools he attended. In 1827, while Trollope attended his father's old school, Winchester, his mother left for America to assist in the set up of an English goods bazaar in Cincinnati. It was a total failure, pushing the Trollope family to the last stages of financial ruin. The family moved to Bruges in Belgium in 1834, where Frances supported the family with her writing which she was quite successful at. Her Domestic Manners of the Americans (1832) was well received in England. Trollope's father Thomas died in Bruges in 1835. His older brother Henry and his younger sister Emily died in Bruges too the following year. Trollope started work as a clerk with the post office when he was nineteen years old and in 1841 he became the postal surveyor for Banagher in Ireland, which finally gave him some financial freedom and self-confidence. He travelled to Egypt, Scotland and the West Indies in 1858 and 1859 and the United States in 1861 on postal missions. In 1859 Trollope moved to Waltham Cross, just outside of London, to be surveyor general to the Post Office for £800 a year. Trollope is credited with the introduction of "pillar boxes", the now ubiquitous red British postal mail boxes. In 1844 Trollope married Rose Heseltine and they had two sons, Henry (born in 1846) and Frederick (born in 1847). Trollope's study into Irish discontent, The MacDermots of Ballycloran (1847) was his first book, however, while in England he wrote The Warden (1855) the first of his famous Barchester Chronicles series, based on English upper middle-class Victorian life, which was his first acknowledged success. Barchester Towers (1857), Doctor Thorne (1858), Framley Parsonage (1861), The Small House at Allington (1864), and The Last Chronicle of Barset (1867) completed the series, readers especially enjoying his intense study of everyday social life, ecclesiastical politics and character developments in the imaginary cathedral city (modeled on Winchester) and the surrounding county of Barchester (modeled on Somerset). Trollope was then successful and prosperous and became friends with many literary figures including W. E. Forster, Wilkie Collins and George Eliot. He was involved in some business dealings concerning various magazines and gazettes and even tried his hand at editorship for St. Paul's Magazine in 1867. Trollope's Palliser series: Can You Forgive Her? (1864), Phineas Finn (1869), The Eustace Diamonds (1873), Phineas Redux (1876), The Prime Minister (1876) and The Duke's Children (1880) were well-received, and he also produced insightful novels on political and social issues of the day during this time. In 1867 Trollope resigned from the post office and unsuccessfully ran an election campaign as a Liberal parliamentary candidate. In 1871 to 1872 he gave up his Waltham house and traveled to visit his son in Australia, tirelessly writing along the way. In 1872 he moved back to London, following his strict regime of writing for many hours before breakfast, whether he was travelling to Ceylon and Australia in 1875, South Africa in 1877 or Iceland in 1878, or writing at home. He was also working on his Autobiography (1883) between October 1875 and April 1876 (published posthumously). His diligent, business-like approach to writing, as was revealed in his Autobiography offended many and he fell out of favour with some of his admirers after his death. Trollope moved again in 1880 for want of better air, with hints of asthma and angina pectoris. He produced a few more novels the next year, one of them being The Plumber (1881). In May of 1882 he was staying at Garland's Hotel in Pall Mall, London. On the 3rd of November, 1883, whilst laughing during a family reading of F. Anstey's Vice Versa, he suffered a paralytic stroke. He died about a month later, on 6th December 1883. He is buried in the Kensal Green Cemetery of London. Anthony Trollope was one of the most popular and prolific Victorian novelists, producing 47 novels and numerous essays and short stories. The Warden : (Le Directeur) 1855 This novel is an excellent introduction to Trollope because of its relative brevity. It was his first novel to win significant acclaim, in part because the titular Warden struggles so realistically and charmingly with the moral dilemma he faces. This is also the first of the Barsetshire novels, a series set in a cathedral town and revolving around clergymen and their families. In the 15th century, Hiram's Hospital was established as a perpetual charitable home for 12 poor old men, each being replaced at his death. Over the years the income from the property of the estate has increased to the point where the warden of the hospital enjoys a substantial salary.The Rev. Septimus Harding (the Warden), kind, gentle, and conscientious, loves his comfortable position and is loved by the old men under his care - until his life is disrupted by a Reformer, in the person of young John Bold, who questions the ample income of the warden, while the old men still receive only pennies a day. Bold brings in a solicitor and interests the newspaper The Jupiter (obviously the London Times), which makes the issue a national debate.Although the church stands behind the warden with all its influence, the gentle Mr. Harding himself begins to doubt the propriety of his position. The matter becomes further complicated when Bold and Harding's daughter Eleanor fall in love.This first of the six Barsetshire novels is by far the shortest and concentrates almost exclusively on the main plot. (In fact, Trollope inserts a criticism of the long serial novels of the day, although he later adopted that same mode.) "The Warden" is not so rich in detail or in the extensive cultural ambience of the later novels, but it is an excellent introduction to this deservedly acclaimed series. It introduces many vivid characters who grow and develop delightfully in the later novels. The Small House At Allington : 1864 It is Anthony Trollope's fifth novel in the sequence that has become known as the Barsetshire series. Set against the vividly imagined backdrop of the cathedral town of Barchester, it is the story of the embittered old bachelor Squire Dale and his impoverished nieces, Lily and Bell. Lily Dale is sublimely happy when she becomes engaged to Adolphus Crosbie, assistant secretary in a government agency and a mortal Apollo to Lily. And Crosbie is happy too--while he is with Lily. But when he is invited to spend a week at Courcy Castle and is looked upon with favor by Lady Alexandrina De Courcy, the temptation to marry into a noble family is too much for him, and he becomes engaged for the second time in a few weeks.John Eames, a young government clerk, has loved Lily Dale for years. He longs to replace Crosbie in the jilted girl's affections, but she still loves Crosbie, despite his treachery. The ambitious Crosbie, however, soon finds that his aristocratic bride brings no money into the marriage, but maintains her expensive tastes. The marriage is a disaster from the start.As John Eames' fortunes rise and Crosbie's decline, the reader is led to believe, as all Lily's friends urge, that Eames will eventually win the heartbroken lass, but Lily stubbornly clings to her hopeless love.There are several subplots, some of them humorous, as Trollope's settings range from castle to rooming house, with vivid characters from varying social strata. As always, the characterizations are thorough and convincing. These are real people who behave realistically. Even when their actions seem surprising, they flow logically from the strong personal basis which the author has built into each character. Although the outcome is not nearly so pleasing as that of "Dr. Thorne," for instance, this book is a solidly enjoyable novel from one of the greatest literary series. Miss Mackenzie : 1865 Margaret Mackenzie, unattractive and colourless at thirty-five, inherited a small fortune at the death of her brother, and for the first time in her drab existence was free to seek some measure of happiness.To secure this she moved from her gloomy London home to a cheerful apartment in Littlebath where, with an eye on her fortune, she was sought in marriage by the Rev. Jeremiah Maguire, an Evangelical clergyman; by Samuel Rubb, Jr, son of her brother's partner; and by her cousin John Ball, a widower with nine children. She refused them all, but did fall in love with her elderly cousin, and, when it was proved that her fortune was really his, they were married.In "Miss Mackenzie" Trollope made a deliberate attempt "to prove that a novel may be produced without any love," but as he candidly admits in his "Autobiography," the attempt "breaks down before the conclusion."In taking for his heroine an middle-aged spinster, his contemporaries of writing about young girls in love. Instead he depicts Margaret Mackenzie, overwhelmed with money troubles, as she tries to assess the worth and motives of four very different suitors.Although her creator calls her "unattractive," most readers will warm to Miss Mackenzie and admire her modesty, dignity, and shrewdness.
<urn:uuid:e4e7ebef-4606-4f26-8058-45da334ca2cc>
CC-MAIN-2021-43
https://williambertrand.fr/anthony-trollope/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00230.warc.gz
en
0.981679
2,086
2.578125
3
You are watching: My hands are of your colour but i shame Welcome to my internet site, now under development for more than twenty years. -- Philip Weller, November 13, 1941 - February 1, 2021 Dr. Weller, an east Washington university professor the English and Shakespearean scholar for more than 50 years. Detailed an introduction of Macbeth, action 2, scene 2 page Index:Enter Lady Macbeth.Lady Macbeth waits because that Macbeth to come v the news the he has killed the King.Enter Macbeth.Macbeth announces that he has done the deed, but he is for this reason shaken through the murder the he bring the bloody daggers with him, and also Lady Macbeth takes them indigenous him, to location them v the sleeping grooms.Exit Lady Macbeth.A knocking in ~ the castle gate frightens Macbeth, and also his wife comes to lead him away, so that they can wash the blood from their hands.Enter Lady Macbeth:This scene, like the previous one and also the next, is usually displayed as ensuing in the courtyard of Macbeth"s castle. In the previous scene Macbeth had an ostensibly casual conversation v Banquo, however as quickly as Banquo visited bed, the became apparent that Macbeth was awaiting his wife"s signal (a bell) to go execute the murder. Now, wherein Macbeth waited for his wife"s bell, she waits for the news the he has killed the King.The courtyard is reportedly quite close to the King"s bedchamber, and also she listens intently, together though she might actually hear the murder being committed. She is really excited, and says of herself, "That which hath do them drunk hath do me bold / What afoot quench"d them hath given me fire" (2.2.1-2). The "them" whom she describes are the King"s two personal servants, his "grooms." She has given each of them a "posset," a mixture of wine and also milk. It"s other you would certainly drink just before going to bed, to help you sleep, however Lady Macbeth has actually drugged the grooms" possets, so that their sleep is the next thing come death. Lady Macbeth it s her has also had part wine, however she feel bold and fierce, not drunk and sleepy.At this moment she think she hears something and also says, "Hark! Peace! / It was the owl the shriek"d, the deadly bellman, / Which offers the stern"st good-night. That is around it" (2.2.2-4). A lot wake up in these few words. As soon as she states "Hark!" she"s telling herself to listen, and then as soon as she says "Peace!" she"s telling herself to it is in quiet, so that she have the right to hear what she"s listening for. After she listens, she decides that she heard a screech owl, and also she takes that as a good omen, because the screech owl is nature"s very own "fatal bellman." A "fatal bellman" is a night watchman that rings a bell at the door the a prisoner booked for execution in the morning, and also an owl go the same job in nature, because--according come folklore--the screech the a screech owl foretells the fatality of a person. Therefore, Lady Macbeth believes that because she has just heard the owl"s screech, her husband need to be "about it," act the murder at this very moment. However suddenly she hears her husband say--probably in a hoarse whisper--"Who"s there? what, ho!" (2.2.8). Just as Lady Macbeth think she heard something, so currently Macbeth think he hears someone, and he"s trying to examine it out. Immediately, Lady Macbeth presume the worst, the the grooms have actually awakened before the murder has actually been done, and also that all will certainly be lost.She additionally assumes the worst about her husband. She says to herself, "I laid your daggers ready; / that might not miss out on "em. Had he no resembled / my father together he slept, I had done"t" (2.2.11-13). She"s reasoning that probably her husband is for this reason addled that he can"t discover the grooms" daggers, also though she placed them in plain sight. And also she"s reasoning that she should have done the job herself, i beg your pardon she would certainly have, if the King hadn"t looked prefer her father. Enter Macbeth:As Lady Macbeth is reasoning that she would be a much better killer 보다 her husband, he appears, and says, "I have done the deed" (2.2.14). However though he has done the deed, that can"t take care of the mental consequences. Because that one thing, the is hear things, or think he is. That asks his wife if she heard a noise, and also she states she heard only the owl and also some crickets. Then he asks she if she was talking as he came under the stairs native King Duncan"s bedchamber, and also she states she was. Yet now he thinks he hears something else, and asks who"s resting in the bedchamber beside the King"s. His mam answers that Donalbain has actually that room, and also Macbeth claims "This is a sorry sight" (2.2.18).This critical remark that Macbeth"s shows exactly how his mental is jumping around. After worrying around this noise and also that, Macbeth suddenly claims something is a "sorry sight." Editors always explain it by inserting a phase direction, "Looking ~ above his hands," which are covered with blood.His mam tells that he"s a fool, but his mental has currently jumped come something else. Together he to be leaving the King"s bedchamber, Macbeth heard someone in one more room laugh in his sleep, and also someone else contact out "Murder!" These two sleepers then awoke, and prayed, and cleared up down come sleep again. Meanwhile, Macbeth to be frozen in his tracks external their door, and as the two settled down come sleep, "One cry "God bless us!" and "Amen" the other; / as they had actually seen me through these hangman"s hands" (2.2.24-25). "As" means "as if" and also the idea is the Macbeth felt the the two sleepers can see his bloody hands -- and also his guilt -- best through their door. Currently Macbeth wonders why the couldn"t to speak "amen" to the "God bless us" that he heard. Lady Macbeth tells her husband the he"ll drive them both crazy if that keeps thinking like that, however he says, "Methought ns heard a voice cry "Sleep no more! / Macbeth does killing sleep"" (2.2.32-33). Currently his mind has made a very large leap, not simply a jump. This "voice" is a pure hallucination, simply as the "dagger of the mind" was. That praises sleep as innocence, together the one certain relief from every one of life"s problems, but seems sure that he -- that murdered an innocent male in his sleep -- will never ever sleep again.His wife asks who the voice belonged to, however he doesn"t price the question, and she says, "Why, worthy thane, / You do unbend your noble strength, to think / for this reason brainsickly the things" (2.2.41-43). She speak him to "Go get some water, / and wash this filthy evil from her hand" (2.2.43-44). The "filthy witness" is the blood of Duncan, which acts together a witness to Macbeth"s crime, but as Lady Macbeth is saying this, she sees another "witness": Macbeth is still delivering the grooms" daggers! She speak him he must take the daggers back, put them v the grooms, and smear the grooms through blood, therefore it will certainly look like the grooms killed the King.Macbeth, however, is paralyzed v the horror of what he has actually done. That says, "I"ll go no more: / i am afraid to think what I have done; / look at on"t again I challenge not" (2.2.47-49). Currently Lady Macbeth is scornful of her husband. She take away the daggers indigenous him and also tells him that it"s childish come be fear of the sleeping or the dead. And she"s no afraid of blood, either. She says, "If the do bleed, / I"ll gild the deals with of the grooms withal / for it should seem your guilt" (2.2.52-54). With these bitterness words, she go to end up her husband"s project for him.Exit Lady MacbethAs shortly as Lady Macbeth has exited, we hear a knocking. Macbeth hears it, too, and also it frightens him, however he deserve to do nothing except stare in ~ his hands. That looks in ~ them as though he had actually never watched them before, and also he feels the looking in ~ them is like obtaining his eyes gouged out. The is the blood ~ above his hands that reasons this horrible fascination, and he feels the the blood have the right to never be washed away. Before his hands are clean, they will make all the seas that the civilization turn red: "Will all good Neptune"s ocean wash this blood / Clean from my hand? No, this my hand will fairly / The multitudinous seas incarnadine, / make the eco-friendly one red" (2.2.57-60).As she returns, Lady Macbeth hears what Macbeth is saying to himself, and also she comments, "My hands space of your colour; however I shame / come wear a heart so white" (2.2.61-62). She method that she hands space red, as well (because she has actually been liven smearing the King"s blood ~ above the grooms), but that she would certainly be awkward to have a heart as white together Macbeth"s. A white love is white since it has no blood, and also the person with a white heart is a coward. As she it is provided this insult, us hear the knocking again, and Lady Macbeth takes her husband away so that they can wash up. In her opinion, the will just take a little water to make them innocent. She also tells him he must put on his night-gown, so the if they have actually to obtain up and also talk to whoever is knocking, the won"t look prefer they"ve to be up every night.He"s unresponsive, and also seems lost in his thoughts. She advises him to snap the end of it, however he can"t. Together he is gift led away, he says that "To know my deed, "twere finest not understand myself" (2.2.70). See more: What Writing Characteristic Determines That A Biography Is An Autobiography He way that if he completely understands what he has done, the will see what a monster he has become, and also he doesn"t desire to recognize that monster. At the very last, as we hear the knocking again, Macbeth desire none of that had ever before happened, and also he calls the end "Wake Duncan v thy knocking! I would certainly thou couldst!" (2.2.71).
<urn:uuid:00df3634-34e5-455e-91a9-b523af084b76>
CC-MAIN-2021-43
https://mmsanotherstage2019.com/my-hands-are-of-your-colour-but-i-shame/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585916.29/warc/CC-MAIN-20211024081003-20211024111003-00269.warc.gz
en
0.981252
2,511
2.671875
3
Different Types of Health Care Insurance To Know We know what health insurance covers, but the question is how much does it cover. Health care insurance is comprehensive insurance that pays for a portion or the entire risk of a patient sustaining medical expenses, spread over a number of persons. The insurance will pay a sum to the policyholder, called the “premium”, and the remaining expenses will be paid by the insured or his or her family. There are two types of health insurance available in the United States: catastrophic and managed care. Catastrophic health care insurance means taking care of small, routine medical procedures and tests while avoiding any major medical services. In other words, a “catastrophic” plan is for people who are healthy, can take care of their own medical problems, and are not likely to require major medical services any time in the future. Examples of “small” medical services covered under a catastrophic plan are doctor visits, dental X-rays, hearing aids, hospital rooms, emergency rooms, prescriptions, and doctor-prescribed medications. If your doctor ever tells you that you are not likely to need a particular service in the next three months or so, then you can probably rely on that service for those three months. Otherwise, if something major happens, you would have to pay for the services you just took. On the other hand, in “managed care” health care insurance companies provide their customers with medical services that can either be covered by the insurance company or they can be paid for by the customer. In countries like Canada, the health care insurance company of every person is connected and their doctors, hospitals, and other medical services are closely supervised by the government. Some managed care plans allow patients the choice of doctor, hospital, and other medical services, which is not allowed in many other countries like the US. Before deciding whether to buy a medical insurance policy, it is necessary to make a list of the medical services you would require and the cost of these services You can either get a quote or you can apply for a health care insurance plan from your local authorities. In order to save money and time, applying online for a health care insurance policy is recommended. Once you decide on an insurance policy, you can either purchase it directly from the company or you can submit an application to a network. The network will process your request and provide an insurance policy in less than two weeks. Many people who do not have any health care insurance think that it is a very expensive thing to get health care insurance, especially when they have to pay a lot for deductibles and co-pays. However, there are some things you can do to get health care insurance and save money at the same time. For instance, did you know that you can get health care insurance through the government? Even senior citizens are eligible for Medicare. Therefore, you do not need to pay for Medicare supplement insurance. Another option that is worth considering is to pay a small co-pay and deductible in order to save money. However, you will have to have a high deductible in order to get this type of health insurance. A deductible is an amount you will have to pay if you visit the doctor or to pay your copayment. However, a high deductible is not always a good thing because it can be difficult to cover the entire expense. Health care insurance is basically an insurance policy that covers a certain percentage or the entire risk of an individual suffering from medical costs, spread to several other people. It is typically paid out of the pocket and does not usually come with an annual deductible or any sort of co-payments. In order to understand how the different types of medical insurance plans work, it would be helpful to understand what a health care insurance policy actually is. These policies are generally available in different forms. The types of coverage include Indemnity Insurance is the most common type of medical insurance This type of policy basically pays the expenses incurred by a patient as a result of medical procedures. The insurer pays for all the costs related to the procedure such as the doctor’s fees, hospital expenses, and even some surgery costs. This type of policy usually lasts for a certain period of time and after that, the insured must again find another source of coverage. Indemnity insurance, sometimes called “activity-based” insurance, is a contract that offers protection against claims arising from negligent actions or conduct of third parties. Indemnity insurance is a legal obligation of one entity to compensate the other entity for the direct and indirect damage incurred by it as a result of the conduct of any third party. Typically, the duty to indemnity is implied but not necessarily, coextensive with that of the contractual duties to “hold harmless”, “defend”, or “pay for”. Indemnity insurance protects general liability for negligence, breach of contract, errors and omissions, defamation, malicious prosecution, and misfeasance. Certain professionals who render services to customers are often required to maintain liability insurance. Examples include real estate brokers, attorneys, engineers, architects, contractors, and insurance salespeople. Many Indemnity Insurance professionals also offer a variety of personal injury protection products, including premises liability insurance, malpractice insurance, and vehicle accident insurance. Personal injury protection is available for clients in many areas including employment, malpractice, product liability, advertising, and health care. There are a number of common warranties that protect Indemnity Insurance providers. A standard warranty includes an agreement to make all reasonable attempts to take reasonable measures to avoid or correct claims of malpractice, whether or not awarded to the client. Conversely, a standard Indemnity Insurance policy does not include a promise to correct malpractice unless the Indemnity Insurance provider would be individually liable for the malpractice. Finally, an Indemnity Insurance provider is not required to reimburse clients for their perceived losses or to defend against errors and omissions even if the claim is ultimately unsuccessful. Public Health Insurance Plans This is one of the most popular types of health care insurance in the US. This type of insurance is often available through government-funded organizations. They usually cover a specified number of covered procedures. The concept behind public health is to provide quality healthcare services to all Australian residents. Medicare covers most medical costs up to a certain percent of the expected gross income for an individual, their dependants or eligible spouse. Medicare covers most of healthcare costs for both hospital medical and dental care. Since the early 80s, Australian residents and Permanent residents have had full access to Medicare that entitles you to receive healthcare in a public hospital for healthcare listed in the Medicare Benefits Schedule (PBS). It is not uncommon for a Medicare recipient to receive additional healthcare through Medicare Part B and C, but these policies are optional and may also be subject to change. Medicare Part A is the largest source of long-term care coverage in Australia and should be considered as your primary Medicare plan. Medicare Part B covers unexpected medical expenses for people who are eligible under the Medicare Supplement Insurance Plan (FSIP). Medicare Part D is for people who require special healthcare or devices for preventing hospital stays. Both of these Medicare programs are managed by private health insurance companies with differing levels of service coverage and benefits. In contrast to the United States and other developed countries, most developing countries including India and Brazil have no government-run public health insurance program. In many of these countries there is a lack of coordinated long-term care resources, particularly for medically elderly people. Many developing countries also have inadequate access to healthcare infrastructure, so even when a hospital stays, there are delays in getting the patient into the hospital and other difficulties. Developed countries that have extensive public healthcare systems can afford better quality, more comprehensive, more timely, and less expensive healthcare than those that do not. Group Health Insurance Plans A group health insurance program is basically a form of group health insurance coverage offered to an employer or employee organization, and which is also purchased by eligible participants. In a nutshell, this means that in a group health insurance program, the people who are a part of the program are granted with health insurance benefits while they are working for the company. Usually, an employee is qualified to join a group health insurance program based on his contract of employment. Sometimes, however, depending on the company’s policies, sometimes an employee is qualified to join a group health insurance program even when he is still on the job. Group health insurance programs can also be bought by the self-employed. Group health insurance plans cover the employees and the employers’ employees. The employer usually pays the employee premiums. The employee premiums include the deductible and the monthly employee payroll taxes. If there are any additional medical expenses during the coverage period, the cost of those services will be borne by the employer. Group health insurance plans for self-employed people generally have fewer restrictions and cost restrictions than do the insurance policies for other large groups of employees. There may be fewer coverage options, but the rates and premiums may still be low compared to individual policies. The premiums are based on the health history of employees and may vary depending on health histories and premiums of other employees of the company, as well. The most important thing is to get a group health insurance plan as soon as you can so that you and your family are fully protected. Private Health Insurance Plans This is the least expensive type of health insurance policy. These policies are usually offered through private health insurance companies or agents. It is also one of the oldest types of health insurance policies because it is so easy to apply for these policies. Private health insurance provides medical coverage for the policy holder and his or her family. It may be purchased on an individual basis or as part of a group plan. Private health insurance comes in many types such as HMOs (Health Maintenance Organizations), PPOs (Preferred Provider Organizations) and POSs (Point of Service plans). In general, private health insurance plans are more expensive than those provided through public sector plans. The rates may also vary depending on the plan and the company offering it. When you purchase a private health insurance plan, you get medical coverage as a member of the group or as an individual. A few examples of options are short term coverage, catastrophic medical coverage and hospitalization benefits. As a member of a health maintenance organization, you usually pay lower rates than those who don’t belong to any group. In a PPO or POS plan, you have several health care providers to choose from and the cost of your premiums are partially determined by the provider you chose. If you travel often, you might consider taking out travel insurance.nWhen you purchase a short-term policy, you get coverage for a certain amount of time. This could be as long as a month or as short as three days. Some short-term health policies provide coverage for a number of days, while some provide coverage for a single day. If you take out a catastrophic coverage policy, it usually covers emergencies only. You may want to check with the insurer if you have questions regarding your coverage. Private Group Health Insurance Plans This is also available to a specific segment of the population. These policies are available to members of an organization, contractors, business owners, etc. Most of these plans can cover any procedure. The only difference is that the health insurance companies or agents require members to be an active member of the company in order to get the insurance benefits. Group Insurance health plans are available through the private sector as well. They provide full coverage to a large group, usually consisting of company staff or members of an organization. Generally, private group health insurance plans tend to be much less expensive than those offered through government programs. The insurance company will reimburse some, if not all, of the medical costs of the group. They will also have some control over how the costs are administered. There are many different types of private group health insurance plans available for small businesses. These could be provided by state or local governments, the private sector, or third party organizations such as payroll services or benefits companies. Many small businesses and self-employed people do their own enrollment. Self-employed people are not always offered the best rates, especially if they do not have very good health records. Some self-employed people who are eligible for these plans also do not have the option of insuring themselves through a job position. Small business owners may want to consider getting coverage for themselves as well as their employees. If they have more than 50 employees, there is a wide range of plans that they can get, including short term and long term coverage. Although there are some employers who will offer private group health insurance plans, many times the employee has to be part of a larger group to take advantage of the coverage. Self-employed individuals can also opt to get coverage for themselves only. Whatever option a person chooses, they will likely pay less in the long run by getting coverage. There are some health care insurance policies that are available to provide coverage for only specific types of services such as surgical procedures. Such a policy is known as a Special Health Insurance Plan. Special Health Insurance Plan is mostly available to members of specific groups of people who are not able to get insurance coverage for such procedures. The benefits as a Special Health Insurance Plan does not require membership but a set monthly premium amount that is determined by the health insurance company. One thing you need to consider before you apply for health insurance policies is that there are certain criteria that determine the eligibility for these policies. For example, if your current health conditions include a serious illness that would require you to undergo invasive surgery, you may have to pay more premiums. Before you decide on which health insurance coverage is suitable for your needs, you should think about what kind of health problem you have. and what kind of health care insurance will best suit you. In fact, all kinds of insurance policies come with different policies and exclusions and you should decide which policy works best for you. The Health Insurance Portability and Accountability Act (HIPAA) are one of the best laws that protects the privacy of patients’ records. There are different laws in place that govern how and why this law should be obeyed. One important thing to remember is that HIPAA regulations are based on the person’s own information and therefore they may be different depending on the medical professional you use and who you consult. Medical insurance does have its share of advantages and disadvantages. Make sure you know the pros and cons so that you can choose the best type of health insurance for yourself. 1,663 total views, 1 views today - Ways Exercise Helps to Fight Against Ageing - September 2, 2021 - Instant Home Remedies for Headache and Migraine - August 30, 2021 - Warm Water Therapy Benefits for Chronic Illness Treatment - August 29, 2021
<urn:uuid:e51a9699-4e91-4f29-9f8c-48b9cc4475ea>
CC-MAIN-2021-43
https://www.healthyflick.com/different-types-of-health-care-insurance-to-know/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583083.92/warc/CC-MAIN-20211015192439-20211015222439-00071.warc.gz
en
0.967858
3,063
2.59375
3
The old Norwegian farmers’ calendar, the wooden calendar staff, follows the Norse system of reckoning time, and divides the year into a summer half, and a winter half. The summer half begins on the 14th April and is usually signified by a deciduous tree. In Hordaland County this was the “spade day”; it was then that one could put a spade into the cornfields on the warmest slopes. The first winter day of 14 October is signified by a glove, now we are moving towards colder times. Some of the signs on the wooden calendar are “popular” ones, a drinking horn for Christmas indicates that now we have to follow the old tradition and drink in Christmas, a sun for Midsummer’s Day signifies that the sun is at its highest point. But the great majority are signs from the Church calendar. As the names of feast days they are linked to the saints the days are named after. All the Norwegian wooden calendars have a grinding stone at the 15th May as a reminder that Hallvard was drowned with a grinding stone round his neck. An axe on 29 July St.Olav’s Day is Olav’s axe. Many of the signs have been re-interpreted in the tradition and been linked to work and development. Close to the wooden calendar tradition we find weather signs and annual signs which were important in the old farming society. The traditional wooden calendar staff The first syllable: “prim” in the word “primstav” (or wooden calendar staff) probably comes from the Latin word “prima” meaning a key number which helped in establishing when Easter was in that year. Another name which has come up in discussion is “rimstav” where “rim” in Old Norse means time-reckoning. This could well be the case since Norwegian wooden calendar staffs never usually have key numbers. The wooden calendar staffs from Hordaland County are all shaped as a board, 80 to 100 centimetres long and 5 to 6 centimetres wide. As is usual on Norwegian wooden calendar staffs, the calendar is divided into two, one on each side of the board; divided into a winter side from 14 October to 13 April, and a summer side from 14 April to 13 October. On the lowest part of the surface, short strokes are inscribed for each day. Some staffs are divided up for each seventh stroke so that it is possible to see which day it is if one knows the Sunday letter for the whole year. We find a figure on the surface of the staff for each feast day. These can be crosses or half-crosses, but can also have something to do with the churches or the legends of the saints. St.Laurentius Day on 10th August is marked by a grill because St.Laurentius was burned to death on a grill. All Saints’ Day on 1st November is usually marked by a ship, the symbol of the Christian church. St.Olav’s Day has Olav’s broad axe which was the symbol of our national saint. St.Hallvard’s Day on 15th May has a millstone, as St.Hallvard was drowned with a millstone round his neck. Some signs have no connection with the church. This is true of the beginning of the summer on 14 April which almost always has a tree with leaves which signifies that this is the beginning of the summer half of the year. Similarly the beginning of winter is symbolised by a glove. Now we have to put on clothes again now that winter is coming. But also the two most important feast days of the year are marked by profane signs. Midsummer on 25th June often has a sun because it is the summer solstice. Christmas Day has a drinking horn, because now “we shall celebrate Christmas by drinking”. In connection with the celebration of Christmas we often find a barrel or a malt barrel for St.Thomas’ Day that is 21st December, a day which signifies brewing of beer. A memory perhaps of a cuckoo month in prehistoric times can be the sign of a bird on Cuckoo Day which was 1st May. From the life of work we find the scythe and the rake as signs for the period from 8th to 12th July and a millstone symbolises Egidius or the spirit of the mill on 1st September. After that they waited on the milling water. But often original Christian symbols were re-interpreted. The ship on All Saints’ Day on 1st November was a sign that now ship’s traffic would be taking a winter holiday. The axes on the Brøremesse (the two saints were beheaded) was interpreted as a sign that the wood for tools had to be cut. St.Batholomew’s Day on 24th August has lost all recollection that St.Bartholomew was beheaded and skinned alive. The knife was a sign that all the rams should be slaughtered. The church calendar In Chapter 15 in the section on baptism in the Gulating Law it is stated that each priest in his district where divine service is held, will send round crosses before the saints’ days and make sure they come to all corners of the district. Each man shall carry his cross to the next man, and will be responsible for ensuring that the crosses do not stop anywhere and that they will reach every hamlet. To keep a track of the saints’ days the priest had their calendars. Some of the saints’ days concerned the congregation of the church, and others were only special days for the priests. Besides Christmas and the days around Easter, there were about 40 “major” church days. All of these were important days of celebration in popular marking of the passage of time. The farmers also got their own calendar and we call that the farmers’ wooden calendar. We have every reason to believe that from the beginning it was a calendar for mass days. The oldest Norwegian wooden calendar that we know of is from 1457. It has probably been a calendar in the ownership of a priest, because it has Sunday lettering and golden numbers for working out when Easter falls. In farming society the religious function of the calendar was almost forgotten. The Mass days’ calendar was a feast days’ calendar, the summer half of the year was marked on one side, the winter half on the other. The summer and winter halves of the year That the year was divided in two in Norway must be an old tradition. This division of the year also followed the first pioneers to Iceland and has also been extended to neighbouring countries in the east. April 14 is the first day of summer and October 14 is often known as the “winter night” (the first night of winter). It could be said of a child: “He was born three weeks into summer”. In our own times we operate with four seasons, that is winter, spring, summer and autumn and have more or less fixed dates for these four seasons. It was not like this before. Spring and autumn were only concepts/names which followed the growth of the year . But in any event they were divided into four in connection with the division into two. Midwinter was January 12 and midsummer was July 14. Another division into four was related to the four greatest church feast days with fixed dates, that is Christmas, Mary’s Spring Festival, Midsummer’s Day and Michaelmas. They reckoned with 13 weeks each in the first two quarters, 14 weeks in the third quarter and 12 weeks in the fourth. In Hamre these periods are called quarter-years even although they recognised that they were not of equal length. Here with us the Latin months were “book months” as they were known in Iceland, and the old Norwegian names of the months are perhaps something that most people were not aware of. But right up to our own times the time after Christmas has been reckoned in “moon” months. The first was the Christmas moon, the moon month in which the thirtieth day occurred. There are still people in western Norway who go by the following moon-months Torre and Gjø, as well as Einar the single month. In the summer months it was the working seasons which were dominant in dividing up the seasons: the digging/ploughing season, the intermediate period, the peat-making season, the hay-making season, the cutting season, the harvesting season, the potato harvesting season and the aftergrass season. “Midsummer and the light mass” It is the special feast days which have lasted longest in the Norwegian tradition of marking the passage of time. It is also these which have been the most important for daily life. Everything was measured in terms of feast days, that is so many days before or after this or that feast day; when cows were to calve and sheep were to lamb, when folk were born and when they died, agreements in business and many other things. The feast days largely get their names from the Catholic church calendar, so that they coincided with the names of the saints’ days. It is easy to see the juxtapositioning with “day”, “mass” or “watch”; the twentieth day, the Light Mass, Midsummer’s Day. The word “voke” or watch is often abbreviated to “ok” in Hordaland and linguistically it goes back to the Latin word “vigila”; a night watch with prayer which the priests held the night before great church feast days. But also in popular festivities we hear that the sounds of the feast lasted all night, Midsummer’s Eve. In this case the festivities began the night before because the night belonged to the following day. Thus it is also in our own times it Midsummer’s Eve, 23 June and the night which follows it which are the great popular feast-days, although Midsummer’s Day is on the day after. Those who gave their names to the days are first and foremost the Virgin Mary, the apostles and the Catholic saints. Only two of these are Norwegian, St.Olav with two days for St.Olav on 29 and 30 July and St.Hallvard on 15 May. A few feast days originally have Norwegian names, the first day of summer half of the year and the first day of winter, half of the year as well as Christmas (Yule) and some days linked to working life. The feast days were also the basis for working out the weeks which split the year up into smaller portions. In Masfjorden they were reckoned as follows: from Christmas to the Light Mass: 5 weeks and on to Gregor’s Mass a further 6 weeks, then to the first day of summer 5 weeks, and then 10 weeks to Midsummer, 5 weeks to St.Olav’s Day, to St.Bartholomew’s Day 4 weeks, to Michaelmass 5 weeks, to All-Saints’ Day 4 weeks and to Christmas 8 weeks. They reckoned in the same way at Voss but after St.Olav’s Day they had two weeks to St.Laurentius Day (10 August), two weeks to St.Batholomew’s Day, 3 weeks to Holy Rood Day in the autumn, and two weeks to Michaelmass. Almost every rural area had its own way of reckoning. Feast days and working life The feast days belong in a farming society. It is a farming society which is largely a self-contained subsistence one where crops and animals are of greatest interest. One ought not to have any expectations beyond the first year and there are remarkably few events which can be termed as “long term”. The majority of events correspond to local experience. None of the rules allow for individual opinions; it is collective opinions which are generally accepted, in the local society that people have lived in. They give the “right time” for seasons and all types of work, tell us whether we can a expect a good or a bad harvest and tell us what sort of weather we have to expect. Some feast days intervene to regulate relations between neighbours, and for example, lay down times for when gates should be open or shut, when animals should be received or handed back, and when cattle should be moved to or from the mountain pastures. Other feast days were “moving” days for servants, and others were semi-holy days when it was forbidden to work. But the dominant ones, nonetheless, were related to the likelihood or the apprehension for crops and livestock, and here of course the weather was the most important. As early as Paul the Apostle’s Day on 25 January people began to think ahead about the spring season and the summer. The longing for spring and new growth grew steadily greater, the longer one progressed through the winter. In the tradition connected to St.Peter’s Chair on 22 February and Mathew’s Mass on 24 February interest grew for the ice and snow which would soon disappear. Now they were past the worst. On Gregorsmass on the 12 March people could see that the days were lighter and the spring was approaching. The hay was diminishing in the hay loft and people gave thought to the hay harvest in the coming summer. At the Equinox on 21 March people could start working in the fields in the earliest rural areas of West Norway, but often people had to wait. At the Virgin Mary’s Mess on 25 March, winter had its last throw, but it is not yet summer. In the weeks to come, the feast day tradition emphasised that everything needed its time. If there was a sign of spring one should still not hurry too much. Winter “could take its revenge” as people used to say. Even if everything was pointing to an early spring, snow and ice could still come before one had time for reflection. But by the beginning of the summer on 14 April it could be reckoned that the winter was over. Now the work in the fields could begin in earnest. The cattle should be born and bred, and even if it was too early to release the cattle for grazing, the focus was on sowing times and on moving cattle to the pastures, with St.Hallvard’s Day on 15 May being the most important day. In July they observed the weather for the coming harvest and for the haymaking. In the low country in Hordaland County the haymaking began on 10 July: “King Knut, chase the farmer with his scythe out”. After midsummer there was great anxiety about the weather for the haymaking. If there was rain on the worst rain days viz. Mary the Rain Queen on 20 July, Jakob Wet Hat, 25 July, Anna 26 July and the Seven Sleepers’ Day on 27 July, then it would be difficult to save the dry hay. From St.Olav’s Day on 29 July thoughts turned to the harvest and to autumn weather, and people began to look for night frost. Important days were Peder’s Prison and St.Laurentius Day, 1st August and 10th August respectively. If the signs were good then you could have good expectations. On St.Bartholomew’s Day on 24th August the autumn slaughtering started; and the cattle came down from the mountain pastures to the home farm. The sheep had to be shorn and on Michaelmas, that is the 29th September the harvest was finished for the year and all the animals had to be on the home farm. After the winter half of the year commenced on 14th October, thoughts turned to the tasks for the winter. Good days for signs for celebration were All Saints’ Day and St.Martin’s Day, that is 1st and 11th November respectively. By St.Katarina’s Day the 25th November the spinning wheels should be ready and the sheep would have to be mated. From St.Lucia’s Day, the 13th December thoughts were only directed towards Christmas. “From St.Lucia’s Night to Christmas every day is a feast day”, as the saying went. But the popular marking of time also contained many elements from a time when people had to manage without dates of the years, almanacs or clocks. They marked events in relation to local happenings: “it was still in the year before the great snow winter”, or “three years after Mother died”. They could know which day it was, by looking at where the sun was from a certain point on the ground. Such places were given names: Midday Peak, Sunset Cleft, Eleven O’Clock rise. They divided the day into spells of work. There was an old saying that the stomach was the best clock. The old way of keeping track of time contained a rich culture. Much of what we have reckoned up until our days has its roots far back in pre-Christian times so that it is a very ancient culture we are dealing with. - Alver, B. (1980) Dag og merke: folkeleg tidsrekning og merkedagstradisjon. 2. utg. Bergen.
<urn:uuid:5d24ec54-f2e0-41fc-bc6f-c4a085a6141f>
CC-MAIN-2021-43
https://grind.no/en/church-cloister-christianity/wooden-calendar-tradition-and-popular-belief
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587854.13/warc/CC-MAIN-20211026072759-20211026102759-00470.warc.gz
en
0.981982
3,637
3.234375
3
Understanding Sustainable Seafood Well-managed wild-capture fisheries and environmentally responsible marine aquaculture play an increasingly important role in our food supply, our health, and the environment. Seafood demand is growing fast, and the global supply of wild-capture fisheries has remained flat for more than 20 years—the ocean has given what it can. As such, the future of sustainable seafood must include both farm-raised and wild-capture seafood. The United States is recognized as a global leader in sustainable seafood—both wild-caught and farmed. Marine wild-capture fisheries in the United States are scientifically monitored, regionally managed, and enforced under ten national standards of sustainability through the Magnuson-Stevens Fishery Conservation and Management Act—exceeding the international standards for ecolabeling of seafood. Although current U.S. aquaculture production is small and lags behind the rest of the world, U.S. fish farms operate under some of the world’s most robust environmental protections, producing environmentally safe, sustainable sources of domestic seafood, creating jobs, supporting resilient working waterfronts and coastal communities, and providing international trade opportunities. Visit FishWatch—the nation's database for sustainable seafood to find up-to-date information on the status of some of the nation’s most valuable marine fish harvested in U.S. federal waters as well as U.S. farmed fish that help meet our country’s growing seafood demand. In 2015, the average American ate 15.5 pounds of fish and shellfish, for a total of nearly 5 million pounds. In 2017, the top U.S. marine aquaculture species were oysters ($186 million), clams ($129 million), and Atlantic salmon ($61 million). In 2017, commercial and recreational fishing industries supported 1.74 million jobs and generated $244.1 billion in sales impact. In 2018, U.S. commercial fishermen landed 9.4 billion pounds of seafood valued at $5.6 billion. Get up-to-date information on the status of some of the nation’s most valuable marine fish harvested in U.S. federal waters as well as U.S. farmed fish that help meet our country’s growing seafood demand. Also learn about buying and handling seafood, fraud, and health and nutrition. The NOAA Fisheries Seafood Inspection Program provides inspection services to the seafood industry that help them comply with food safety regulations. This helps ensure that the seafood on your plate is fresh, safe, and sanitary. IUU fishing occurs when fishing or seafood businesses circumvent conservation and management measures and avoid the operational costs associated with sustainable fishing practices. IUU fishing undermines the reputation of legitimate fishing and seafood operations and the consumer confidence on which they rely. We work with partners around the world to combat this complex international issue. Since 1938, we’ve been working with industry to provide accurate and unbiased reports depicting current conditions affecting the trade in fish and fishery products. We also maintain a foreign trade database dating back to 1975 that allows users to summarize U.S. foreign trade in fish products. You can summarize the weight and dollar value by year, product, country, and type of trade. This data comes from the Foreign Trade Division of the U.S. Census Bureau, which is responsible for compiling information submitted by importers and exporters to the U.S. Customs and Border Protection. As part of our mission to sustainably manage fishery resources, we implement international trade monitoring programs initiated by international fishery management organizations or required by domestic law. Want to eat more seafood but don’t know where to start? FishWatch arms you with the facts about what makes U.S. seafood sustainable—from the ocean or farm to your plate. Get up-to-date information on the status of some of the United States’ harvested marine fish as well as farmed fish, and learn more about various aspects of U.S. seafood, summarized below. Seafood provides key nutrients and healthy protein essential for strong bones, brain development, and healthy immune and cardiovascular systems. The Dietary Guidelines for Americans recommend eating 8 or more ounces of seafood per week. When buying seafood from your local seafood counter, check to make certain that there is no darkening or brown or yellowish discoloration around the edges of fish fillets and steaks, especially if the edges appear dry or mushy. To store fresh fish fillets or steaks, seal them in plastic bags or containers, and cover them with ice in a pan. Studies and investigations have found that various types of seafood fraud are committed along the supply chain. Types of fraud range from simple misunderstandings or lack of information, to blatant deception to increase profits and attempts to launder illegally harvested seafood. Each year we produce three reports on the status of U.S. marine fisheries: Status of the Stocks, Fisheries of the United States, and Fisheries Economics of the United States. The reports take a detailed look at the fisheries and track important indicators such as annual seafood consumption and the productivity of top fishing ports. Eat Seafood, America! is the driving message of a partnership effort aimed at helping Americans stay healthy while supporting the 2 million American workers in the seafood industry. The campaign is being coordinated by the Seafood Nutrition Partnership and supported by 36 organizations, including NOAA Fisheries. U.S. fisheries are big business, providing jobs and recreation and keeping our coastal communities vibrant. The United States is a global leader in responsibly managed fisheries and sustainable seafood. Fish and shellfish are renewable resources—they can reproduce and replenish their populations naturally. Because of this, we can harvest fish within certain limits without depleting the whole population. Sustainable fishery management is the process of using science to determine these limits—catching some fish while leaving others to reproduce and replace them in the future. Science is a big part of our success. Effective management for both wild-caught and farmed species starts with accurate scientific information about fish and fisheries. In fact, U.S. law requires that fishery managers use the best science available to make their decisions. We maintain a national database of U.S. commercial fishery landings, or catch, data dating back to 1950. We update this data annually and include data reported by states. This data is then used to compile the annual Fisheries of the United States report. You can search landings data by time period or gear type, state, species, and price per pound. Scientific stock assessments are critical to modern fisheries management. Using data gathered from commercial and recreational fishermen and our own on-the-water scientific observations, a stock assessment describes the past and current status of a fish population or stock. Stock assessments help us answers questions about the size of the stock, and make predictions about how a fishery will respond to current and future management measures. Using stock assessments and other data, we determine whether a fish stock’s population size is too small (overfished) or the annual rate of catch is too high (overfishing). We report these status determinations quarterly to provide fisheries managers and the public with information about how well current management measures are working. From tackling seafood fraud to helping crackdown on illegal fishing internationally, enforcement is critical to protecting marine resources, like fish and shellfish, and their habitat to safeguard the health of seafood consumers and the livelihoods of coastal communities. Aquaculture refers to the breeding, rearing, and harvesting of plants and animals in all types of water environments including ponds, rivers, lakes, and the ocean. Researchers and aquaculture producers "farm" all kinds of fish, shellfish, and plants. Marine aquaculture is also a resource-efficient way of increasing and diversifying U.S. seafood production and can expand and stabilize the U.S. seafood supply in the face of environmental change and economic uncertainty. We have a lead role in science and management of marine aquaculture—the growing of species that live in the ocean. U.S. marine aquaculture primarily produces oysters, clams, mussels, shrimp, and salmon as well as lesser amounts of cod, moi, yellowtail, barramundi, sea bass, and seabream. Marine aquaculture can take place in the ocean in cages, on the seafloor, or suspended in the water column or in on-land, man-made systems such as ponds or tanks. Recirculating aquaculture systems that reduce, reuse, and recycle water and waste can support some marine species. In 2013, U.S. aquaculture produced $1.4 billion annually, which accounted for 20 percent of all U.S. seafood production and fishery products by value. Still, we have less aquaculture production than much of the world and import more than 90 percent of our seafood. Expanding aquaculture is a way we can address our nation’s $13 billion commercial seafood trade deficit. In addition to closing the deficit, aquaculture has the potential to generate tens of thousands of new jobs on America’s waterfronts. Aquaculture provides a year round source of jobs and economic opportunities that supplement seasonal tourism and commercial fishing. The industry also creates diverse types of jobs in other sectors, such as seafood processing, equipment manufacturing, marketing, agriculture, and food services. Seafood is a healthy, low-calorie protein with unique nutrient qualities that give it health benefits that no other food provides. U.S. dietary guidelines recommend that Americans double their seafood consumption to receive maximum health benefits, which is more seafood than wild-caught fisheries alone can supply. That’s where aquaculture comes in. Aquaculture is one of the most resource-efficient ways to produce protein with fewer environmental impacts relative to other animal proteins. It can be produced using less freshwater and land resources and with fewer greenhouse gas emissions. Fish, in general, convert feed efficiently and have a small carbon footprint relative to other popular protein sources. Farmed-raised fish complement wild harvests as a way to provide more sustainable seafood to consumers. Compared to other forms of agriculture, marine aquaculture is new and dynamic. The science and technology that drives aquaculture innovation helps grow an industry, and can adapt to new opportunities and changing environmental conditions. Our scientists are focusing their efforts on many exciting new areas, including: Refining growing methods for existing aquaculture species. Developing aquaculture techniques for new species. Addressing ocean acidification. Improving feeds, vaccines, and vaccine delivery systems. Engineering solutions for growing fish in both offshore waters. Recirculating systems, advancing genetic, genomic, and breeding programs. Refining ways to enhance species and habitat health through restoration. We work across multiple federal and state agencies as well as with private, academic, and non-governmental organizations to examine scientific issues that will lead to greater efficiency, cost-effectiveness, and environmental compatibility in marine aquaculture. We are working to address the technical and scientific barriers to marine aquaculture in a number of ways including through in-house research at our science centers, grants, and cooperative agreements with academic and other stakeholders. Past research projects have responded to key scientific, engineering, environmental, and economic questions such as health and nutrition, best management practices, ecosystems monitoring and management, engineered production systems, and legal and operational frameworks for aquaculture. Presentation slides to accompany strategic town hall listening sessions for the week of 9/20/21. This draft stock assessment reports the status of coastal Pacific Hake (or Pacific whiting,… This publication is the annual National Marine Fisheries Service yearbook of fishery statistics for… A report on the status of forage species in the Gulf of Alaska (GOA) region is prepared on a… Alternative ingredients continue to be explored in order to develop more sustainable and…
<urn:uuid:13a8f256-ac15-4cb0-88f7-90a0d609c6a2>
CC-MAIN-2021-43
https://www.fisheries.noaa.gov/topic/sustainable-seafood#wild-caught-seafood
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585209.43/warc/CC-MAIN-20211018190451-20211018220451-00510.warc.gz
en
0.923081
2,474
3.140625
3
How to Diagnose and Treat Gambling Disorder The Carlat Addiction Treatment Report, Volume 2, Number 8, December 2014 Daniel Carlat, MD Your typical patient with a gambling disorder may not fit yesterday’s stereotype. Consider this case study: A 42-year-old woman presented for relationship issues and problems with gambling. She had begun gambling by buying scratch tickets when she was in her early 30s. At times, she would spend up to $300 per day on these lottery tickets. She had tried to solve the problem by avoiding convenience stores where the tickets were sold but had found it difficult because they are so ubiquitous. She had often lied to her husband about her problem. She was preoccupied most of the day with thoughts about going to the store to buy more tickets. She began going to Gamblers Anonymous meetings, a twelve-step program for people with gambling problems, with some success. At the same time her relationship with her husband was deteriorating and she was reporting symptoms of depression robust enough to meet criteria for major depressive disorder. A trial of fluvoxamine at a dose of 100 mg/day was successful for mitigating her depressive symptoms and also helped her to maintain her attendance at all Gamblers Anonymous meetings and to stop her gambling. Gambling has changed over the years. For one, there’s a whole lot more of it going on. About 75% of Americans above the age of 12 report having gambled in the past year, according to the National Council on Problem Gambling. Gambling is widespread, with some form of legalized gambling available in 48 states and the District of Columbia—only Utah and Hawaii have resisted the trend. And there are more ways to gamble. Internet gambling is a new concern, along with the burgeoning phenomenon of social casino gaming—gambling games played on Facebook and other social networks. These games are the fastest growing segment of the gambling industry, with an estimated 170 million monthly average users and revenues of $2 billion last year. While gamblers tend not to seek out treatment (fewer than 10%), chances are you have seen patients with gambling issues, and you’ll see more of them over the next few years. In this article we give you a primer on diagnosis and treatment of gambling disorder. Diagnosing the Disorder The basic DSM-5 definition of gambling disorder is quite helpful: “the failure to resist gambling impulses despite severe personal, family, or occupational consequences.” If you were to use this as your guide, chances are that you would accurately diagnose most cases of this disorder. The name of the problem has changed over the years. DSM-III called it “compulsive gambling.” In DSM-IV, it was renamed “pathological gambling” and the latest edition, DSM-5, calls it “gambling disorder,” and has recategorized it as a type of addiction—you’ll find it in the “Substance-Related and Addictive Disorders” section of the manual. Much ink has been spilt parsing out whether gambling disorder is more appropriately considered an impulse disorder (such as ADHD), a conduct disorder, an obsessive compulsive problem, or an addiction problem. Depending on the patient, there may be elements of all four. Keeping this in mind might give you better insight into your particular patient’s motivations, and will help you better tailor your treatment. In order to formally diagnose gambling disorder, you have to establish that your patient has had at least four of a list of nine potential symptoms (“criteria”) in a 12-month period, and that the gambling problem isn’t caused by a manic episode. These core symptoms include factors such as wanting to gamble badly, always thinking about gambling, having a hard time resisting the urge to gamble, etc. One way to remember the basic criteria is with the following mnemonic, Tempted With Casinos: - Tolerance (a need to gamble with more and more money to achieve the gambling high) - Withdrawal syndrome (feeling restless when forced to give up gambling) - Loss of Control (not being able to stop your gambling even after multiple negative consequences) A validated rapid screen for gambling problems is the CLiP questionnaire (similar to the CAGE questionnaire for substance abuse), which evaluates loss of control, lying, and preoccupation. - (Control) Have you ever tried to stop, cut down, or control your gambling? - (Lying) Have you ever lied to family members, friends, or others about how much you gamble or how much money you lost on gambling? - (Preoccupation) Have there ever been periods lasting two weeks or longer when you spent a lot of time thinking about your gambling experiences or planning out future gambling ventures or bets? A positive answer to one of these questions indicates a high likelihood of problem gambling (Toce-Gerstein M et al, J Gambl Stud 2009;25(4):541–555). The well-known US National Comorbidity Survey Replication (which is somewhat outdated, since it is based on interviews conducted from 2001–2003) estimated that 78% of all Americans have gambled at least once in their lives, but only 0.6% have had pathological gambling, while 2.3% have had “problem gambling” (defined as meeting at least one symptom of DSM-5’s criterion A). The average age of onset of pathological gambling was about 17, the problem persisted an average of nine years, and the largest gambling loss in a single year averaged $4,800. The average gambler partakes in a range of gambling activities. The most common types of gambling are lottos/scratch tickets (86% of pathological gamblers), slot machines or bingo (77%), and casinos (78%)(Kessler RC et al, Psychol Med 2008;38(9):1351–1360). Patients with gambling disorder are at high risk for other psychiatric problems. In the Kessler study, 46% of pathological gamblers were alcohol or drug abusers, 60% had an anxiety disorder, 38% had depression, and 17% had bipolar disorder. While nobody knows what causes gambling addiction in a biological sense, experts note that many of the same brain regions light up among problem gamblers as among drug addicts—such as the ventral striatum and the orbitofrontal cortex (Bullock SA and Potenza MN, Curr Psychopharmacol 2012;1(1)). None of the neurobiological studies have produced successful treatment yet. This section is based mainly on a recent review of psychological treatments for gambling disorder (Rash CJ and Petry NM, Psychol Res Behav Manag 2014;7:285–295). To begin with, it’s probably helpful to know that gambling disorder is often transient, episodic, and self-resolving. Studies have shown that over the course of a given year about 33% of problem gamblers will recover on their own. In-depth interviews of people who have recovered on their own show that they use practical means to do so, including avoiding going to places that remind them of gambling, and involving themselves in time-consuming activities that take their minds off gambling. As a clinician, you’re more likely to see the more seriously affected patients who need treatment—either because they want it or because they are forced into it by spouses or the legal system. Studies of psychotherapy for gambling show that all techniques work better than no treatment at all, and no one technique is superior to others. An easy intervention for a busy psychiatrist is to recommend that your patients attend Gamblers Anonymous (GA) meetings, which are increasingly widely available, especially during the current national binge to approve new casinos. As you can imagine, there are no good, randomized double-blind studies on GA (would such a study even be possible?), but various retrospective and open studies have implied a benefit of GA, at least for those who keep going to meetings. Thus, you can accurately tell patients that GA meetings are effective—but only if they attend regularly. In terms of more formal interventions, behavior therapy, cognitive therapy, and motivational interviewing all appear to work, at least better than no therapy at all. In behavior therapy you help your patients avoid high-risk situations and desensitize them to these environments when they can’t avoid them. One strategy, for example, is to have patients gradually spend more and more time close to, and then inside of, casinos, and provide them with coping skills needed to avoid partaking of the gambling activities. In cognitive therapy, you identify distorted cognitions associated with gambling, such as: overestimating the probability of winning; having an illusion of control over the outcome of the gambling; or the belief that a win is due after a series of losses (the so-called “gambler’s fallacy”). It’s likely that the most effective treatments combine cognitive and behavioral approaches. A different approach is motivational interviewing. This is a technique often used in addictions in which you address your patient’s ambivalence about whether they really want to stop the behavior and allow them to come up with their own reasons for doing so. Though studied less, motivational interviewing appears to work as well as other approaches. Various medications have shown promise in helping patients with gambling disorder (you can find individual references in a recent review paper, Pirritano D et al, Biomed Res Int 2014:728038; while the paper focuses on the disorder in Parkinson’s disease, it has a good general review of gambling treatment). Possibly the most robust data is on naltrexone, the opioid antagonist, which has shown benefit in both controlled and open trials, often at high doses up to 250 mg/day. On the theory that gambling disorder shares certain features with OCD, SSRIs have been tested, but the results are mixed. For example, both fluvoxamine and paroxetine have been tested in small, randomized, controlled trials. In each case, one trial showed a benefit over placebo while the other did not. For the positive trials, the mean dose of fluvoxamine was 195 mg/day, and the mean dose of paroxetine was 51.7 mg/day. The best way to think about SSRIs is that they might be effective for some people with gambling disorder, and are particularly worth trying if your patient has a comorbid condition responsive to SSRIs (as was true for my patient described in the vignette at the beginning of this article). Another logical treatment approach is to use mood stabilizers, since one of the symptoms of mania is irresponsible spending, of which gambling is an example. One small study suggested that sustained release lithium (mean dose, 1150 mg once a day) might be effective (Hollander E et al, Am J Psychiatry, 2005;162(1):137–145). One interesting aspect of the psychopharmacology of gambling is that when patients with Parkinson’s disease are given dopamine agonist medications (which are the most effect treatments for the disorder), their risk of developing gambling disorder increases by 50%. The implication for non-Parkinson’s patients is, theoretically, that gambling disorder is caused by too much dopamine, and that dopamine blockers (ie, antipsychotics) should be effective. But they are not. Three studies of olanzapine have been negative, and small studies of aripiprazole have indicated that it might actually worsen gambling behavior. Dr. Carlat’s Verdict: Gambling disorder is treatable—refer patients to GA, use cognitive behavioral therapy, and try naltrexone for core symptoms, and SSRIs when there are comorbidities. Daniel Carlat, MD Editor-in-Chief, Publisher, The Carlat Report. Editor-in-Chief, Publisher, The Carlat Report. Dr. Carlat has disclosed that he has no relevant relationships or financial interests in any commercial company pertaining to this educational activity.
<urn:uuid:bdda4cc4-24ab-4cf3-99cc-84e4760fea43>
CC-MAIN-2021-43
https://www.thecarlatreport.com/the-carlat-addiction-treatment-report/how-diagnose-and-treat-gambling-disorder/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00349.warc.gz
en
0.95247
2,515
2.671875
3
Every computer/mobile device is assigned a numerical label called the Internet Protocol (IP) address by your Internet Service Provider. When accessing any website online- the web host can see where you are located and can track your activity while you visit their site, and even after you leave to browse something else. The Internet is not what it used to be- several limitations and dangers lurk online. 1/ Browse websites without leaving a trace of your identity. Hiding your real IP address via encryption, allows you to be anonymous when browsing online. 2/ Access to streaming, wherever you are. Missing a favourite show on vacation? Hide your IP using a VPN and connect to the desired country server to enjoy streaming as if you never left home. 3/ Stay safe from snoopers looking to access your information. Hiding your real IP address gives you a great layer of protection online, because you disguise your real location. 4/ Protect yourself when using a Wi-Fi hotspot. Hotspots are unsecured and open to everyone. Using a VPN service allows you to hide your IP from unprotected networks, where hackers could be lurking. 5/ Access websites that are not available to IP address’s geographic location. Hiding your IP Address and using an IP address generated by a VPN service would allow you to access content not available in your location. 6/ You can by-pass school or workplace restrictions. If you switch to an IP address provided by a VPN service you can by-pass school/business network restrictions to access the information you need. 7/ You can by-pass surveillance and national internet censorship. Hiding your IP address allows you to hide your internet activity from companies and organizations who might wish to track your activity online. 8/ Hide your activity from your Internet Service Provider. Often your internet service provider is obligated to track and hold on to data you generate online. You might want to keep that information to yourself by hiding your IP address. 9/ You get to keep your private searches private. Hide your IP and hide your activity from search engines who track and store data on your activity. Don’t forget to clear your cookies after every browsing session- even while using a VPN service. 10/ Access to internet freedom. The internet was envisioned as a platform for all to use and modify as they wish. Creativity, innovation, education, communication and exchange of ideas are inseparable from the freedom the internet offers. Hiding your IP would guarantee the privacy and right to expression online. There are a number of country specific regulations that are constantly changing. If the websites you wish to access are blocked, information you want to keep private is at risk to being exposed, or if you need a secure gateway to access information – Hiding your IP is the key to your internet freedom. How can you Hide your IP online? Get a VPN. Protect your network from third parties, stay anonymous, and access any content you want on the Internet. NordVPN creates a secure connection between your computer and the Internet, guarding your data and devices, your privacy, and your freedom online. Why Anonymous browsing is required In today’s world, online privacy is a dwindling privilege as people’s identities and personal information are hijacked and misused more and more frequently. From stealing your personal or financial information to tracking your location and monitoring all your internet activity, there are individuals as well as organizations who would have no issue with prying into your internet activity or personal life. Stealing someone’s personal information is so easy that there are links which, when clicked, gather all your personal information like your name, phone number, address, and device information. This is quite a cause for concern as one can never know how this might be used by the thief. Where hackers look to steal your identity and personal data, government organizations look to monitor your internet activity in order to keep your activity in check in the name of national security. Since nobody would like their activities monitored, let alone their personal information being stolen, anonymous web surfing is essential in today’s world. How to surf anonymously Anonymous surfing can be achieved by the help of anonymizers, which are relays that connect you to your destined web address. Anonymizers are commonly referred to as web proxies , VPNs or other online anonymity enhancing services. Anonymizers help you hide your identity while on the internet. This is because they act as relays for all the traffic between your system and the internet. In case of a proxy, the web address you are browsing thinks that the IP address of the proxy server is your address, making it harder to track your location or monitor your activity. There are a few things you need to know about proxies first: They do not guarantee access to all websites as the proxy for a website might be blocked as well (countries like China where heavy bans of internet usage of users are present employ such methods) Although a tracker cannot simply look at your internet activity, the proxy server can. It is important to check if the proxy server is secure (it should have an HTTPS url). One must also be wary of fake proxy servers which act as centres for collecting users’ personal information. Proxies are generally free to use as they only provide a relay but do not encrypt your online data. Using a VPN is another method to surf anonymously on the internet. VPNs connect you to the internet through an encrypted tunnel. The IP address visible to others it the address of the VPN server through which you are connected to the internet. They offer another functionality which makes them superior to proxy servers in that they encrypt all the packets exchanged between your system and the computer. So not only do VPNs hide your IP address, they also keep your data safe. Related: Proxy Vs. VPN. A third option to increase one’s privacy online is to use anonymous browsers. Tor Network Is an example of such browser. Tor Network is a privacy network designed to hide information of which computer actually requested the traffic. Routing traffic through different nodes, it makes it difficult to say whether your computer initiated the connection or it may just be acting as a relay, relaying that encrypted traffic to another Tor node. Related: Tor Network Browser Anonymity There are many threats to your personal data being exposed while you are surfing on the internet. Your location, identity, personal information, including interests and behaviour patterns can be ‘sniffed’ online. That information can be exploited without your knowledge. Therefore, you are encouraged to use a combination of anonymity services for desired security and privacy level. What can you do to minimise personal data breach? Change social media settings – Make sure you change your privacy settings so that not everyone can see your posts. Use a VPN – VPN stands for “virtual private network,” which is masks your online identity. It comes in particularly handy when using free wi-fi in coffee shops, hotels and airports, where more and more hackers are using simple “man in the middle” attacks to trick people into logging onto their fake networks. Know the risks of using cloud services The rule of thumb is to never put something on the cloud that you wouldn’t mind being stolen. Bypass phishing attacks Scammers often will use emails that look like legitimate companies in the hopes of tricking you into clicking on links and providing them your password, social security number and more. These are called “phishing” attacks. The best way to avoid this is to simply bypass the email and go directly to the website by opening a browser. Beware Suspicious Emails and Attachments A lot of malware is hidden in an attachment that is downloaded by accident. Also bad links can lead to spoofed website. You should never open an email from an untrusted source and always question emails that ask for your personal info. Don’t forget anti-malware software Almost everyone is familiar with antivirus software. Less common is “anti-malware” software. Many anti-virus software includes the ability to scan and prevent malware, but not all of them. To be safe, supplement your existing antivirus software with quality anti-malware software such as Malwarebytes. Remember to always keep your security software up to date with the latest versions. Due to popular demand among our clients and the changing internet user behaviour, we have enabled NordVPN Service on 6 simultaneous devices. Global average of devices used per user currently hovers around 3.4 mark. We wanted to make sure NordVPN reflects this trend and chose to offer an appropriate number of simultaneous connections our VPN allows. We want to make sure our clients are secure at all times – thus, we introduced a feature of being able to connect to 6 devices at the same time. Online Security is the promise we deliver daily and if you need to protect more devices – we are eager to help. almost all hotels provide wireless Internet to their residents. And no wonder why – Wi-Fi is more important to guests than parking, good location or even continental breakfast, a research in the US shows. Wi-Fi connections usually require you to enter information like the room number you are staying in and a password that has been provided for your particular room. Smaller hotels tend to have one password for all the rooms. Most often, authentication step before establishing a connection is avoided, making the internet connection completely open. In both cases, even if the authentication is put into place, the connection can be easily intercepted and breached. Since hotels usually have a lot of people staying in their rooms at any given time, this makes you vulnerable to data snooping and/or serious hacking by someone else in the hotel. Hotel Wi-Fi security is pretty lax. Open Wi-Fi connections makes them really open to attacks, such as identity thefts and data snooping. Anyone can monitor your Internet activity when you are using an open network. One does not even have to be really knowledgeable in hacking to snoop on your Internet activity as there are software like Wireshark that makes it absolutely easy to spy on someone’s online traffic on an unsecured network. Open networks do not use any kind of encryption for the data you receive and send on the Internet. The usage of plaintext messages, i.e. messages without any sort of encryption, makes it really simple for anyone snooping your activity to read those messages. This makes open Wi-FI networks of hotels hotel susceptible to hacking attacks. Most websites on open networks do not use a secure protocol or an ‘https’ URL, which makes monitoring one’s activity on those websites a piece of cake. So, sending sensitive information over such Internet connection is a recipe for disaster as anyone can intercept and read that personal information. How to protect yourself? Since hotel Wi-Fi security is pretty much non-existent, it is responsibility of a guest to protect himself or herself from possible data snoopers. There is a simple encryption method that can be used by anyone: using a VPN. VPNs, or Virtual Private Networks, connect you to the Internet through an encrypted tunnel. A connection between your system and any website is established via an alternate path than the Internet service provider would take you through, namely, the connection is made through a VPN server which encrypts your data. This VPN server acts as a relay between the Internet and your system. The website interacts with the VPN server, and the server interacts with your system. Since the interaction between the VPN server and your system in encrypted, nobody can see which website you are browsing or what data you share online. All they can see is that you are connected to a VPN server. VPNs provide security and privacy thanks to their encryption functionality. Both of these are required when using a public Wi-Fi network in a hotel. A VPN service is a great tool for travellers in general: by choosing a different server location, your IP address is hidden and new one is assigned, so you can bypass geo-blocked content and access restricted online services wherever you are.
<urn:uuid:c94ae932-ab6e-4147-af6d-8c58e01a3b2d>
CC-MAIN-2021-43
http://www.cloverx.net/10-reasons-to-hide-your-ip/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585381.88/warc/CC-MAIN-20211021040342-20211021070342-00550.warc.gz
en
0.938335
2,503
3.265625
3
Purchase a Copy Today Make sure you order your copy of "The Only Unavoidable Subject of Regret" by Mary Thompson. George Washington’s life has been scrutinized by historians over the past three centuries, but the day-to-day lives of Mount Vernon’s enslaved workers have been largely left out of the story. Historian Mary Thompson's new book, "The Only Unavoidable Subject of Regret": George Washington, Slavery, and the Enslaved Community at Mount Vernon explores the enslaved community. Thompson recently answered questions about her new book. The book examines both George Washington’s relationship with slavery as an institution and with slaves as people. In addition it shines light on what daily life was like for Africans and African-Americans who were enslaved at Mount Vernon, as well as for those people of European background who were hired and indentured by the Washingtons. Research for what became the book began in the late 1980s, when it was clear that Mount Vernon—and other historic homes/locations in Virginia—needed to learn more about and interpret the story of slavery at their particular sites. I wrote up my findings on four of the topics in 1993, as background material for staff and interns working at the Pioneer Farm site and those later involved in what we then called “The Slave Life Tour.” There were other historians working on books about slavery at Mount Vernon, but it was taking a very long time for them to complete their works (something about which I am much more sympathetic now, than I was at the time). Two of those individuals, Henry Wiencek and Fritz Hirschfeld, completed—and published—their books, but I was disappointed in the results. Two others, both of whom were history professors, had health issues that were interfering with the completion of their work. So it eventually looked as if the only way the topic was going to be dealt with, was if I did it—and like it was for the others, there were health and other issues that impeded progress. Make sure you order your copy of "The Only Unavoidable Subject of Regret" by Mary Thompson. I’d like readers to come away with an understanding that the enslaved people at Mount Vernon were real people, that they were individuals living under a dreadfully stressful and physically difficult system, who still managed to make lives for themselves and to survive. They had families, made friends (and enemies), played together, cried together, and tried to resist the system that held them in bondage. I would also like readers to understand how deeply-rooted and entrenched slavery was as a social and economic system in Virginia by the 18th century, so much so that trying to get out of slave-owning was pretty much impossible for most of George Washington’s life. When it became possible, Washington found himself beset by economic problems and pulled away into national politics, that drew his time and attention. He never gave up, however, wanting to ultimately do the right thing and free the people he could. About thirty years, although for a lot of that time, it didn’t know that it wanted to be a book. I also worked on several other book projects during those years: “In the Hands of a Good Providence”: Religion in the Life of George Washington (2008); The Mount Vernon Ladies’ Association: 150 Years of Restoring George Washington’s Home (2010); Dining with the Washingtons: Historic Recipes, Entertaining, and Hospitality from Mount Vernon (2011); and A Short Biography of Martha Washington (2017), to name a few. The title comes from the following statement that George Washington seems to have made to one of his early biographers, his former military aide, David Humphries: The unfortunate condition of the persons, whose labour in part I employed, has been the only unavoidable subject of regret. To make the Adults among them as easy & as comfortable in their circumstances as their actual state of ignorance & improvidence would admit; & to lay a foundation to prepare the rising generation for a destiny different from that in which they were born; afforded some satisfaction to my mind, & could not I hoped be displeasing to the justice of the Creator. There were a number of things: the fact that there were sometimes three and four generations of the same family living on the plantation; that as late as the last couple of decades of the 18th century, there still seemed to be a knowledge of African languages among the enslaved people; the indications that there were Muslim slaves at Mount Vernon. On the Washington side, just how strict George Washington was and his distrust of pretty much everyone who worked for him, white and black. The sources included George Washington’s diaries and letters, as well as the weekly work reports that were turned in by his farm managers, financial ledgers, and Martha Washington’s correspondence. Letters and journal entries by visitors, both American and European, who came to Mount Vernon were often very helpful, as were reminiscences by other Washington and Custis family members, neighbors, descendants of the enslaved people on the plantation. Government records could also be of great use in tracking people through time. Daily life was filled with work, from dawn to dusk, six days a week. For a number of families, those in which husbands and wives were assigned to work on different farms, and because slaves generally lived on the farm where they worked, it meant they could only be together on Saturday nights and all day on Sunday. So the children in those families were largely raised by single mothers during the week. Days off were times to be together with family and friends, play games, to take produce, chickens, and eggs from their own family gardens to Alexandria to the Sunday market. The majority of the slaves lived in small wooden cabins near the fields where they worked. Living conditions tended to be crowded, because families were often large; crowding could lead to the rapid spread of communicable diseases (generally respiratory issues in the winter and gastrointestinal problems in the summer). The cabins were small, with dirt floors and unglazed windows that could be closed by means of shutters. They would have been hot in summer, cold in winter, and dark. We know from the reminiscences of Martha Washington’s grandson and a white woman who grew up in Alexandria in the early 19th century, that both traditional African folk tales and personal stories about growing up in Africa, being captured, and brought to America, were being told in the Mount Vernon slave quarters. These would help to transmit both culture and history to the children being raised in those cabins. There is evidence that slaves from Mount Vernon were worshipping with several Christian denominations in the area, and that there was at least one religious leader, an enslaved man named Caesar who worked in the fields during the week, and preached on Sundays to the slaves. There is also evidence for the practice of both traditional African religions and Islam on the plantation. Examples of two mouth or jaw harps were found here by archaeologists and date to the 18th century—these were simple instruments that required little to no training to play. We know from other plantations that music was a major element in slave life, but there are no 18th-century descriptions of music in the Mount Vernon slave quarters. There are a number of wonderful examples of African-American music at or near the plantation in the 19th century. Both white and black workers found George Washington difficult to work for. While he was very clear about his expectations, which was a good thing, he tended to be something of a workaholic and expected everyone else to share his work ethic, not understanding that they did not have the same incentives to work long and hard that he did. He was always disappointed—and angry—when he learned that people had let him down once again. He tended to be very caring with those who were sick, but often had doubts that his slaves were really sick (pretending to be sick was a not uncommon method of resisting slavery). In cases where people were genuinely ill, he often had doctors brought in or sent the person to a specialist for treatment. By doing this he was protecting his investment in the person, but he also genuinely sympathized with the sick, since he himself had had several severe illnesses in his life, from which he did not expect to survive. Those views seem to have changed during the American Revolution, a time when he had to realize the hypocrisy of fighting for liberty and freedom, while holding other people in life-long bondage. It was also during the war that he traveled away from home and lived for years in colonies/states which were “societies with slaves,” as opposed to “slave societies,” in which slavery was practiced on a large scale and was the basis of the economy. In these other parts of the country, he could see agriculture being successfully carried out by hired white workers, rather than slaves. Washington also headed an integrated army and could see African-born and African-American people doing a fine job as soldiers. And he came in contact with ardent young abolitionists, whose opinion he valued: men like Alexander Hamilton; John Laurens; and the Marquis de Lafayette. Martha Washington shared many of her husband’s negative beliefs about slaves and others who worked for her. She also expected assignments to be done well and in a timely fashion. She seems to have developed especially close relationships with those who served as her body servants/lady’s maids and with the seamstresses & knitters who worked with her to produce clothing for the other enslaved people on the estate. Within the last twenty years or so, many people have been very critical of Martha Washington for not seeming to be as advanced as her husband on the issue of the abolition of slavery. While he made arrangements to free his slaves after his death, she did not free her own dower slaves. It might help to think about some things to help put her in context: a) Martha Washington would never have seen the black soldiers in battle (although she was with the army for half of the war, she was not with them on the march or in the field). Although she knew all three of the young men who so influenced her husband, she would not have stayed at the table after dinner, talking with them about issues like abolition. So her education on this topic was different than that of George Washington. b) Martha Washington did not own the dower slaves, so she could not free them. Her first husband, Daniel Parke Custis, had died without making a will. According to both British common law and 18th century Virginia law, in such cases, the man’s widow received a life interest in/lifetime use of one-third of his property, including the slaves (the other two-thirds would go to the other heirs when they either reached adulthood or were married). This is so that the widow would be taken care of until her death, after which her one-third share was to be divided among whatever heirs of that first husband were still alive. If she remarried, that new husband would have control of the dower property, but he could not sell or free those slaves. In this case, after Martha Washington’s death, her share of the dower property, including the slaves, was divided among her four Custis grandchildren. The one slave she owned outright, who was purchased by her after George Washington’s death and could have been freed by her, was bequeathed to her grandson. c) It is important to remember that, as a devout 18th century Virginia Anglican, Martha Washington would have had it drilled into her from childhood that among her most important religious obligations was to do her duty to God, her family, and her community. From the time she was 26 years old and her first husband died, she would have felt that it was her responsibility to keep together the Custis dower estate for those heirs, in order to provide for them. For forty-five years, this would have been something she felt she had to do. At almost 71 years old, she did not have the will or the energy for a landmark legal case to free the dower slaves and disinherit her grandchildren. Mount Vernon was the home to hundreds of enslaved men, women, and children. Washington depended on their labor to build and maintain his household and plantation. They, in turn, found ways to survive in a world that denied their freedom.Learn More
<urn:uuid:3232476d-c66d-4dca-bd3e-f47af383d21a>
CC-MAIN-2021-43
https://www.mountvernon.org/library/author-interviews/the-only-unavoidable-subject-of-regret/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00349.warc.gz
en
0.99069
2,588
2.875
3
When Europeans came to America for the first time they brought with them the European Honeybee. It was a source of life for the early settlers, giving them both honey and pollinating their crops. There were of course other species of bees living in America already which did not produce honey but did help pollinate crops and still do today. Since then the Honeybee has been a major part of agriculture in America. “Large acreages of pollinator-dependent crops, such as apples, almonds, blueberries, and cranberries, require managed pollinators to ensure production. The ability to easily move and manage honey bees, Apis mellifera, makes them ideal for this purpose. In all, it has been estimated that directly, and indirectly, one-third of the food we eat comes from honey bee pollination.” (Vanenglesdorp, 2010). However as commercial agriculture grew and became more mechanized and chemical so too did apiculture or beekeeping. Hives have been exposed to chemical fertilizers, pesticides, genetically altered flowers and crops, and worst of all have been fed syrups and fillers instead of being allowed to gather nectar naturally. All these things have helped bring about one of the largest crises that our world has faced yet, Colony Collapse Disorder in honeybees. Colony Collapse Disorder can be defined by a few different things, but commonly is known to show a few common symptoms which can be used as a gauge for finding CCD. The symptoms associated with CCD are “1. The complete absence of adult bees in colonies with few or no dead bees in/ around colonies; 2. The presence of capped brood; and 3. the presence of food stores that are not robbed by other bees or typical colony pests.” (Ellis et al. 2010). There are also certain symptoms associated with a collapsing colony and can be used to diagnose weakening colonies. “1. An insufficient number of bees to maintain the amount of brood in the colony; 2. The workforce is composed largely of younger adult bees; 3. The queen is present; and 4. The cluster of bees is reluctant to consume food provided to them by the beekeeper. (Ellis et al. 2010). In lamens terms Colony collapse Disorder is the disappearance of large amounts of adult bees from an individual hive or colony with no dead bees found or probable cause. A survey was done in 2010 showing declining bee populations over the last 60 years. From 1940-2008 data was taken from apiaries with more than 5 colonies. The results show clearly a he drop off in population sizes over the last 10-15 years. In 1940 there were approximately 6 million bee commercial honeybee colonies. By 2008 there were less than 2.5 million commercial bee colonies. According to Ellis et al. 2010, this data was taken from the National Agricultural Statistics Service in 2009. In the documentary “Vanishing of the Bees”, they show that every year beekeepers are reporting 1/3 losses of their adult bees due to CCD. If this were to happen to any other food source it would become an instant national disaster but since they are insects the beekeepers do something called splitting the hive, where they cut the hive numbers in half and add a new queen to the one half in a new hive box and begin accumulating new bees. Bees like all insects reproduce very quickly and so in a short time they can recoup their losses, but this is a short term solution. (Vanishing of the Bees, 2009) If Colony Collapse Disorder is causing such a vast drop off in honeybee numbers around the world and specifically in the US, what can be causing this? There are many hypotheses. One of the most prevalent is that the exposure to pesticides is the cause (Vanengelsdorp, 2010) (Frazier et al., 2008), while others say that exposure to mites, fungi and disease is the cause (Higes et al., 2009) (Maori et al., 2009) (Bromenshenk et al. 2010). Another theory is that the use of syrups and fillers fed to bees in order to fast track production and artificial insemination of queens is the main cause. (Vanishing of the Bees, 2009). On the whole though no one cause has been found or agreed upon, though all agree this problem is threatening agriculture as we know it today and the future of bees in general. The first possible cause, pesticides, is thought to be more of a contributing factor than the main cause. In a study in 2008, What have pesticides got to do with it? (Frazier et al.) discussed how the use of most of the nation’s hives of honeybees are used for rotating crop pollination in large commercial farms. They are exposed to large amounts of pesticides as a result. There is also a large amount of miticides used in the hives directly to help combat the mites that have been now linked as another possible cause of CCD. The real concern with the pesticides being a contributing factor in CCD is not the lethal doses, we now are seeing that non lethal doses are lowering the bees immune systems and allowing for other diseases to attack the hive and take it down. “We are becoming increasingly concerned that pesticides may affect bees at sublethal levels, not killing them outright, but rather impairing their behaviors or their ability to fight off infections. For example, pesticides at sub lethal levels have been shown to impair the learning abilities of honey bees or to suppress their immune systems. For these reasons we believe that pesticide exposure may be one of the factors contributing to pollinator decline and CCD.” (Frazier, 2008). The second possible cause is mites, viruses, and fungi. In a study by Higes et al. 2009, it was proposed that Nosema ceranae a fungi Microsporidia was a main cause of CCD. “There was evidence of epithelial cell degeneration and extensive lysis. As described previously, heavily infected cells may be either dead or dying, which will eventually lead to the early death of the infected workerbees due to starvation.” (Higes et al. 2009) This fungi heavily impairs the hive as a whole and the infected bees found to be infected did not have other diseases, which could mean that this is a main cause of CCD. Another study by Bromenshank et al., 2009, also confirmed this. This study however also looked at another disease an iridovirus. It did not show that iridovirus on it's own could cause CCD which further shows that microsporidia is a more likely cause. Iridovirus though is most likely a contributing factor. In a study, Maori et al. 2009, they discuss how the iridovirus is able to be silenced with the ingestion of dsRNA. This was tested on nemotodes and proved to be successful. “RNA silencing down regulates gene expression by degrading RNAs in a sequence-specific manner, arresting the translation of a designated mRNA, or engendering transcriptional gene silencing involving DNA methylation and chromatin remodeling.” (Maori et al. 2009) The last possible cause was discussed in a 2009 documentary, The Vanishing of the Bees. They showed how many hives are now being fed syrups and fillers in order to produce more and more honey with less and less bees. This is causing the entire health of the hive to decline. It is compared to feeding your children nothing but junk food and then their children and then their children. Eventually you wold have harmed your entire genetic fitness of the family and they would be riddled with disease. The believe this is what is happening with the bees who have CCD. They also discuss CCD being caused by genetic engineering and artificial insemination of queens for certain traits. This is further harming the hives as a whole. Their overall fitness has decreased considerably. The cause that seems the most plausible is the combination of all of these. One common symptom of Colony Collapse Disorder in honeybees when scientists study them is a large amount of diseases. It seems that their immune systems are compromised drastically. “The condition of the quality of the brood pattern was also noted with areas of capped brood containing less than 80% viable brood.” (Vanenelsdorp et al. 2010) I hypothesize that the pesticides, miticides and genetic engineering and poor diet are all lowering the honeybees immune system to the point where the microsporidians and iridoviruses can take over, killing off whole hives in a matter of days. It would be as if humans all had AIDS or another immune suppressing disease, and as a species this had become normal. Well what would happen if the flu ran through a society riddled with AIDS? We would die off in force. It would very quickly decrease our population within a few weeks even, to numbers so low that we probably could not recover. This is what CCD is doing to bees. The problem is when people began to mess with bees in a large way, exposure to pesticides, genetic engineering.. we reduced their fitness. We tried to domesticate an animal that does not do well being domesticated. So what can be done about CCD? Many of the sources I read all had the same thing to say, but the documentary, Vanishing of the Bees, 2009, went into the most depth. They proposed that instead of large beekeepers who keep thousands of hives, that thousands of people need to have 1 hive each. They are calling for anyone who would like to help to raise bees in their yard or small farm, organically, with no filler food, no interference, and no exposure to pesticides. It is theorized that if even a few thousand small organic farmers each kept one small hive we could start to turn CCD around in a few years. Colony Collapse Disorder is a true threat to not just bees but to humans everywhere. If the answer is such a simple one, it begs the question, what are we waiting for? Maori, E., Paldi, N., Shafir, S., Kaley, H., Tsur, E. 2009. IAPV, a bee-affecting virus associated with Colony Collapse Disorder can be silenced by dsRNA ingestion. Insect Molecular Biology. 18 (1), 55–60 Blackwell Publishing Ltd Neumann, P., Carreck, N. L. 2010. Honey bee colony losses. Journal of Apicultural Research 49(1): 1-6 Bromenshenk, J. J., Henderson, C. B., Wick, C. H., Stanford, M. F., Zulich, A. W., Jabbour, R. E., Deshpande, S. V., McCubbin, P. E., Seccomb, R. A., Welch, P. M., Williams, T., Firth, D.R., Skowronski, E., Lehmann, M.M., Bilimoria, S. L., Gress, T., Cramer, R. A. Bromenshenk JJ, Henderson CB, Wick CH, Stanford MF, Zulich AW, et al. (2010) Iridovirus and Microsporidian Linked to Honey Bee Colony Decline. PLoS ONE 5(10): e13181. vanEngelsdorp D, Evans JD, Saegerman C, Mullin C, Haubruge E, et al. (2009) Colony Collapse Disorder: A Descriptive Study. PLoS ONE 4(8): e6481. vanEngelsdorp D, Hayes J, Underwood RM, Pettis J (2008) A Survey of Honey Bee Colony Losses in the U.S., Fall 2007 to Spring 2008. PLoS ONE 3(12):e4071. Higes, M., Martín-Hernández, R., Garrido-Bailón, E., González-Porto, A. M., Nozal, M., Bernal, J. 2009. Honeybee colony collapse due to Nosema ceranae in professional apiaries. Environmental Microbiology Reports. Frazier, M. T., C. Mullin, J. Frazier. 2008. What Have Pesticides Got to do with it? Amer. Bee J. 148:521-523. Frazier, M. T., C. Mullin, J. Frazier. 2007. Preliminary Report to Sponsor on Pesticide Residues in Pollen, Spring 2007. The National Honey Board. Langworthy, G. 2009. Vanishing of the bees. Documentary.
<urn:uuid:28a94dab-78c8-4a5f-93a4-f6a4fc109fd9>
CC-MAIN-2021-43
http://www.thegreenmommy.net/2012/04/colony-collapse-disorder.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00590.warc.gz
en
0.94815
2,640
3.546875
4
The call came into 9-1-1 from a Spokane YMCA last October: A middle-aged man was threatening to break the kneecaps of an eight-year-old, because he said the boy could “ruin my NBA career.” Corporal Jordan Ferguson of the Spokane Police Department responded, fully aware of the suspect’s antagonistic and unpredictable behavior. Ferguson’s body camera footage shows what happened next. In the lobby of the YMCA, an employee first describes the man’s erratic statements. Ferguson tracks the man to the gym, who then walks away yelling. Rather than restraining the man immediately, Ferguson asks him questions and listens carefully and calmly, taking his time as the man vented and eventually admits to attacking several women on the local Centennial Trail earlier that month. The encounter resolved without hands-on force, in part because Ferguson had studied crisis intervention and motivational interviewing. Both are designed to help mitigate the aggressiveness of someone with mental illness. “We were ready that this might be a violent struggle or we’d have to use some physical force,” says Ferguson. “However, using the motivational interviewing not only calmed him down, but we had him agree to get psychological help and had him agree to let us put handcuffs on.” Following high profile, tragic shootings and assaults by police around the country, demand has grown for new training methods and better ways to handle tense encounters. Police require better tools—like crisis intervention training—to de-escalate confrontations in the communities they serve, especially when they interact with people with mental illnesses or when there’s racial tension. Ferguson and other Spokane police officers learned intervention skills from, among others, faculty at Washington State University Spokane, who in turn have begun to research the effectiveness of the training. Meanwhile at WSU Pullman, criminologist David Makin ’12 PhD studies how body cam footage and realistic, relevant scenarios can help train police officers to more effectively handle interactions in communities of color and interactions with those experiencing mental health crises. The stakes are high. Dash cams, body cams, and smartphones are spotlighting the use of force by police in ways society has never before seen. “We have to train officers that they have other tools,” says Makin. “A service revolver is not a compliance device.” Outcomes don’t always work out positively. The complexity of what officers face each day can easily devolve into deadly force. Crisis Intervention Team (CIT) training was born from just such an encounter in 1988, with the fatal shooting of a man with a history of mental illness and substance abuse by a Memphis, Tennessee police officer. “You can’t ensure a good outcome even when someone does everything right. You can do everything right and it still turns out as a tragedy. Other times you really screw it up and everything turns out well,” says Bryan Vila, a criminal justice professor at WSU Spokane and a veteran police officer. To improve the odds, criminal justice researchers Vila and Stephen James ’15 PhD, along with Matthew Layton, a psychiatrist and clinical associate professor with the Elson S. Floyd College of Medicine, work with the Spokane Police Department (SPD) on intervention training. Vila and James examine the impact of such training on officer behavior in the WSU Spokane Simulated Hazardous Occupational Tasks lab, which measures performance by police officers in simulated operational tasks such as distracted driving simulations and deadly force. Vila and James also examine the effects stressors, such as fatigue, have on officer performance. The vivid—so realistic it makes an onlooker’s heart race—deadly force simulator that Vila demonstrates, as he wields a laser-equipped pistol and faces down an armed criminal on video, punctuates the split-second decisions officers must make. Fateful decisions in a very real situation brought CIT to the fore in Spokane. On March 18, 2006, police responded to an erroneous report that Otto Zehm, a 36-year-old mentally disabled janitor, had stolen money from an ATM. The officers beat Zehm with batons and shot him with Tasers, then bound his ankles to his wrists. Zehm lapsed into a coma and died two days later without ever regaining consciousness. Following the death, which was eventually ruled a homicide, Layton was asked to do just four hours of mandatory mental health training for the SPD and the county sheriff’s department. The officers were skeptical at first. “I started at 8:15 and at 8 the officers had their weapons check. So I start this training and I have 50 officers with all their weapons on the table when I start,” says Layton. “A big bald guy in the back says, ‘All this mental health stuff is subjective. I could pump six rounds in your chest from back here and say the voices told me to do it, and get away with it.’ “I said, ‘Why don’t you tell me how you really feel about being here.’ Everybody laughed and exhaled. It was so tension-packed. I had to establish rapport with every group, and have them understand I did not want to turn them into social workers, but try to figure out when their usual approaches are not working.” Full CIT came in 2012 as a result of a civil lawsuit by Zehm’s family, requiring 40 hours of training for the whole force. It had never been done on such a large scale in the United States, and offered not just a new technique for officers, but a research opportunity on the effectiveness of CIT. The course, taught by mental health professionals like Layton, showed officers how to identify key symptoms of mental illness and had them practice de-escalation techniques. The goal is to get mentally ill or addicted people the help they need instead of incarceration. James took CIT to the next level, by analyzing what makes crisis situations difficult for first responders. While CIT has been proven to increase officer empathy and lower arrest rates of mentally ill people, little empirical validation has been made on how effective CIT can be. He and his wife Lois James ’11 PhD, a criminologist with WSU’s nursing college, used concept mapping focus groups to measure the totality of police encounters. After winnowing down important factors with the help of law enforcement and mental health professionals, the couple sent a survey to hundreds of law enforcement and mental health professionals across the country. They could then prioritize key elements for CIT, such as knowing the history of a suspect or the ability to read nonverbal cues of a person in crisis. “Lois and I conducted that research and handed the results to Frontier Behavioral Health, Matt Layton, and Captain Keith Cummings from SPD. They took the results of our study and turned it into learning objectives for the Enhanced CIT program,” says James, who was aided in the analysis by a background in information technology. He did similar focus groups with minority members of the community. James points out that measurable outcomes lead to better accountability as well as direct application. “We give law enforcement a tremendous amount of power. They’re the only ones in our society who can legally use force to coerce someone to do what they want, without due process. We give them this power and rightfully hold them accountable, but we should only hold them accountable for what they can control.” The study led to Enhanced CIT, an intensive 65 hours of training, in addition to their 40 hours of basic CIT, for officers who volunteered. “ECIT is for the people who have the heart for this and want to go into these situations. We want them to have a special expertise, just like we have a SWAT team,” says Layton. The first group finished ECIT in April, after training at a methadone clinic with Layton, mental health clinics, Sacred Heart Medical Center’s triage unit, and Excelsior Health for mentally ill kids. Ferguson, Vila’s graduate student and a 16-year veteran of SPD, certified through the ECIT training. He describes one of the approaches with a humorous counter-example. “In the movie Airplane, there’s a lady that was screaming, and everyone kept shaking her and slapping her, telling her to calm down. That is so inherent, when somebody’s upset, you want to grab them and say ‘Calm down.’ Yet it’s the worst thing you can do. Using motivational interviewing makes them feel validated, and voice what’s going on inside them, so they calm down themselves.” James helped organize a conference held at WSU Spokane last July with the researchers, SPD, Spokane Fire Department, Veteran’s Administration, and mental health organizations to showcase the coordinated efforts to serve people with mental illness. It drew police officers from all over the country and another conference is scheduled for July 2016. Layton, who took part in the conference with James and Vila, says he has also learned from the experience. “I used to think in teaching I need to tell you what I know. Now I am much more collaborative. I can help officers understand that the bad guy might be acting bad for other reasons.” Ferguson and other police officers see CIT as a valuable tool in their daily work, helping suicidal individuals and others in distress. He describes another encounter with a woman whose delusions caused her to believe she ruled Spokane and her father was John Lennon. Ferguson spent 15 minutes with her, not agreeing with her but not arguing either. Eventually she calmed down enough to let him get her to help. “If we could do this whole job without using force on anybody, that would be ideal,” he says. “I just don’t think that’s ever going to happen, but the amount of times we can reduce the use of force and get cooperation from people, not hurting them, makes a safer community.” When officers do have to use force, body cams and other videos show it to the world. But accountability for police is just one way law enforcement and society can use this expanding technology. The footage can help shape officer training. “We often think the key thing with body cams is to hold the officer accountable,” says Makin, an assistant professor in WSU criminology and criminal justice department and Research Fellow at the Washington State Institute for Criminal Justice who has researched body cams and training. “But in many ways this is a phenomenal training device.” Makin studies problem-based learning for cadets at police academies, a method to introduce realistic scenarios in training and build confidence in recruits as problem-solvers. Body cam footage would let trainers introduce real-world scenarios that reflect both good and bad ways to handle policing situations. “Much of what an officer does is invisible policing. It never gets captured,” says Makin. “Body cams are going to be so beneficial. It’s going to give us glimpses into the officer’s world in a way we’ve never been able to obtain.” Problem-based learning attempts to bring critical thinking skills to new officers, while also conveying the legal, defensive, and administrative knowledge they need to be cops. Makin writes that, while traditional training is adequate, it focuses on making police compliant soldier-bureaucrats. Problem-based learning, with its emphasis on analyzing situations, could help officers become competent practitioners. Body cam footage potentially could increase competency. A recent example from a training session by Makin shows how it might work. After an interaction, the officer could see “it wasn’t misconduct by any means. But he goes back to the footage and says ‘You know, I really handled that inappropriately. I was maybe a little bit rude in dealing with these two young men.’ He corrects his own behavior.” Makin has worked with the Washington state police academy and several other agencies to improve training and help instill better techniques in new police officers. He also acts as a research partner in Idaho on mental health and criminal justice issues. He says body cams can also give communities a better total view of how police work with minority communities. “Baltimore, Atlanta, and Ferguson, Missouri are going for body cams. These are both large and small agencies, and it can show the antagonistic nature of some encounters when we interact with certain groups. Before it was just from the officer’s perspective or the community’s perspective.” Makin says even though bystanders with smartphone cameras can capture selectively, body cams that turn on when an officer responds to a call can show full interactions and results, negative and positive. “We had dash cams but those were just for traffic stops,” says Makin. “Now we see what it means to be an officer. We have so many great officers and we haven’t been able to highlight that.” Makin has a large study expected to be released this spring exploring the officer perspective and organizational factors contributing to a successful implementation of the device, which could lead to more training opportunities with that footage. However, he says body cams are not without problems. “If officers know they are in a research study and have body cameras, they change their behavior. We haven’t been able to control for that,” says Makin. He continues: “We do worry about unintended consequences as witnesses might not be so willing to talk. It takes the police interaction out of an informal to a formal relationship because of the camera.” The new training Vila says the work at WSU can lead to more valid, empirically based training, but it’s not always understood by law enforcement. “There are over 18,000 police agencies in the United States, each with their own standards for police training. They think ‘valid’ means we all agree. They don’t understand validity the way we do, which follows rules of evidence and science. We need to change that mindset,” he says. The work is beginning to get some traction. James recently spoke to the International Association of Chiefs of Police (IACP) about the CIT studies. He, Lois James, and Vila give about one or two presentations a month throughout North America, including Canada. Stephen and Lois James are the successors to Vila’s lab. Vila says they are uniquely qualified to continue the work: “People who came up through the WSU criminal justice and criminology program get neuroscience, public health, and physiology. They’re not observers, but participants in the research.” Vila notes that Lois is doing much of the same investigative work in nursing, and recently was chosen to serve on the research advisory committee of the IACP because of her studies on race bias, sleep, and performance. It’s a high honor for a young academic. Stephen James says the research work in criminal justice makes sense in WSU Spokane’s health sciences programs. “Criminal justice and public health go hand in hand. As one fails, the other one picks it up.” The Jameses are also joined by Jacqueline van Wormer ’90, ’92 MA, ’10 PhD, an assistant professor who analyzes the efficacy of community courts versus traditional justice models. Together they hope to place policing and police training within the total response of the community to people with mental illness. All of the researchers point out that the most important aspect of training for police is how it applies on the street, and measuring whether or not it actually reduces shootings and assaults. “The big secret is no one has ever measured the impact of deadly force training, the biggest chunk of training an officer gets in the academy,” says Vila. “No one knows if there’s a connection between doing well in training and doing well in the real world.” Makin agrees that law enforcement officers must feel that training—whether it’s crisis intervention or problem-based learning—can work on the street. “We send officers to diversity training. But if you think of an area that’s 30 percent Russian, and they’ve gone through this training that only talks about how you interact with a population that’s black or Latino, they say, ‘This doesn’t apply to me.’ “Ultimately, they have to see how it’s effective, how they will become more efficient,” says Makin. James would like to see new training come to basic law enforcement academies as well as continuing training for veteran officers. “Someone needs to sit down, take a deep breath, and look at all the changes in policing in the past 20 years. Look at everything that’s worked, if we can measure it. Look at the core skills of policing and what society wants out of police now,” he says. Through crisis intervention techniques, realistic training scenarios based on body cam footage, and scientific analysis of training effectiveness, police officers can become even more competent and successful, especially working with diverse communities and people with mental illness. It could help change perceptions of police as well. Sometimes, says Vila, “The general public believes what they see on television, police shooting guns out of people’s hands and other magical things that don’t work in the real world. That’s not how policing happens.” Anecdotal evidence, like Ferguson’s YMCA encounter, are showing the way. In the lab, Layton turns around his laptop and shows a news report from KXLY Spokane, aired on a Saturday during the Enhanced CIT training. An onlooker’s cellphone video shows police responding to a naked man on a residential street, rolling around and yelling incoherently. The officers didn’t restrain him or draw weapons. Instead they kept him contained as he calmed down until an ambulance arrived. The people watching applauded as the man was loaded onto a gurney and taken to get the medical help he required, and not into the back of a police cruiser to be booked into jail. On the web Police Body Camera Pilot Program – Spokane Police Department; reports and recommendations Video: WSU Health Sciences Update – Bryan Vila and Steve James The latest episode of the Health Sciences Update features Criminal Justice researchers Bryan Vila and Steve James talking about their innovative research and an upcoming conference on campus this summer featuring the Spokane Police Department.
<urn:uuid:160ce388-d39f-4145-a54c-df96b5373865>
CC-MAIN-2021-43
https://magazine.wsu.edu/2016/01/28/police-training-in-a-new-light/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583083.92/warc/CC-MAIN-20211015192439-20211015222439-00071.warc.gz
en
0.964496
3,929
2.53125
3
Here are 10 classes to accompany the primary 8 chapters to Orwell’s 1984. He is distracted by the sight of four gigantic glittering white pyramids: his workplace, the Ministry of Truth (in Newspeak, Minitrue), which controls the media and schooling; the Ministry of Peace (Minipax), which conducts struggle; the terrifying Ministry of Love (Miniluv), which maintains legislation and order; and the Ministry of Lots (Miniplenty) which manages monetary affairs. Orwell draws Winston’s love object lovingly. Orwell uses the idea of doublethink,” believing two contradictory ideas on the similar time, to clarify how individuals can have ridiculous ideas and be easily led. Syme tells Winston that Newspeak is designed to make it harder for people to suppose in complex ways. Standard terms like “Large Brother,” “Orwellian,” or “Newspeak” were all originated by Orwell in 1984. You must have the ability to answer the following questions after studying this 1984 Orwell research guide. As he recollected the ritual of Hate, Winston nearly mechanically writes Down with Big Brother” repeatedly in his diary. Complete your overview with the 1984 E book 2 Summary chapter exam. The preliminary printing of the latter was larger than the mixed product sales of all Orwell’s previous books. He is distracted by the sight of four gigantic glittering white pyramids: his office, the Ministry of Reality (in Newspeak, Minitrue), which controls the media and schooling; the Ministry of Peace (Minipax), which conducts battle; the terrifying Ministry of Love (Miniluv), which maintains regulation and order; and the Ministry of Loads (Miniplenty) which manages financial affairs. The memory of his mother realizes Winston concerning the love of parents from which the Get together has disadvantaged him. He tries to behave like he has accepted the Party, however he cannot disguise his love for Julia, which is still towards the legislation. Winston and Julia once meet within the ruins of a church that was destroyed in a nuclear assault “thirty years” earlier, which suggests 1954 as the 12 months of the atomic war that destabilised society and allowed the Party to seize power. The way during which the citizens are controlled through surveillance within the textual content and the elimination of ‘undesirables’ depict the alternative ways by which the federal government as an authoritative physique exercises absolute energy to self-discipline the folks and maintain them beneath control. Part 3 covers the episodes of Winston’s life after he and Julia are discovered by the federal government and re-educated. Throughout the movie, the character V” hides behind a mask of Man Fawkes, who tried to explode England’s parliament building on November fifth, 1605. By means of maintaining a diary, Winston commits thoughtcrime and is aware of that someday he will likely be discovered by the Thought Police and probably killed. After this rather brief overview on the biography of George Orwell it’s obvious that without the details mentioned above it is not possible to know the underlying emotions and fears in 1984”. For some cause, every time Winston’s identify is talked about, I think about Winston Churchill. He appears to be sympathetic towards Winston and Julia at first, but is quickly revealed to be a member of the Thought Police, leading to Winston’s eventual demise. At lunch time, Winston meets Syme, a specialist in Newspeak (new language), and begins to suppose that no matter Syme’s enthusiasm and laborious work, he must be killed by the authorities on account of his intelligence. Winston and Julia learn parts of the e book, which explains more about how the Social gathering maintains energy, the true meanings of its slogans and the concept of perpetual struggle It argues that the Social gathering might be overthrown if proles rise up against it. However, to Winston, it doesn’t answer ‘why’ the Occasion maintains power. Climax 7. ‘Brien tortures Winston in the Ministry of Love. Examples of apa type analysis papers, essay writing assessment criteria case study written in first or third particular person health associated argumentative analysis paper subjects narrative essay of 300 phrases essay on science ijadat in urdu, ought to an essay at all times have a title 1984 and at present’s society essay the alamo drafthouse case study resolution French in revolution essay french sat essay follow on-line , johnston merchandise case study knight’s tale essay. On this lesson, we are going to talk about George Orwell’s novel, ‘1984.’ After a brief abstract of the plot and the characters, we are going to talk about and analyze a few of its fundamental themes. To Winston’s shock, ‘Brien is aware of the total stanza. Robert Egbert describes is The movie’s 1984 is sort of a year arrived at through a time warp, an alternative actuality that looks constructed out of outdated radio tubes and smashed office furniture. Weeks later, Winston is approached by ‘Brien, who invitations Winston over to his flat, which is famous as being of far greater quality than Winston’s. Winston and Julia go to see ‘Brien and he enlists them into the Brotherhood, a secret group devoted to stopping Huge Brother. A Boot Stamping on a Human Face In Guide 2, Chapter 3, ‘Brien has been explaining to Winston that the purpose of the Occasion is to keep up power for its personal sake, not to make life better for others. Winston begins to assume that she is a member of the Thought Police and that she suspects his ideas towards the Get together. If this seems wasteful or unnecessary, Oceania is a state that’s in perpetual war to absorb the surplus financial exercise that will usually develop the financial system and transfer individuals to a extra luxurious life. Oceania, Eurasia and Eastasia aren’t international locations throughout the typical sense of the world, they’re conglomerates of power whereby infallible and all-highly effective Huge Brothers rule. In Nineteen Eighty-4, the Social gathering’s synthetic, minimalist language ‘Newspeak’ addresses the matter. Early within the novel, Winston meets Julia, another employee on the Ministry of Fact, whom he has been watching from afar. In the future ‘Brien speaks to Winston within the Ministry of Reality. Syme works with Winston in the Ministry of Truth. From Ebook One, Chapter VIII, this demonstrates the far-reaching power of the Party. Orwell “encapsulated the thesis on the coronary heart of his unforgiving novel” in 1944, the implications of dividing the world up into zones of affect, which had been conjured by the Tehran Convention Three years later, he wrote most of it on the Scottish island of Jura from 1947 to 1948 regardless of being critically unwell with tuberculosis eleven 12 On 4 December 1948, he sent the ultimate manuscript to the publisher Secker and Warburg , and Nineteen Eighty-4 was printed on 8 June 1949. Winston takes Julia to the ‘Brien’s condo. Winston himself notes that the Celebration has claimed credit score for inventing helicopters, aeroplanes and trains, while Julia theorises that the perpetual bombing of London is merely a false-flag operation designed to persuade the populace that a struggle is going on. Moreover, each regimes constantly demonized their enemies, simply because the Occasion and Large Brother do in 1984, by way of the Two Minutes Hate, Hate Week, and daily mass propaganda. His each transfer is monitored by the Thought Police, who’re liable for detecting dissent against the Celebration and its leader, Large Brother-and eliminating it. When he meets Julia, Winston thinks he might need discovered love, and a fellow loather of the Party. On the same time, Winston’s selection to start the diary (and his subconsciously writing “DOWN WITH LARGE BROTHER”) exhibits us the energy of Winston’s anti-Party emotions. It occurred at about eleven hundred that morning (time is stored in the twenty-4 hour methodology) through the Two Minutes Hate, a day by day propaganda presentation given to groups at their places of labor praising Large Brother, Oceania and the Celebration, and denouncing Emmanuel Goldstein, the figurehead of capitalism and the Celebration’s number one enemy, and Oceania’s current enemy of war. Andrew Clements from The guardian mocked the opera alling it each shocking and outrageous that the Royal Opera, a company of supposed worldwide requirements and standing, must be placing on a brand new opera of such wretchedness and lack of musical value.” And Andew Clarck of the Monetary Occasions said “only cause we find this slick perversion of Orwell on the Covent Garden stage is as a result of tremendous-rich Maazel bought his method there by stumping up the manufacturing prices,” While there has been more favorable reviews calling it edgy and inspired-Significantly the choice of creating Winston a baritone, and the villain a tenor which is usally the reverse in operas. After some time, Winston’s torture begins to work, and he agrees to things that he’s aware of is not going to be true. Winston views the regularities of his world – the face of Massive Brother, the telescreen, the dilapidated apartment complex, and the unhappy existence of his neighbor and her Social gathering-worshipping youngsters – with unhappiness and disdain. Just like the Hate, Winston is able to use language, a device that the Social gathering attempts to control, and switch it towards them. 1984 theme three: 1984 by george orwell summary Ideas Management by the use of Newspeak language. Even within the free world, many preserve, inroads have been made: industrial pursuits try to physician the news and generally succeed, elected officials are tempted to misrepresent the reality, Authorities businesses try and and generally do invade the privacy of the people, and military leaders feel compelled to cover some of their actions. Newspeak is no more than a software program of controlling people given that most advantage of Newspeak is that thoughtcrime might be unattainable in Newspeak. Chapter Three: ‘Brien tortures Winston more. Meanwhile, ‘Brien poses as a Brotherhood” member seemingly trying to find to ship down the Occasion and briefly groups up with Winston and Julia. The banner of the Party in the 1984 movie adaptation of the guide. The Rented Room and the Singing Prole Girl Each the rented room above the antique shop and the prole lady who sings beneath its window are symbols that mirror the short-term sense of safety and vain hope for a free world, as well as the freedom to like with out interference or control by the Occasion. 1: War is necessary for consuming the merchandise of human labor, if this work can be used to increase the standard of residing, the control of the celebration over the folks would decrease. In April 1949, Orwell wrote to Fischer: Little doubt you have been overwhelmed with congratulations, however I want to let you understand how rather a lot I liked studying your guide Stalin and German Communism.” Fischer replied rapidly after, thanking him for his encouraging remarks” and saying she hoped to squeeze out ample time” to visit him throughout the Cotswold Sanatorium throughout her impending visit to England. Winston Smith works as a clerk within the Knowledge Division of the Ministry of Reality , the place his job is to rewrite historical paperwork in order that they match the continuously altering present get together line This includes revising newspaper articles and doctoring images—principally to take away » unpersons « , individuals who have fallen afoul of the social gathering. They begin speaking, and Winston learns that the woman’s name is Julia She has recognized for some time that he’s Winston Smith Winston reveals that he believed Julia to be part of the Thought Police. Essentially the most pointed is V’s perception: Folks should not be afraid of their governments. Even Winston himself would not realize it. I would say that ‘Brien, the highly effective and mighty Get together member, is a sort of father determine to Winston. V notes to Evey that he has not yet achieved what he calls the ” Land of Do-as-You-Please “, meaning a practical anarchistic society, and considers the present chaotic scenario an interim interval of ” Land of Take-What-You-Need “. Finch has been mysteriously absent and his young assistant, Dominic Stone, in the future realises that V has been influencing the Destiny laptop all alongside, which defined V’s consistent foresight. In Julia, Winston finally finds a compatriot in his quest against the Get together. The Get together’s ideological background could be acknowledged in a single sentence: War is peace, freedom is slavery, ignorance is energy.”6 The first slogan refers back to the financial scenario in Oceania which might solely be described as continuing scarcity which can all the time be deficient due to the constant warfare with the opposite two superpowers. He’s in the cafe drinking Gin where he had watched so many before him who later went to the Ministry and proclaimed their crimes and their love of Big Brother now earlier than being publicly executed. Chapter abstract for george orwell’ s 1984, e-book 1 chapter 4 abstract. These experiences turned the provision materials for his first e-guide, Down and Out in Paris and London, revealed beneath the pseudonym George Orwell. In the “Minitrue” (Ministry of Reality in Newspeak), the bureaucrat Winston Smith re-writes history to control the future of the occasion and is sort of detached to his society. In keeping with the regime, sex simply as an obligation of the federal government or responsibility to the Social gathering.” It means Winston Smith wants to engage in intercourse only to supply children for the Celebration. Orwell’s imaginary States don’t exist, but the world order of 1984 resembles in some methods the world of ”1984.” Certainly, there are two main world powers with a third one on the rise. He noticed the dark-haired woman he had usually seen within the Ministry who he hated based mostly purely on her obvious worship of the Social gathering, and also a person named ‘Brien , an Inside Party member whom he additionally typically noticed within the Ministry of Reality. From his reminiscences of the movie, Winston’s thoughts move on to a daily ritual, which was conducted in each workplace, the two minute Hate.” Throughout this course of, the telescreens broadcast photos of Emmanuel Goldstein, the Quantity One Enemy of the People” in accordance with the Occasion. Doublespeak and groupthink are each deliberate embellishments of doublethink, and the adjective “Orwellian” means just like Orwell’s writings, especially Nineteen Eighty-4. Born in 1903 in India, George Orwell was an incredibly influential writer, finest-known for his novels Animal Farm and 1984 , in addition to essays on varied topics protecting politics, historical past, and social justice. In these chapters we meet ‘Brien, an individual who becomes a logo of revolt in Winston’s thoughts, for the primary time. War is necessary for consuming the products of human labour; if this work have been be used to increase the standard of living, the control of the celebration over the individuals would decrease. Kneale’s concern about what is perhaps happening behind the electrified fences and armed guards was echoed in numerous other dystopias of this time – like Joseph Losey’s 1963 movie The Damned, which brazenly doubted Britain’s government might be trusted. 19.a. George Orwell, Animal Farm: A Fairy Story, London: Secker & Warburg, 1945, first edition. E-book 2, chapter 5 of 1984 in part relates the story of winston’ s ‘ summer of love’. I have at all times imagined that as soon after Winston realizes that he loves Huge Brother that he would someway reveal this to the individuals from the Ministry of Fact watching him (possibly the waiter within the Chestnut Tree), and that he would be tried and executed like the individuals he remembers on the telescreen, or he would just obtain a bullet at an sudden moment – each fates appear to occur to people in his situation. An worker of the Ministry of Reality, it is Winston’s job to rewrite historical previous by modifying earlier newspaper articles to raised mirror the Event’s agenda. His life takes a deadly flip when he’s accosted by a fellow Outer Social gathering worker; a mysterious, daring-looking younger girl named Julia (Suzanna Hamilton) a print machine mechanic who works in the Ministery of Truth, and they start a bootleg affair. Another character is ‘Brien who helps Winston love Massive Brother for Winston hated Big Brother. Some days later Winston and Julia meet each other to go to the flat of ‘Brien, which lies in the district of the Inside Party. Later, as a prisoner, Winston sees Parsons is in the Ministry of Love, as his daughter had reported him to the Thought Police, saying she heard him communicate against Massive Brother in his sleep. And with good reason, for hardly per week handed during which The Times did not carry a paragraph describing how some eavesdropping little sneak – ‘baby hero’ was the phrase generally used – had overheard some compromising comment and denounced its dad and mom to the Thought Police.”5 All these instructional means and methods serve the one function of indoctrinating the individuals from their very youth with the propaganda and the beliefs of the Get together and to encourage them to denounce everybody who doesn’t adjust to these ideals. Oceania’s political ideology, euphemistically named English Socialism (shortened to “Ingsoc” in Newspeak, the government’s invented language) is enforced by the privileged, elite Interior Occasion. Although this freedom within the Two Minute Hate is restrained, confined to these two minutes and thus nonetheless beneath the management of the Celebration, Winston is ready to discover that very same ardour outside of the designated hate, and he does so by means of language, by writing in his diary. Tom Parsons – Winston’s naïve neighbour, and a brilliant member of the Outer Social gathering: an uneducated, suggestible man who’s fully loyal to the Event, and absolutely believes in its wonderful image. The creator is basically a music writer, and was perhaps drawn to the subject – he does not say – due to David Bowie’s intense curiosity in making a musical of Nineteen Eighty-four, earlier than Orwell’s widow Sonia kyboshed that concept.
<urn:uuid:c6b7cf78-76a1-4234-94a9-9c2ec4f8be8d>
CC-MAIN-2021-43
https://3d.km.ua/archives/3120
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587854.13/warc/CC-MAIN-20211026072759-20211026102759-00470.warc.gz
en
0.946462
3,927
2.59375
3
Any amount of breastmilk is does incredibly things for your baby’s health, but some parents have a goal of exclusively feeding breastmilk to their children. The benefits of giving breastmilk only are numerous. First of all, breastmilk and formula are not the same. Breastmilk contains living cells, stem cells, white cells, antibodies, and immune factors that cannot be added to formula. Just as how powdered cows milk reconstituted with hot water is not the same as fresh cows milk, formula is not even close as breastmilk. That being said, thank goodness we have formula for the situations that require it. This article by Dr. Jack Newman explains in detail the differences between breastmilk and formula and is an incredibly good read. Benefits of Exclusively Breastfeeding - Baby receives the best possible passive immunity from the mother which is directly catered to their particular environment and the germs found within it. - Baby’s microbiome develops in the best possible way. The quality of the microbiome in one’s digestive tract is known to dictate digestive and immune function, neurological and cognitive development, stress levels, and more. - Baby avoids any potentially risky ingredients found in formula such as aluminum and other contaminants such as glass and metal shavings. Formula is also man made and subject to human error. There have been many instances throughout history where formula is recalled for things such as arsenic and salmonella. Jack Newman says it quite plainly, “Most women these days “cannot breastfeed” because they are undermined in their ability to do so. Hospital routines around labour and birth, separation of mothers and babies, early introduction of bottles and poor advice from health professionals all together result in so many mothers who “cannot breastfeed” and are disappointed in breastfeeding when they should direct their disappointment at our medical system. If they had had normal births, and good help from the beginning, most such mothers would be very successful at breastfeeding.” This applies to mothers of multiples as well. If you can breastfeed one baby, you can breastfeed two or more. The amount of milk you make will always be equal to the amount that is removed from the breast. Period. With all that being said, let’s move on to the tips! Tip #1 Educate yourself about breastfeeding BEFORE giving birth We often spend so much time preparing to give birth, but almost none preparing to breastfeed. For many parents, the birth part seems the most scary and uncertain but actually, it is only one moment in time that passes relatively quickly. The breastfeeding relationship will last months or years after birth, so it’s just as important to prepare for. If breastfeeding starts off well in the beginning, it is often easier overall than if it starts off poorly. The human body is incredible and can make up for any early mistakes, but if possible it’s much less stressful to start off on the right foot from day one. I have several posts about how to prepare for breastfeeding during pregnancy which you can read HERE and HERE. Tip #2 Connect with a breastfeeding professional during pregnancy Having an experienced breastfeeding support person you can call or message with while you are in the hospital is SO IMPORTANT. Even though I am a breastfeeding counselor, I still had my doula, Stephanie, on call when I had my twins in the hospital. Even though I know a lot about breastfeeding myself, it was necessary to have a support person to reassure me that everything I was doing was right. Often times in hospitals in Japan, you will receive a wide range of breastfeeding advice from the medical staff that works there. Not everyone is trained in lactation! Having someone you can trust (and who speaks your language) can be so important to your breastfeeding success. You can find out more about the breastfeeding support available in Tokyo and Japan here. Tip #3 Let your care provider know that you plan to exclusively breastfeed Having a conversation with your care provider about your breastfeeding goals is the first step in not only building your own confidence but also making sure you and your care provider are on the same page. Remember that YOU are your children’s advocate. YOU are the one giving birth and this is YOUR baby or babies. Being confident and strong in your decisions will get you far in Japanese hospitals. Often times, formula is offered to parents who seem like they need more rest or aren’t confident in breastfeeding yet. If you tell your care provider that your plan is “to breastfeed” not “try to breastfeed”, this will be taken seriously in my experience. I think I told every new nurse that came into my room that I would be breastfeeding and I was never offered formula. This also goes for when baby is in the nursery. There will most likely be times when the babies have to go to the nursery for some tests or checks. Make sure you explicitly say you don’t want your baby given formula while in the nursery. Tip #4 Nurse or pump as early as possible after birth This is particularly important after a c-section. Your breasts need to be stimulated for your milk to come in so it’s very important to put baby to the breast soon after giving birth. If it’s not possible to put them on the breast, such as with a NICU stay, then you should begin pumping soon after birth. Generally, “soon” means within the first 12-24 hours. Personally, even though I have no complications after my c-section, my babies still didn’t latch until about 24 hours after birth. It can be nerve-wracking if your babies aren’t latching yet, but don’t give up! The first milk that comes after birth is called colostrum. It is packed with the perfect nutrients for your babies and every drop should be savored even if it doesn’t look like much. If you are pumping, you can save the colostrum and give it to your babies with a syringe. Try to avoid a bottle if possible before breastfeeding is established. Be prepared that you may be told, “your milk hasn’t come in yet, you should rest”. THIS IS BAD ADVICE. The colostrum that comes in the first couple of days is very important for helping baby pass their first stool, called meconium, preventing jaundice, and protecting them from infections with passive immunity. The colostrum you produce in the first few days may not look like much, but it is packed with benefits. Tip #5 Have the baby/ies room in with you if possible and offer the breast or pump at least 10 times in 24 hours Early and frequent feeding is truly the key to establishing breastfeeding and getting your mature milk to come in sooner than later. Unfortunately, not all care providers encourage parents and babies to stay together in the same room during their recovery stay. Rooming in with your babies encourages more frequent feeding and allows you to recognize their hunger cues sooner. Many hospitals will offer to let you put your babies in the nursery so you can rest. This is tricky because you will potentially be very tired after giving birth. I know I was! If you need to put your babies in the nursery so you can rest, try to limit their stay to 2 -3 hours before bringing them back to nurse them again. Only do this as much as you need because it is quite possible that they will want to nurse more than every 2-3 hours. In my three days at the hospital, I allowed my babies to go to the nursery a couple of times for 2 hours each because the epidural made me so sleepy that I couldn’t even keep my eyes open. Once the epidural was out (about 18 hours after surgery) I was able to be more alert. Attempting to breastfeed, even if baby doesn’t latch, is important as well. In the first 24 hours, I made sure to do as much skin to skin as possible and just keep trying. Eventually they both latched! Tip #6 For multiples, start tandem nursing as soon as possible Tandem nursing, or nursing both babies at the same time, is extremely useful in both saving you time and building your milk supply. It is especially helpful if you have one baby who is a less efficient nurser than the other because the stronger baby can trigger more letdowns, which allows the less efficient baby to still receive the same amount of milk despite being less efficient. Newborns also tend to take a longer time to nurse plus nurse more frequently than older babies, so if you nurse both at the same time you can at least have a chance for a little break in between. I tandem nursed my twins for about the first 9 months. Stimulating both breasts at once also encourages a healthy milk supply. If you are still working on the latch, it can be helpful to nurse the babies one at a time at first. But don’t be afraid of tandem nursing! It takes some practice but will make your life so much easier! I used the TwinZ nursing pillow to tandem nurse. Tip #7 Nurse “on demand” and not on a schedule “On demand” means observing and responding to baby’s hunger cues by offering the breast. Newborns can seem to feed nearly constantly, which many new parents are surprised by. This is normal behavior and excellent for building your milk supply. This is a great article to read about what to expect as far as frequency of feeding. Nursing on a schedule has been shown to contribute to slow weight gain and low milk supply. If you are pumping, make sure to pump at least 8 times in 24 hours (this is every 3 hours day and night) to mimic the frequency of feeding from a newborn baby. If you are nursing multiples, it can be more challenging and time consuming to nurse on demand because there are two babies with two different demands! A good rule of thumb is to always nurse both. When one begins to show hunger cues, you can either feed them and then the other one or ones, or tandem nurse. If you feed one and then wait a while, you will probably find yourself feeding a baby all day long. Of course, there is nothing wrong with that but it can get overwhelming at times! If your babies are or have been in the NICU, you may find that they are more “on a schedule” than babies who weren’t. That’s okay! Follow your baby’s lead. If they are naturally on the same schedule, don’t fight it, embrace it and consider yourself lucky in that regard! Tip #8 Talk to your partner and any family members who will be involved with you and your baby/ies about your breastfeeding goals Don’t wait until after you give birth to have a conversation about breastfeeding with the people closest to you! It’s important for your partner and/or close family members especially to be on the same page as you so that they can support you. For a parent trying to exclusively breastfeed, it is not helpful to have people near you undermining your confidence by encouraging you to give bottles so you can rest, supplement with formula unnecessarily, or even impose their own ideas about breastfeeding on to you. Your partner may have ideas about breastfeeding that are unknown to you so talking about your breastfeeding plans is crucial. Partners and family members may think that feeding the baby with a bottle is the only way they can help but that is far from true. Cooking, cleaning, changing diapers, holding and rocking the baby, taking them for walks…there are an infinite amount of things they can do that don’t involve baby feeding. You want to talk about all of this before baby comes rather than during that exhausted newborn haze, let me tell you! After almost a year of exclusively nursing my twins, plus two years of exclusively nursing my firstborn, I can honestly say that nursing at the breast only gets easier as time goes on. Once solids are introduced and you aren’t feeding around the clock anymore, you will find that your pre-baby freedom returns somewhat. I know a lot of people don’t want to exclusively breastfeed because they are afraid of the baby constantly relying on them or maybe they have to return to work and worry that breastfeeding won’t be compatible with time away from baby. Many parents have found ways for exclusive breastfeeding to work in whatever situation they are in as long as they want to do it. As always, it is your body, your baby, and your choice. I hope this post was helpful!
<urn:uuid:de994852-c92c-4969-b7ea-8487b59711d2>
CC-MAIN-2021-43
https://mymotherhoodtokyo.jp/2021/04/22/exclusivebreastfeedingtips/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585439.59/warc/CC-MAIN-20211021164535-20211021194535-00670.warc.gz
en
0.969318
2,611
2.59375
3
The days of above-zero temperatures are long behind us now, and once we switch from Daylight Saving Time to Standard Time, we begin the certain slide into increasing cold and darkness. It still befuddles me why we play with the time in the first case. Why do we move the clock forward in the spring, the time of year when there’s so much light that an hour doesn’t change anything? Even more perplexing, why is it considered to be saving daylight, given that we can’t put it away for use later on in the depths of winter, when we really need it the most? After years of clock-changing wreaking havoc on my body, especially in the spring, this practice still doesn’t make any sense to me, and seems very unnatural. The time change in the fall is touted as being something to look forward to, because, as the sales pitch goes, we supposedly get an extra hour of sleep. But if you’re like me, you go to bed later than usual on weekends anyway, and you don’t sleep any more hours than normal. So you wake up feeling deceived, plus slightly confused as to what time it really is, because you were too lazy to change all of the clocks in the house before you went to bed. Regardless of any artificial time we humans want to create, Mother Nature and the animals stick to their schedule. These are the days when I envy the creatures who can (and probably must) hibernate. While it’s not particularly alluring that they don’t eat for months, then they wake up starving and ill-humoured, I find it singularly appealing that they don’t have to wake up in the dark, and go out in the cold to work. Almost makes it worthwhile, the risk of being eaten or hunted. This time of year is the trapping season, and many who live the traditional lifestyle go “out on the land” as they say. They can be away for weeks on end, coming back for short periods then going back out again, and this can go on until the spring. Trapping for most fur-bearing animals typically starts at the beginning of November, because for prime fur, it has to be cold enough for the animals to have grown their winter coats. Trappers establish camps out in the wilderness and they go after beaver, muskrat, fox, marten, otter, lynx, wolf and the ferocious wolverine. Given that this is their time-honoured way of life, resident Metis and First Nations people are not required to obtain hunting licences. They can sell furs to anyone, but unless they have a commercial licence, they are not allowed to sell meat or fish to non-aboriginal people. In some northern communities there is a community freezer, a shared storage facility where residents can store their game, referred to as “country food”. For many people, animals are a source of food and clothing. Whether one is in the country or in the city, in the north one is constantly aware of the presence of wildlife. Yellowknife is a city in the middle of the bush, so there are animals just outside of the city, and some of them in the city. I no longer bat an eyelid when I see a fox running around in town. In an early encounter, one nonchalantly ran past me in the car park, and I nearly jumped out of my skin. I’ve rarely seen them walking, for which they have a curious gait: their legs move similar to a centipede’s, in an indistinguishable blur. But more often than not they’re running, as if they’re late for an appointment. Occasionally they’re just sitting, watching cars or people go by. I’ve seen mostly the common red fox, but there’s also a charcoal-grey fox with black ears and legs that’s quite a beautiful creature. They’re called silver foxes, and although they look very different, they’re merely a variation of the red fox, as they can occur in the same litter. I’m yet to capture one with my camera. What would life in the north be without bears? Black bears have been known to hang around just outside of town, and they have even been spotted on the Frame Lake Trail – mercifully not when I was on it. A long-time resident told me that he remembers a hungry bear strolling around downtown one spring. Bears have created employment for bear monitors, people whose job is to watch out for bears, and, unfortunately, to shoot them if necessary. The need for such people can arise when environmental work is being carried out in remote locations, for example. There’s also need at culture camps, sites where school-children go to learn about native customs. Black bears are more interested in food than in little Johnny, but I wouldn’t want to be the teacher who has to tell parents that their child got mauled by a bear during the class outing. Wolves are also our neighbours. While driving on the outskirts of town at night, I’ve seen the reflection of eyes, not far from the side of the road. Judging from their height, they could have belonged to a wolf or a coyote. Just last week, 2 wolves were spotted in the Niven Lake residential area, which is located on the edge of town, but still a short walk to downtown. It merely goes to show that you never know who might be hanging around your neighbourhood at night. Two creatures that I’m sure that I won’t encounter in Yellowknife are polar bears and grizzly bears. This year, the town of Sachs Harbour, on the Beaufort Sea, has experienced an unusual number of polar bears roaming town. This is because the bears, which typically live out on the ice during the winter and eat seals, couldn’t go out because the ice has been late in forming this fall. So they’ve been hanging around on the shore, waiting. In the meantime, they have to eat, and they will eat your garbage, or your dog, whichever you leave outside. Needless to say, patrols have been stepped up, with both wildlife officers and residents keeping an eye out for them. Life isn’t quite so exciting in Yellowknife, where the only trace of polar bear that I’ve seen is the gigantic polar bear rug in the main chamber of the Legislative Assembly, and the stuffed polar bear in the arrivals lounge at the airport. Grizzly bears are also found farther north, which does not disappoint me. Seeing a stuffed grizzly at the Visitor Centre, accompanied by a stuffed wolverine, was as close as I ever need to get to either of these. A hybrid creature has been spotted in recent years, a cross between a polar bear and a grizzly bear. It’s been dubbed a ‘grolar’ or ‘pizzly’. Frankly, I prefer to call it a grolar, as it sounds a lot more fearsome – which I’m certain it is. Something called a pizzly might be hard to take seriously, which would be a mistake. I would be remiss if I didn’t mention the buffalo. In the winter, they can be a driving hazard, as when they’re covered in snow, they can be hard for motorists to spot. Buffalo have been known to walk away from collisions that leave motor vehicles in a wreck. It’s easy to assume that these leisurely-walking, lazily-staring animals are naturally slow, but they can move at surprising speed when they want to. I wouldn’t want to get on the wrong side of a big male that’s not having a good day. There are lots of stories floating around in the north, and as one of them goes, someone from another province was driving in the Northwest Territories and encountered a buffalo jam, i.e. buffaloes blocking the road. All of the driving guides that I’ve read state that drivers should keep a good distance away from them and wait, and to not honk the horn. But evidently this hapless tourist hadn’t educated himself on how to deal with the territorial wildlife, and decided to lean on his horn. It so happened that it was rutting season. One of the males didn’t take kindly to the noise interfering with his courting, (or fighting with the competition) and suddenly charged headlong into the windshield of the car, to the astonishment of the tourist. The moral of the story is that if you wish to engage in road rage habits from down south, they will be met with road rage northern-style. Unfortunately, during this summer past, 400+ of the buffalo herd near Fort Providence died, due to anthrax poisoning. Anthrax occurs naturally in the soil in that area, and the poor creatures became infected either while grazing, or from digging at the soil. There are creatures in the air too. The territorial bird is the gyrfalcon, the largest of the falcons. All raptors and their eggs are protected by law in the Northwest Territories, and those caught in possession of these birds or their eggs can be fined and/or jailed. It’s also required to turn in any dead or injured birds to the wildlife authorities. I haven’t seen a live gyrfalcon, at least not yet, but I live in hope. However, I’ve seen way too many ravens to count. Yellowknife is overrun with ravens. Some of them are as big as a cat, and their feathers are a beautifully shiny black, almost as if they’ve been oiled. They’re quite clever, and they can spot a garbage bag from a mile away, pick through it in a second, and they’ve even been blamed for power outages. They’re definitely not afraid of people, as they barely move when you walk by them in town, and they take their time to get out of the way of cars. They have a peculiar tendency to hop along on the sidewalk after you, which I find somewhat disturbing, and when there are several of them flying closely overhead I have visions of Hitchcock’s ‘The Birds’. During the last winter a collection of them used to perch above the entrance to the library. They always seemed to be having a conversation, as if plotting something sinister. There’s a reason that it’s called a conspiracy of ravens. Last, but not least, is the bird that takes the cake, the ptarmigan, which has to be the bird for which the phrase “bird-brained” was coined. They are plump, rather cute-looking, a type of grouse, and they happen to be prey for gyrfalcons. In winter their feathers are a soft white, except for the edges of their tails, which are black, but this is barely apparent. Their legs are feathered, as if they are wearing boots. I honestly think that they have no brains whatsoever. We joke about chickens being dumb, crossing the road in front of cars, but ptarmigans are even dumber. They scurry out into the road as cars approach, but they don’t cross the road. They run ahead of the car, as if they’re racing it. It’s as if a bunch of them are sitting around on the side of the road, shooting the breeze, and one says: “Hey, check out that car coming. I bet that we can go faster!” As a result, there’s a popular bumper sticker that says ”I brake for ptarmigan”. The trouble is that in the dark winter days, because they blend right in with the snow, you can’t always see them. So if you hear a curious thump under the car, it just might be a ptarmigan. The north is so vast and the human population so sparse that there’s no excuse for people and animals not to co-exist as nature intended. Creatures are practically a part of daily life here, and one comes to understand each of them and how to adjust for their behaviour. I too will brake for ptarmigan…but only if I see them. Copyright © Kathryn Birchwood and FrozenTrini 2012. Use and/or duplication of this material without express and written permission from this blog’s author and/or owner are unauthorized and strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Kathryn Birchwood and FrozenTrini, with appropriate and specific direction to the original content.
<urn:uuid:8fa5c997-345a-43fc-bc32-495169dc7f47>
CC-MAIN-2021-43
https://frozentrini.com/tag/winter/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00190.warc.gz
en
0.972324
2,668
2.515625
3
River Godavari is the longest river in South India that travels over 1000 kilometers. My first glimpse of this beauty was at Rajahmundry, where the ritualistic ‘Godavari Arati’ is offered to this mighty river every evening. The sunset and a boat ride from the Godavari ghat are experiences in themselves. Among the umpteen dams, reservoirs, bridges that are a built across her, the most noteworthy bridges are located in Rajahmundry. Here is a quick look at these heritage structures. Old Godavari bridge – This is the oldest of the three major bridges built across Godavari here. It was originally called as ‘Havelock bridge’ since it was named after Sir Arthur Elibank Havelock, the then governor of Madras. This is a Stone masonry & Steel girder bridge whose construction started in 1897 and commissioned in 1900. After completing 100 years, this railway bridge was decommissioned in 1997. Godavari bridge – Also called as the ‘Kovvur-Rajahmundry bridge’, was commissioned in 1974. This truss bridge has a two-way road deck over a single-track rail deck making it Asia’s second longest railroad bridge with a length of 4.1kms. Godavari Arch bridge – Commissioned in 1997, this single line railway bridge is the latest of the three major bridges in Rajahmundry and was constructed as a replacement for the Havelock bridge. This concrete- Bowstring-girder bridge is built parallel to the Havelock bridge with a distance of 200mts. Apart from the above bridges, there is another road bridge that connects Rajahmundry city with the islands of Konaseema. But what makes this bridge special is that it runs parallel to another heritage structure built across the mighty river. Dowleshwaran Barrage is an irrigation structure built in 1850 by a British engineer, Sir Arthur Thomas Cotton. Earlier to the construction of the barrage, the place used to be constantly flooded and unworthy of anything. This 3.5kms long barrage then allowed the floods to pass through and enriched the place making the unused land worthy of cultivation. It was rebuilt in 1970 and renamed as Sir Arthur Cotton Barrage or Godavari Barrage. This trip was part of a backpacking by my brother and me with an original itinerary to cover Bangalore- Kumbakonam – Gangaikondacholapuram – Chidambaram – Pichavaram – Pondicherry – Tiruvannamalai – Bangalore As per this, we left Bangalore on a Sunday night in a bus and decided to explore further at our own pace, using public transport and staying at places with bookings made on the go. Plan was all set. But well, with a small glitch. We assumed that the monsoon season was the same in the entire southern India. But what we hadn’t taken into consideration was the fact that Tamil Nadu doesn’t come under the south-western monsoon. Hence, the monsoon peaks (with north-east winds) after the season ends in its neighboring states. So, we were now on an exploration of Tamil Nadu in October, during the peak of its monsoon season! Anyway, with its share of travel miseries, poor planning gave us the benefit of experiencing a different kind of backpacking. Firstly, we explored Kumbakonam, a place which is often spoken less about on a typical tourist’s circuit. It was a wonderful experience to explore a place that is soaked in history and RICH architectural heritage, mostly from the Chola era. (This is elaborated in a separate post, click here to read). From Kumbakonam, our next planned destination for a major halt was the place that’s is often referred as ‘a city of eternal bliss’. But our experience was as unblissful as it could get, even as we wished to get a glimpse of the deity of a temple whose manifestation is revered to be as one of the five elements of life- ‘Space’. I would like to elaborate this trip for my readers to get a wholesome idea of our visit to this city was like for us! With incessant rains, our mobile-phone network had been patchy. On day 2 at Kumbakonam, we received a call from our parents who had been trying to get in touch with us since the previous night. They informed us about the alert issued by the Met. Department. We checked online and confirmed the news about the weather forecast of cyclone- Roanu and a deep depression in the Bay of Bengal. We were asked not to venture near the seacoast. Our intended trip itself was supposed to be along the Coromandel coast- including Cuddalore and Pondicherry. Since the day was bright, we did not take our Met.dept. seriously and decided to take a chance by continuing with the plan from Kumbakonam. With a visit to the Brihadeeshwara temple at Gangaikondacholapuram (another of the three living Chola temples), we boarded a bus to Mannarkudi. From Mannarkudi, we were supposed to take another bus towards our next planned destination: Chidambaram. However, the conductor informed us that the road beyond Mannarkudi was blocked since the previous night due to an uprooted tree. Although the tree was cleared, he wasn’t sure if the route was worthy for us to go. Without really understanding the seriousness of his advice, we boarded an overly priced private bus which ferried us to Chidambaram. Our road was flanked by the Kollidam until most stretch. Last time we had seen this part of the state was with our family, during our quest to see the end of river Kaveri. The dam was empty and dry back then. Today, she was flowing in full spate and the Grand Anicut was filled till its maximum limit. Kaveri looked beautiful with her brown waters reflecting back the sun rays that sneaked from amid the thick grey clouds. That was the point from where, the real saga of our road trip started. As we covered a little distance ahead of the dam, the river began to touch the road around the corners at most turns. Gradually, the river started to spill over the road at some stretches. Instead of plying on the road, it seemed like our bus was driving over the river at these junctions. Further into the journey, the water level increased. Several stretches (in kilometers) of the road was submerged by the river. Our driver was a real super star- who could figure out exactly where the road laid in the ground in spite of the water being above the tire height. Even a slight slip in the road only meant death and nothing less. The entire bus with about 25-30 passengers could have been washed away by the currents of the spiteful river. I had only seen such things in the news. Now I was right there, experiencing a flood scene, firsthand. Stretches of villages laid submerged ahead. At some places, the thatched roofs and the hay huts had given away. We could see utensils floating around on the road, helpless villagers wading across the (once existent) streets, even as the flood water stayed above their waist level. Their plight was heart rendering to see, even as the rest of us inside the bus continued to wonder if we were going to see a safe arrival at our destination at all. The rain of just one night had wreaked so much havoc across the state of Tamil Nadu. However, our driver remained focused and drove us across to reach the safe harbor at Chidambaram by around 03.00.p.m. My brother and I decided to drop the luggage at the hotel which we had booked online and find some food for ourselves. We hadn’t eaten anything since that morning. On arrival at the hotel, we were a little perplexed to see our room. The bedsheets looked extremely old, torn and dirty. The bathroom was a disaster. The toilet floor was covered with a thick layer of algae, slush and mud, all that had accumulated over years without washing it. The flush lever was broken, the taps rusted and a crazy layer of deposits on the bucket and the mug. The nasty smell of alcohol hit our noses from outside through the opened door even as we continued to feel suffocated inside that room. My brother and I looked at each other’s face- and both of us knew what was running in each other’s mind. In spite of being exhausted and hungry, we decided to leave the place and find some other place to stay. Just when we started to descend the stairs and as if the injury (of finding a bad room online) wasn’t enough, I happened to step on a large mess of barf, thrown up by some drunkard on the stairs and slip down a couple of steps. Until this moment of our day, I had managed to keep my calm, but my brother gave up. He wanted to end the trip right there and return to Bangalore. While he found no buses that would leave Chidambaram immediately to Bangalore, I managed to convince him to stay calm until we boarded a night bus at least. I found a place near the ‘Nataraja temple’ where I could clean myself and headed to get the darshan of the lord. The visit was peaceful, maybe I will write about in another post someday. After finishing the evening prayers, my brother booked our tickets to Bangalore for the same night. Since my holidays were still not over, somewhere deep in my mind, I still wanted to complete my trip. I didn’t want one bad experience of the day ruin the entire holiday for us. But, given the weather condition further ahead in our planned route, I couldn’t rule out my apprehensions of getting stranded in the cyclone at Pondicherry as well. But right now, our priority was different. We had been starving since morning and had to find something to fill our stomach. In spite of walking the WHOLE of Chidambaram town, we couldn’t locate a single place where we could find food. Thanks to the day of Deepawali festival- there were absolutely NO eateries open! Also, the entire town was SOO DIRTY with garbage littered everywhere. After a long search, we finally found ONE supermarket in the entire town. And what did we get to eat there? Just a cup of sweet corn to sate our hungry bodies. Our city woes did not end after eating the steamed corn. It was still 07.00.p.m and we had three hours more to kill. On enquiring with a few locals, we were told that we would find a decent restaurant near the bus stand. And so as per the recommendations of the local people, we found this AC luxury restaurant called ‘Vandayar- Southern Spice’. When we arrived there, the waiter informed us that they served only fried rice for the day. The waiter came to our table thrice to take our order (for the only dish available) and after two hours of waiting for food, there arrived a convoy of VIP customers at the restaurant. Bonus for waiting: A feast was set for this VIP family that comprised of all dishes from the menu. Even while all the tables were occupied with middle-class customers including my brother and me, there was no one from the restaurant that cared for our existence that day. Wondering if we were waiting for any free food to be served at 09.00.p.m. several customers grew furious and started to walk out of the restaurant. It was also time for us to board our bus. As we too walked out of this VIP restaurant, there was power cut in the town. In a dark and dingy bus-stand, we spotted the only stall that served tea and some biscuits. The little candlelight was just enough for the tea-stall guy to reach out to things in his kiosk. We were essentially scared of stamping some more muck that could’ve been laid in the littered path. As we dunked the last biscuit into our chai, we had yet another surprise for us. Our bus to Bangalore was delayed by 2 hrs.!!! As we waited there in the dark platform of the bus stand, some drunk men started to throw glass bottles at the crowd there. Luckily no one was injured, but the downpour of bottles and splatter of glass pieces continued for a while. Our bus arrived after a while and we boarded at 10.00.p.m. With all the crazy stuff that happened that day, we fell asleep quickly… Only to be woken up at sunrise. That’s when the rain was battering outside, and our bus had broken down on the highway. Although we were given an alternate bus in a while, our anxiety continued until we reached home. Conclusion Remarks: The people on the east coast are god’s chosen ones to have a grand celebration of festivals. Tsunami for Christmas. Cyclones for Diwali…!! One cannot sit in a place, hear stories and imagine of places and people. You need to move yourself to places to experience and explore. This trip was one such experiences where I got a first had experience of braving a flood and starvation of food. Also, this is a trip where I managed to find a place in India that I wouldn’t want to return. After a lot of last minute hiccups, the planning of more than 3 months had finally materialised.. And there we were… At Allapuzha. At 10.a.m we were on the stands looking out for a nice place which would give us a good view of the river. The 60th Annual Nehru Boat Race was scheduled to start at 2.30.p.m. ‘The crowd had started to pour in from as early as 6.a.m., to get a good seat’, we were told. Pam and I were sitting in the last row (We considered ourselves fortunate enough for getting chairs to sit).. Sam had ventured out of our stands to get some good photographs and to find a better corner seat for all of us. Just then, this gang of 6 huge Malayali men dressed in their white Lungis came in and stood behind us.. They pushed our chairs forward so that they could accommodate a few more chairs on the already crammed podium. We barely had space to keep our legs and we were wondering what they were upto. Without knowing the language, we only ended up giving them some wild stares. Pam belted out a few words in Kannada. Next thing we saw was: Each of these men placing biiig hand bags in between their legs, covered by their lungis and each- pulling out a bottle of local brew (the tags on the bottle indicated that it was pure-strong-local). They pulled out a glass from their bag and poured the drink and gulped it all down RAW in the blink of an eye (It was faster than that of one drinking water). And then… One of them started to utter something to us- From the fact that he had just finished a bottoms up and the tone of his speech, we knew for sure that we were being verbally abused. Although with my little knowledge of the language, I managed to understand a few swears, I instructed Pam not to react. We would surely be outnumbered by men there, in God’s own country. Like a call from God himself- Sam called us to inform us that he had found a better place for all of us to sit. We vacated the spot in the very same minute. On the way, Pam walked upto a cop and said, “Those men in the last row there, are boozing; Each man is carrying at least a bottle which they are not supposed to possess in a public gathering”. The cop replied an apologetic “OK, OK Sir, We will look into it” and walked off as if Pam had just spoken to deaf ears. We met Sam and just as we were narrating the scene to him- We saw 2 more men carrying handbags and settling down right beside us. And soon they pulled out a bottle each, bottoms up, gobbled up some minced beef and then started cheering at the water in front of them, where the race was yet to begin. Even before we reacted, Sam pointed at the platform onto our left. More than 10 men were repeating the same procedure- handbags covered by lungis- bottoms up- cheer out loud. And then we looked behind at the gallery- and we were like “What the F***…??”. Every lungi fellow had a glass in his hand..!!! And then we knew, the exact reason for getting such a vague response from that cop. The Policemen were clearly outnumbered by those drunkards and that seemed like quite a normal phenomenon to the cops to take any action. And we too quickly learnt to live with it..!! Soon, the crowd of drunkards increased and also the excitement. And.. The boat race had a roaring start with a lot of frenzy and madness.. We too were at the peak of our excitement.. And suddenly this scuffle started between 2 groups. The next thing we saw was random people being thrown into the river by random people… Typical to any Indian movie, the cops gave a late entry. They arrived in speed boats and pulled out a couple of them from the water and sped away.. The below picture shows: A hard core fan who watched the match sitting on a coconut tree from 10.a.m to 7.00.p.m. A drunk fan standing on a pole and cheering for his team whose limbs finally gave way into the water after 5hrs. Another bunch of fans seated in the gallery who are supporting themselves by holding onto the electric lines. This was definitely one hell of a maddening-superbly-awesomeness-crazy-experience that I am going to cherish for life. Kerala: “The Land Of Lungis” is truly God’s own Country… L.O.L. 😀 Have you ever experienced any such psychotic crowds? Share it with me.. 🙂
<urn:uuid:9630238e-c7e1-4d98-a336-099f5edcd271>
CC-MAIN-2021-43
https://thelostlander.com/tag/southeast-asia/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00030.warc.gz
en
0.982415
3,837
2.546875
3
What Is Pharming? A widely used pharming definition is online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data. Pharming is a two-step process that begins with an attacker installing malicious code on a victim’s computer or server. That code sends the victim to a spoofed website, where they may be tricked into offering their personal data or login credentials for a website or online service. Pharming does not require a user to open a website themselves because they are automatically redirected to the attacker’s spoofed site. How Pharming Works Pharming works by exploiting the mechanics that enable people to browse the internet. The Domain Name System (DNS) translates the domain names or web addresses that people type in their web browsers into Internet Protocol (IP) addresses, which enable computers to read them. An IP address tells computers what a website’s location is, then their web browser connects to a DNS server that holds the IP address. When an internet user visits a specific website, their web browser stores a DNS cache of that website, so it does not have to revisit the DNS server every time the user wants to visit the same website in the future. The DNS cache and DNS server are both vulnerable to pharming attacks by cyber criminals. Types of Pharming Attack There are two main types of pharming attack that cyber criminals use to target and exploit weak DNS caches and servers. One attack vector involves the installation of malware, while the other is a more traditional approach that aims to corrupt or poison the DNS cache and server. In malware-based pharming, internet users often unwittingly pick up malware, such as a Trojan horse or virus, through malicious email or software downloads. The downloaded malware will covertly reroute the user to a fake or spoofed website created and managed by the attacker. When people access the site, the attacker sees all the personal data or login credentials they enter. In this pharming process, malicious code sent via email resides on a user’s computer and begins modifying and corrupting locally hosted files, as well as changing stored IP addresses. These corrupted files will then be able to automatically direct a user’s computer to attackers’ fraudulent websites rather than the legitimate website they want to visit. DNS Server Poisioning The DNS serves to direct users’ website requests to the correct IP address. But when a DNS server is corrupted, it will direct website requests to alternate or fake IP addresses. Unlike the malware-based approach, DNS server poisoning does not rely on individual files being corrupted. Instead, it exploits vulnerabilities at the DNS server level. The attacker poisons the DNS table, which then redirects users to a fraudulent website, often without their knowledge. The corruption of a large DNS server can result in cyber criminals targeting and scamming larger groups of victims. DNS cache poisoning rewrites the internet’s rules around the flow of traffic to websites by redirecting traffic to attackers’ spoofed websites. Cyber criminals can achieve this through DNS hijacking, which enables them to target multiple users on DNS servers and unprotected routers, especially free or public Wi-Fi networks. Pharming vs. Phishing Phishing and pharming are not the same thing. Pharming evolved from phishing and takes a more focused approach than regular phishing attacks. It is also much more dangerous than phishing, as attacks are designed to hide attackers from users. Phishing attacks lure victims into giving up their data and credentials through malicious emails, texts, and other forms of direct messaging. Phishing attackers target victims by sending messages purporting to be from a trusted sender and that express urgency around their need to click on a hyperlink. That website will be spoofed to look legitimate, enabling the attacker to intercept data that users enter or steal any information they input, such as usernames and passwords that can be used to commit wider identity theft. Phishing can be hugely impactful on businesses, typically resulting in data breaches that cause financial and reputational damage. A pharming attack is more targeted and involves a two-step process to exploit victims. They begin with an attacker installing malicious code on a victim’s computer or server. That code sends the victim to a spoofed website, where they may be tricked into giving up their personal data or login credentials for a website or online service. Again, pharming does not necessitate a user to open a website, as they are automatically redirected to the spoofed site. How to Protect Yourself from Pharming The best way to protect organizations and users from pharming attacks is to install, run, and maintain antivirus and anti-malware software from trusted providers. However, there are several best practices that can help users stay safe online and avoid the considerable risks of pharming. Proven strategies that allow organizations to protect themselves against pharming include: - Deploy a reputable anti-virus solution: Trusted anti-virus software should contain tools that can not only detect but also block anomalous or suspicious behavior and malware. It should also be able to update to keep pace with the ever-evolving cybersecurity threat landscape and to ensure an organization is constantly protected from the latest pharming attack vectors. However, it is important to remember that not all antivirus, anti-malware, or spyware removal solutions protect organizations against pharming attacks, so additional tools may be required. - Trust a trusted anti-virus: When a reputable anti-virus solution issues a warning about visiting specific websites, that advice needs to be adhered to. Even if the website looks legitimate and is a site the user has visited before, the warning indicates there is a problem with the website and it may have been infected. - Use a trusted internet provider: Reputable and trustworthy internet service providers (ISPs) automatically filter bogus pharming redirects, which prevents users from ever visiting pharming websites. It is therefore crucial to only sign up for internet services from trusted ISPs. ISPs new to the market may offer great deals and super-high speeds, but check whether they are as dedicated to security as established providers. - Use secure websites: Hypertext Transfer Protocol Secure (HTTPS) means traffic that visits a website is encrypted and cannot be intercepted by an attacker. This is signified by the “https” at the start of a Uniform Resource Locator (URL) or web address. Only trust websites that use HTTPS, especially when performing a financial transaction. - Avoid suspicious websites: When browsing the internet and visiting websites, it is crucial for users to deploy good judgment. They should stick to websites they know and trust, and avoid websites that look suspicious. It is also important to evaluate sites that appear to be legitimate but do not quite look the same as usual, which is usually a telltale sign that you are on a pharmer’s website. In this case, users should take the time to click around the website to check that all the regular pages are present. Look for smaller details like privacy policies and terms of service. - Check website URLs for mistakes: An obvious sign of a pharmed website is spelling mistakes in URLs. Pharming attackers will often disguise their websites with minor edits to the URL, such as swapping or replacing letters. - Avoid unknown links: Other attackers will use website URL shorteners, such as Bitly, to hide the fact that their website is spoofed. It is therefore crucial to never click a shortened web link in an email or other direct message, and generally avoid clicking links from unknown sources and even people that appear to be trusted senders, whenever possible. - Avoid unusual e-commerce deals: E-commerce or e-shopping deals that look too good to be true are often just that. A popular tactic used by pharming attackers is to lure victims in with prices that drastically undercut popular, legitimate e-commerce sites. These offers should be treated with suspicion, and users should carry out price and comparison checks with other competing sites before they make a purchase. - Use secure VPNs: Virtual private networks (VPNs) that use reputable DNS servers will help users avoid the risk of pharming attacks targeting DNS cache poisoning. - Change default passwords: Consumer routers and wireless access points come with default passwords that could be used across multiple similar devices. This poses a serious security risk if hackers can get hold of those passwords. Organizations and users must change the default passwords on their devices, and replace them with secure, unique passwords. - Enable authentication: Passwords alone are not a secure practice for protecting users against popular attack vectors. Organizations must add an extra layer of security to their online accounts using two-factor authentication (2FA) and multi-factor authentication (MFA). When a user enters their login credentials to an online service, they are then prompted to enter an additional piece of information that proves they are who they say they are. This is typically some form of security question or a code sent either to their phone or on an authenticator application. How To Know if You Are Pharmed The sophisticated nature of pharming attacks can result in users not realizing they have become victims until long after the hack occurred. However, pharming attacks will typically show signs that users can spot: - Unsecure connections: Any website that begins with “http,” which stands for Hypertext Transfer Protocol, as opposed to “https” is a good sign that a website is either unsecure or could have been corrupted. - A website feels wrong: If a site has spelling errors, unusual or unfamiliar fonts and color schemes, or just looks different, there is a high chance it is not legitimate and is a spoofed site. - Security alerts: If a user falls victim to a pharming attack, they may receive a request to confirm whether a new sign-in came from them. Email providers and banks, for example, can detect origins from unusual or new devices or locations. If a user receives one of these requests that was not caused by them, they should confirm to the provider that they did not make the request and report the fraud. In the event that a pharming attack is successful, there are some strange activities that may occur. These include: - Unexpected charges on credit cards, debit cards, or PayPal accounts - Password changes on social media and other online accounts that were not initiated by the user - New posts or sent messages on social media services that users did not create or send - New friend requests with people that a user did not add on social media - New programs appearing on a device that a user did not download or install A good example of a sophisticated pharming attack was a 2007 event that targeted 50 financial organizations. The attack involved the creation of spoofed websites that mimicked the legitimate sites of the banking organizations it targeted. It exploited a vulnerability in Microsoft software, which lured customers to malicious sites, then downloaded a Trojan and additional files from servers in Russia. The fake sites also sent users’ login credentials to the Russian servers and infected around 3,000 computers in three days. Why Is Pharming Called So? Pharming is also referred to as "phishing without a lure." The attack vector is so called because it is a combination of the words "phishing" and "farming." How Fortinet Can Help Fortinet protects organizations from pharming attacks by protecting their DNS servers with its FortiGate platform. FortiGate secures DNS servers with an antivirus solution, firewall rules, and intrusion detection and prevention, which reduce exposure to attacks and prevent DNS cache poisoning. Fortinet also enables users to strengthen their online security through FortiAuthenticator, which ensures only they are able to access their online accounts and data, even if a hacker steals their password. What is pharming? Pharming is a type of online fraud that directs victims to spoofed websites in an attempt to steal their credentials and data. What is pharming and phishing? Pharming and phishing are different types of cyberattacks that aim to steal users’ data and infect their devices with malware. Phishing attacks lure victims to spoofed websites through direct messages. Why is it called pharming? Pharming is so called because it is a combination of the words "phishing" and "farming."
<urn:uuid:b9ea12f8-4ce2-4e7d-b89c-db60f56d6dbe>
CC-MAIN-2021-43
https://www.fortinet.com/tw/resources/cyberglossary/pharming
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587655.10/warc/CC-MAIN-20211025061300-20211025091300-00230.warc.gz
en
0.934515
2,548
3.109375
3
Extermination of American Indians TERROR: EVENTS THAT TESTIFY TO GOD'S DIVINE GLORY In the words of John Winthrop, the first governor of Massachusetts Bay Colony: "… justifieinge the undertakeres of the intended Plantation in New England... to carry the Gospell into those parts of the world... and to raise a Bulworke against the kingdome of the Ante-Christ." (sic) [SH235] On average, two thirds of the native population was killed by colonist-imported smallpox before the violence began. This was a great sign of "… the marvelous goodness and providence of God.” The Governor of the Massachusetts Bay Colony wrote in 1634, “As for the natives, they are near all dead of the smallpox, so as the Lord hath cleared our title to what we possess." [SH109, 238] On Hispaniola alone, on Columbus’s visits, the native population (Arawak), a rather harmless and happy people living on an island of abundant natural resources, soon mourned 50,000 dead. [SH204] The surviving Indians fell victim to rape, murder, enslavement and Spanish raids. As one of the culprits wrote: "So many Indians died that they could not be counted, all through the land the Indians lay dead everywhere. The stench was very great and pestiferous." [SH69] The Indian Chief Hatuey fled with his people, but was captured and burned alive. As "… they were tying him to the stake a Franciscan friar urged him to take Jesus to his heart so that his soul might go to heaven, rather than descend into hell.” Hatuey replied, “If heaven is where the Christians go, I would rather go to hell." [SH70] An eyewitness described what happened to his people: "The Spaniards found pleasure in inventing all kinds of odd cruelties... They built a long gibbet, long enough for the toes to touch the ground to prevent strangling, and hanged thirteen [natives] at a time in honour of Christ Our Saviour and the twelve Apostles... then, straw was wrapped around their torn bodies and they were burned alive." [SH72] Or, on another occasion: "The Spaniards cut off the arm of one, the leg or hip of another, and from some their heads at one stroke, like butchers cutting up beef and mutton for market. Six hundred, including the cacique, were thus slain like brute beasts... Vasco [de Balboa] ordered forty of them to be torn to pieces by dogs." [SH83] “The island's population of about eight million people, at the time of Columbus's arrival in 1492, already had declined by a third to a half before the year 1496 was out." Eventually, all the island's natives were exterminated, so the Spaniards were "forced" to import slaves from other Caribbean islands, who soon suffered the same fate. Thus "The Caribbean's millions of native people were thereby effectively liquidated in barely a quarter of a century". [SH72-73] "In less than the normal lifetime of a single human being, an entire culture of millions of people, thousands of years resident in their homeland, had been "And then the Spanish turned their attention to the mainland of Mexico and Central America. The slaughter had barely begun. The exquisite city of Tenochtitlan [Mexico City] was next." [SH75] Cortez, Pizarro, De Soto and hundreds of other Spanish conquistadors likewise sacked southern and meso-american civilisations in the name of Christ (De Soto also sacked Florida). "When the 16th century ended, some 200,000 Spaniards had moved to the Americas. By that time probably more than 60,000,000 natives were dead." [SH95] Of course the founders of North America were no different. Although none of the settlers would have survived winter without native help, they soon set out to expel and exterminate the Indians. Warfare among North American Indians was rather 'harmless', by European standards, and was meant to avenge insults rather than to conquer land. In the words of some of the Pilgrim Fathers: "Their Warres are farre less bloudy..." so that there usually was "… no great slawter of nether side". Indeed, "They might fight seven yeares and not kill seven men." What is more, the Indians usually spared women and children. [SH111] In the spring of 1612, some English colonists found life among the friendly and generous natives attractive enough to leave Jamestown, "… being idell did runne away unto the Indyans," to live among them, which probably solved a sex problem. Governor Thomas Dale had these settlers hunted down and executed: "Some he apointed to be hanged some burned some to be broken upon wheles, others to be staked and some shott to deathe." (sic) [SH105] Of course these elegant measures were restricted for fellow Englishmen: "This was the treatment for those who wished to act like Indians. For those who had no choice in the matter, because they were the native people of Virginia" methods were different: "… when an Indian was accused by an Englishman of stealing a cup and failing to return it, the English response was to attack the natives in force, burning the entire community down." [SH105] On the territory that is now Massachusetts the founding fathers of the colonies were committing genocide, in what has become known as the "Peqout War". The killers were New England Puritans, refugees from persecution in England. When however a dead colonist was found, apparently killed by Narragansett Indians, the Puritan colonists wanted revenge. Despite the Indian chief's pledge, they attacked. Somehow they seem to have lost the idea of who they were after, because when Pequot Indians, long-time foes of the Narragansetts greeted them, the troops made war on them and burned their The Puritan commander-in-charge John Mason after one massacre wrote: "And indeed such a dreadful Terror did the Almighty let fall upon their Spirits, that they would fly from us and run into the very Flames, where many of them perished... God was above them, who laughed his Enemies and the Enemies of his People to Scorn, making them as a fiery Oven... Thus did the Lord judge among the Heathen, filling the Place with dead Bodies." [SH113-114] So "the Lord was pleased to smite our Enemies in the hinder Parts, and to give us their land for an inheritance". [SH111] Because of his readers' assumed knowledge of Deuteronomy, there was no need for Mason to quote the words that immediately follow: "Thou shalt save alive nothing that breatheth. But thou shalt utterly destroy them..." (Deut 20) Mason's comrade Underhill recalled how "… great and doleful was the bloody sight to the view of the young soldiers." Yet he reassured his readers that "Sometimes the Scripture declareth women and children must perish with their parents". [SH114] Other Indians were killed in successful plots of poisoning. The colonists even had dogs especially trained to kill Indians and to devour children from their mothers’ breasts, in the colonists' own words: "… Blood Hounds to draw after them, and Mastives to seaze them." This was inspired by Spanish methods of the time. In this way they continued until the extermination of the Pequots was near its completion. [SH107-119] The surviving handful of Indians "… were parceled out to live in servitude." John Endicott and his pastor wrote to the governor asking for a share of the captives, specifically "… a young woman or girle and a boy, if you thinke good." [SH115] Other tribes were to have a similar fate. Comment the Christian exterminators: "God's Will, which will at last give us cause to say: How Great is His Goodness! And How Great is his Beauty! Thus doth the Lord Jesus make them to bow before him, and to lick the Dust!" [TA] "Peace treaties were signed with every intention to violate them. When the Indians 'grow secure uppon (sic) the treatie', advised the Council of State in Virginia, 'we shall have the better Advantage both to surprise them, and cutt downe theire Corne'." [SH106] In 1624, sixty heavily armed Englishmen cut down 800 defenceless Indian men, women and children. [SH107] In a single massacre in "King Philip's War" of 1675 and 1676 some "600 Indians were destroyed. A delighted Cotton Mather, revered pastor of the Second Church in Boston, later referred to the slaughter as a 'barbeque'." [SH115] IN SUMMARY: Before the arrival of the English, the western Abenaki people in New Hampshire and Vermont had numbered 12,000. Less than half a century later about 250 remained alive, a destruction rate of 98%. The Pocumtuck people had numbered more than 18,000, fifty years later they were down to 920, 95% destroyed. The Quiripi-Unquachog people had numbered about 30,000, fifty years later they were down to 1500, 95% destroyed. The Massachusetts people had numbered at least 44,000, fifty years later barely 6,000 were alive, 81% destroyed. [SH118] These are only a few examples of the multitude of tribes living before Christian colonists set their foot on the 'New World.' All this was before the smallpox epidemics of 1677 and 1678. All the above was only the beginning of the European colonisation, it was before the frontier age had actually begun. Smallpox and other epidemics destroyed a total of maybe more than 150 million Indians between 1500 and 1900, amounting two thirds of the population. This leaves some 50 million killed directly by violence, bad treatment and slavery. Reverend Solomon Stoddard, one of New England's most esteemed religious leaders, in "… 1703 formally proposed to the Massachusetts Governor that the colonists be given the financial wherewithal to purchase and train large packs of dogs 'to hunt Indians as they do bears'." [SH241] Massacre of Sand Creek in Colorado 29/11/1864. Colonel John Chivington, a former Methodist minister and still an elder in the church ("I long to be wading in gore") had a Cheyenne village of about 600, mostly women and children, gunned down despite the chiefs' waving a white flag: From an eye-witness account: "There were some thirty or forty squaws collected in a hole for protection; they sent out a little girl about six years old with a white flag on a stick; she had not proceeded but a few steps when she was shot and killed. All the squaws in that hole were afterwards killed..." [SH131] By the 1860s, "In Hawaii the Reverend Rufus Anderson surveyed the carnage that by then had reduced those islands’ native population by 90 percent or more, and he declined to see it as tragedy; the expected total die-off of the Hawaiian population was only natural, this missionary said, somewhat equivalent to 'the amputation of diseased members of the body'." [DA] K.Deschner, Abermals krahte der Hahn, Stuttgart 1962. [DO] K.Deschner, Opus Diaboli, Reinbek 1987. [EC] P.W.Edbury, Crusade and Settlement, Cardiff Univ. Press 1985. [EJ] S.Eidelberg, The Jews and the Crusaders, Madison 1977. [LI] H.C.Lea, The Inquisition of the Middle Ages, New York 1961. [MM] M.Margolis, A.Marx, A History of the Jewish People. [MV] A.Manhattan, The Vatican’s Holocaust, Springfield 1986. See also V.Dedijer, The Yugoslav Auschwitz and the Vatican, Buffalo NY, 1992. Contraception: A History of its Treatment by the Catholic Theologians and Canonists, Cambridge/Mass., 1992. [S2] Newscast of S2 Aktuell, Germany, 10/10/96, 12:00. [SH] D.Stannard, American Holocaust, Oxford University Press 1992. [SP] German news magazine Der Spiegel, no.49, 12/2/1996. [TA] A True Account of the Most Considerable Occurrences that have Hapned in the Warre Between the English and the Indians in New England, London 1676. [TG] F.Turner, Beyond Geography, New York 1980. [WW] H.Wollschl„ger: Die bewaffneten Wallfahrten gen Jerusalem, Zurich 1973. (This is in german and what is worse, it is out of print. But it is the best I ever read about crusades and includes a full list of original medieval Christian chroniclers' writings). [WV] Estimates on the number of executed witches: N.Cohn, Europe's Inner Demons: An Enquiry Inspired by the Great Witch Hunt, Frogmore 1976, 253. Encyclopedia of Witchcraft and Demonology, New York 1959, 180. J.B.Russell, Witchcraft in the Middle Ages, Ithaca/NY 1972, 39.
<urn:uuid:46a897e9-5918-4b67-9b31-2878b178cb49>
CC-MAIN-2021-43
http://christianity-revealed.com/cr/files/exterminationofamericanindians.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00150.warc.gz
en
0.949995
3,041
3.1875
3
Biochar, the charcoal-like material sometimes touted as a miracle cure for global warming, might first gain economic traction as a weapon against local air pollution, research by the U.S. Department of Agriculture indicates. There is a catch, however: The biochar should be produced from chicken manure. “We don’t know why, actually,” says Thomas Klasson, a scientist at the USDA’s Southern Regional Research Center in New Orleans. Klasson has led a team exploring the potential of biochar to capture the mercury emitted when power plants burn coal. When deployed as a scrubber, biochar made from chicken manure “removed almost all of the mercury” from a simulated coal emissions stream, Klasson’s team found. “We tried biochars made from turkey manure, almond shells, and cottonseeds, but chicken manure is the best,” Klasson says. Biochar is produced when plant matter (leaves, trunks, roots), manure, or other organic material is heated in a zero- or low-oxygen environment. The carbon the organic material had previously absorbed via photosynthesis is thus captured in solid form; the resulting biochar can take the shape of sticks, pellets, or dust. When biochar is inserted in soil, the effect is to remove carbon from the atmosphere and store it underground, where it does not contribute to global warming. Biochar also brings agricultural benefits by boosting soil’s fertility and its ability to withstand drought or flooding; it can also rid soil of heavy metals and other pollutants. Adding biochar to 10 percent of global cropland could sequester the equivalent of 29 billion tons of CO2. The largest outstanding question about biochar is how much of a difference it can make in slowing global warming and how soon. Johannes Lehmann, a professor of agricultural science at Cornell University and one of the world’s top experts on biochar, has calculated that if biochar were added to 10 percent of global cropland, the effect would be to sequester 29 billion tons of CO2 equivalent — roughly equal to humanity’s annual greenhouse gas emissions. What researchers still don’t know is how long that buried carbon would remain sequestered from the atmosphere. Also unclear is just how much biomass would have to be turned into biochar to make a meaningful dent in global warming, and what environmental and social impacts this might have — for example, by encouraging the clear-cutting of forests and their replacement by plantations of trees destined for biochar production. Lehmann and former NASA climate scientist James Hansen have emphasized that they oppose such plantations and other unsustainable practices as a means to produce biochar. Rather, Lehmann says, biochar should be sourced from the massive amount of waste materials that normal agricultural and forestry production methods leave behind: corn stalks, rice husks, tree trimmings, and the like. And as the chicken manure example described above illustrates, biochar could also help dispose of the large amounts of manure currently generated by poultry and livestock operations. The case for extracting carbon from the atmosphere, via biochar or other methods, may get a prominent boost in April when the UN’s Intergovernmental Panel on Climate Change (IPCC) issues the next installment of its Fifth Assessment Report. A draft copy of the report by the IPCC’s Working Group Three, leaked last week, paints a grim portrait of the global failure to slow greenhouse gas emissions and says that if rapid action is not taken, severe climate and economic disruption will occur. As a result, future generations may well have to devise methods — possibly including the use of biochar — to remove CO2 from the atmosphere. Biochar may enable us to essentially ‘unmine coal and undrill oil,’ says Bill McKibben. Some climate activists believe that biochar may offer a more environmentally friendly method of limiting global warming than do conventional forms of geoengineering, such as spraying sunlight-reflecting aerosols into the atmosphere. In the words of author Bill McKibben, founder of 350.org, biochar may enable us to “run the [climate] movie backwards to unmine coal and undrill oil.” As the amount of carbon dioxide in the atmosphere climbs to 400 parts per million and beyond, and the impacts of climate change become more unmistakable and destructive — rapid melting of Arctic Ocean ice, a rising incidence of extreme weather events — the case for extracting carbon from the atmosphere becomes increasingly compelling. Reducing the world’s emissions of CO2 and other greenhouse gases — the focus of virtually all public discussion and government policy on climate at the moment — remains vital, but as a practical matter that effort only affects how quickly the 400 ppm figure will increase. Turning biomass into biochar and burying it underground effectively withdraws CO2 from the atmosphere; if done at sufficient scale and in combination with aggressive reductions in annual greenhouse gas emissions, biochar thus could help reduce atmospheric concentrations of CO2. To date, the relatively high price of biochar has been a stumbling block to these ambitions, but biochar’s ability to cleanse contaminated air and soil could help overcome that obstacle. Klasson of USDA points to a rule the U.S. Environmental Protection Agency (EPA) issued in 2011 that sharply limits the amount of mercury that power plants and other industrial sources may emit. Mercury is one of the ten elements or chemicals of most serious public health concern, according to the World Health Organization, which advises that “even small amounts may cause serious health problems” for the nervous, digestive, and immune systems, especially for fetuses and young children. The EPA estimates that its rule will reduce by 90 percent the amount of mercury emitted by coal-fired power plants, the nation’s largest source of mercury pollution. Biochar’s ability to remediate polluted air and soil accounts for part of China’s growing interest. The EPA rule could thereby give rise to a sizable new market for biochar, suggests Klasson, which in turn would improve the economic viability of other utilizations of biochar. Writing in the Journal of Environmental Management, the USDA scientist calculated that the EPA mandate would create a potential market for 120,000 tons of biochar a year. Since U.S. production capacity for all uses of activated charcoal — a conventional alternative to biochar — is 197,000 tons per year, the EPA’s mandate could expand the effective market demand by roughly 50 percent. Such a dramatic increase in the scale of production for biochar would reduce per-unit production costs, lowering the price of biochar closer to what farmers and carbon markets could bear. “What farmers will pay [for soil enrichment] is going to be the lowest economic value for biochar,” says Kurt Spokas, a USDA research scientist based at the University of Minnesota in St. Paul. “But if we open up the market to include uses with higher economic value, such as mercury remediation or the production of black carbons for toner cartridges and lead pencils, we could make biochar a going economic enterprise.” Interest in biochar is especially keen in China. Although the USDA, through its Agricultural Research Service, had been the global leader in biochar research, China “far outspend[s] us now,” says Robert Fireovid, who coordinates biochar research at the service. Biochar’s ability to remediate polluted air and soil accounts for part of China’s interest. After decades of rapid industrialization and lax environmental regulation, about eight million acres of land — an area the size of Belgium — is too contaminated by toxic metals, fertilizer residues, and other pollutants to grow food, Wang Shiyuan, China’s vice-minister for Land and Resources, said in December. Beyond these extreme areas of contamination, 70 percent of China’s total farmland has experienced lower crop yields due to excessive fertilizer application and soil erosion, according to Meng Jun, the deputy director of the Liaoning Biochar Engineering and Technology and Research Center at the University of Shenyang. Biochar delivers the greatest agricultural benefits when it is applied to soils that are poor. All this has endangered food security, long a hot-button political issue in China. Over the past three years, the nation’s imports of corn, rice, and wheat have skyrocketed. A succession of food safety scandals has also rocked China; in 2013, the Food and Drug Authority of Guangzhou, the mega-city in China’s hyper-industrialized south, revealed that 44 percent of rice samples it tested had dangerous levels of cadmium, a heavy metal that can harm the liver and kidneys and cause cancer. Applying biochar to contaminated rice paddies can substantially reduce cadmium pollution, concluded a two-year study published in the journal BioResources. For the experiment, biochar made from wheat straw was ground into pellets 2 millimeters in diameter and mixed into soil in Jiangsu province that contained high levels of cadmium. The concentration of cadmium in the rice harvested from the test plots was reduced by 45 percent in the first year of the experiment and by 62 percent in the second year. Crop yields were not affected. Biochar also could address a second environmental challenge in China’s rural areas — the countless heaps of straw, corn stalks, and other crop residues stacked around virtually every village. Farmers often burn this fodder, producing local air pollution and releasing greenhouse gases. Instead, converting the plant material into biochar would reduce such pollution, professor Jun has noted. In addition, when the biochar was added to soil, it improved crop yields more than chemical fertilizers did, with yield differentials reaching 15 percent for peanuts, 7.2 percent for soybeans, and 8.1 percent for potatoes. The results in China cannot automatically be extrapolated to the rest of the world, however. “You must always remember that not all biochars are the same, and their effects will differ according to what kind of soil is being amended,” said Spokas of the USDA. Spokas claims to have the world’s most diverse collection of biochars; his lab boasts 225 different varieties, many of which have been sent to him by fellow researchers, entrepreneurs, and enthusiasts. Spokas and his colleagues are doing lab and field tests to determine the properties of the different varieties, including their effects on soil fertility, how stable various types of biochar are in different soils, and how much carbon the different biochars sequester. As a rule, biochar delivers the greatest agricultural benefits when it is applied to soils that are poor, either inherently or because of pollution. “We’re finding that biochar as a soil amendment tends to be less useful here in the Midwest, because the soil is already so fertile,” says Spokas. Biochar tends to deliver more benefits to “soils overseas, because [the soils] have often been leached of nutrients.” The big question remains biochar’s effectiveness in slowing or reversing global warming, and that can only be answered by further research and real-world experiments — something the Chinese, at least, seem to understand. After being briefed on biochar in 2010, China’s national leadership made biochar production part of the state Clean Energy program in 2011, according to Genxing Pan of Nanjing Agricultural University. Biochar research is currently being supported by the Chinese Academy of Sciences and the Rural Economic Commission, among other entities. The U.S. government, by contrast, is winding down its biochar research. Congress has cut the Agricultural Research Service’s budget by 12 percent since 2010, said ARS’s Fireovid. “We’ve closed at least ten laboratories in the last three years,” he added. “The long-term studies we think we need to do on biochar, we just can’t do. We lack the funds.”
<urn:uuid:c7c60b7d-a3ab-49c9-8a84-7cc3b72a1178>
CC-MAIN-2021-43
https://e360.yale.edu/features/as_uses_of_biochar_expand_climate_benefits_still_uncertain
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00589.warc.gz
en
0.945307
2,503
3.578125
4
In his examination of the history and credibility of Christianity, Huxley explored the general methodology supporting Christian belief and focused on two miracles: that of the resurrection and that of the exorcism of demons from Gadarene swine. Conflict in Methods He always saw the conflict as being not between science and religion, but between science and theology; he revealed this understanding early, in Science and Religion (1859). In this address, which appeared ten months before the Origin of Species, Huxley finds religion and science "twin sisters," but theology and science mortal enemies, and then often returned to this. A consistent advocate of the scientific method, which could be taken as a synonym of "agnosticism," he advised that skepticism about miracles means the withholding of a priori disbeliefperhaps Jesus did walk on water (some insects do), perhaps he did change water into wine (which chemists might some day be able to do). In this, Huxley agreed with Kant rather than with Hume. But evidence for violations of natural function has to be stronger than evidence for what we know does happen. Witnesses to all events, including miracles, are not always trustworthy. See the essays The Value of Witness to the Miraculous (1889) and Hume and items noted in § 13. Agnosticism, § 14. New Reformation, § 15. Verbal Delusions: The Bible, § 16. Miltonic Hypothesis: Genesis. In February of 1887, an article by W. S. Lilly reported on a sermon delivered by Canon Liddon, who argued that catastrophes and other miracles could have happened through the suspension of a "lower law" by a divine "higher law." Huxley dissected this argument in Science and Pseudo-Science (February 1887), which was responded to by the Duke of Argyll in Professor Huxley on Canon Liddon (March 1887), and that called forth Huxley's Scientific and Pseudo-Scientific Realism (April 1887). (In April, Huxley also delivered a paper to the Linnean Society on the gentians.) The Duke of Argyll replied to Huxley's April article in A Great Lesson, which claims that scientists engage in hiding evidence that's contrary to their beliefs, as Huxley had tried to hide the Bathybius episode§ 9. Medusa et al.Huxley responding to that in An Episcopal Trilogy (November 1887). One review of this appeared in the Church Quarterly (October 1888): "Truthfulness in Science and Religion." In his essay Yeast (1871), Huxley discussed the etymology of the word "spirit," noting "As the 'spiritus,' or breath, of a man was thought to be the most refined and subtle part of him, the intelligent essence of man was also conceived as a sort of breath, or spirit; and, by analogy, the most refined essence of anything was called its 'spirit.' And thus it has come about that we use the same word for the soul of man and for a glass of gin." His own taste was better satisfied by spirits in a glass of gin than by those in the soul. The history of the horrors brought about by a belief in spirits and demons was never a joke to him. Miracles such as Jesus walking on water or transmuting water into wine were fairly innocent compared to what Huxley focused on as guilty of much mayhem in the European Renaissance: that of Jesus exorcising demons in Gadara. Upon his retirement, he asked Michael Foster if he had ever read "that preposterous and immoral story carefully? It is one of the best attested of the miracles. When I have retired from the chair (which I must not scandalise) I shall write a lay sermon on the text. It will be impressive"August 29, 1884. In January of 1885, from Rome he wrote to another friend, John Donnelly, about his disgust at seeing God made and then eaten. He was ready to rise and "slay the whole brood of idolators" January 18, 1885. The lay sermon, which appeared in February 1889 he entitled Agnosticism. The belief in demons and demoniacal possession is "a mere survival of a once universal superstition," its persistence "pretty much in the inverse ratio of the general instruction, intelligence, and sound judgment of the population among whom it prevails." Demonlogy gave rise "through the special influence of Christian ecclesiastics, to the most horrible persecutions and judicial murders of thousands upon thousands of innocent men, women, and children. . . .If the story is true, the mediæval theory of the invisible world may be and probably is, quite correct; and the witchfinders, from Sprenger to Hopkins and Mather, are much-maligned men.... For the question of the existence of demons and of possession by them, though it lies strictly within the province of science, is also of the deepest moral and religious significance. If physical and mental disorders are caused by demons, Gregory of Tours and his contemporaries rightly considered that relics and exorcists were more useful than doctors; the gravest questions arise as to the legal and moral responsibilities of persons inspired by demoniacal impulses; and our whole conception of the universe and of our relations to it becomes totally different from what it would be on the contrary hypothesis." To Knowles, he wrote about an attack on his essay, "Wace has given me a lovely opening by his profession of belief in the devils going into the swine. I rather hoped I would get this out of him. I find people are watching the game with great interest, and if it should be possible for me to give a little shove to the 'New Reformation' I shall think the fag end of my life well spent"February 28, 1889. Huxley's observation that Christ had broken the law in destroying private propertyby transferring demons from a man into a herd of 2000 pigs, who then committed pigicide was repulsive to G. O. M. Gladstone, who returned as a defender of the faith in The Impregnable Rock of Holy Scritpure. Huxley's letter to Knowles of November 18, 1890, is graced with a doodle of Gladstone riding a Gadarene denizenG. O. M. and pig. Huxley's low opinion of Gladstone as politician as well as historian was often given in his letters; in a letter to Tyndall, Huxley observed that there were enough demons in Gladstone to fill not two thousand but two million pigs: July 10, 1892. Again the contest moves from the stimulus to Huxley's response to that to critical response to him, back and forth, Huxley always cajoling for attacks upon his position, and advising Knowles that he wanted the last word. A passage from Argyll's answer, "Professor Huxley on the Warpath," warns readers: "On all questions bearing on 'Christian Theology' he is not to be trusted for a moment. Loud and confident in matters on which both he and we re profoundly ignorant, we see him hardly less boisterous in asserting ignorance where the materials of knowledge lie abundant to our hands." His notebooks of 1890 contain his aphoristic creations such as "Religions rise because they satisfy the many and fall because they cease to satisfy the few." An inventory of the 1890-1891 tournament would feature: |Gladstone||The Impregnable Rock of Holy Scripture||1889| |Huxley||The Value of Witness to the Miraculous||1889| |Huxley||The Lights of the Church and the Light of Science||July 1890| |Huxley||The Keepers of the Herd of Swine||December 1890| |Argyll||Professor Huxley on the Warpath||January 1891| |Gladstone||Professor Huxley and the Swine Miracle||February 1891| |Huxley||Illustrations of Mr. Gladstone's Controversial Methods||March 1891| |Argyll||Professor Huxley and the Duke of Argyll||April 1891| The demons of the Gadarene swine episode were no more believable than the spirits conjured up by mediumssee section on Spiritualism in § 15. Verbal Delusions: The Bible. In his letters during these years, his comments on the tournament were less constrained than his published prose, for example, in the fall of 1890, he informed Joseph Hooker that Providence had "specially devolved on Gladstone, Gore, and Co. the function of keeping ' 'ome 'appy' for me. I really can't give up tormenting ces drôles "September 29, 1890'; and in January of 1891, again to Hooker: "Why the fools go on giving me the opportunity of saying the most offensive things to their beloved 'Christianity', under the guise of justifiable self-defense it is hard to sayExcept that they are foolsof the worst sort to wit, clever fools." On March 11, 1891, to John Simon, he remarks that he has much to interest him in his retirement, from Gadarene pigs to Gladstone psychology. Occasionally, he would refer in his letters to older interests, such as in a letter to a translator of his works into French, he commented on the weakness of natural selection: November 25, 1891. He denied that he had ever called Christianity "sorry stuff": "to my knowledge I never so much as thought anything of the kind, let alone saying it"February 28, 1889. But the evidence that Jesus actually existed was not persuasive, and, of course, "If there was no such person as Jesus of Nazareth, and if His biography given in the Gospels is a fiction, Christianity vanishes"November 27, 1888. Though he never used the "sorry stuff" phrase, he struck at the heart of Christianity by questioning whether Jesus, if he did exist, had in fact risen from the deadThe Evidence of the Miracle of the Resurrection (Metaphysical Society, January 11, 1876). Though Huxley wanted this published, John Morley said no; Cardinal Newman wondered if Cardinal Manning had prompted this talk so that Huxley could be brought "into the clutches of the Inquisition." See also In Hume, though he does not use the word "resurrection," he writes this of that cardinal event in Christian history: "It is probable that few persons who proclaim their belief in miracles have considered what would be necessary to justify that belief in the case of a professed modern miracle-worker. Suppose, for example, it is affirmed that A.B. died and that C.D. brought him to life again. Let it be granted that A.B. and C.D. are persons of unimpeachable honour and veracity; that C.D. is the next heir to A.B.'s estate, and therefore had a strong motive for not bringing him to life again; and that all A.B.'s relations, respectable persons who bore him a strong affection, or had otherwise an interest in his being alive, declared that they saw him die. Furthermore, let A.B. be seen after his recovery by all his friends and neighbours, and let his and their depositions, that he is now alive, be taken down before a magistrate of known integrity and acuteness: would all this constitute even presumptive evidence that C.D. had worked a miracle? Unquestionably not. For the most important link in the whole chain of evidence is wanting, and that is the proof that A.B. was really dead. The evidence of ordinary observers on such a point as this is absolutely worthless. And, even medical evidence, unless the physician is a person of unusual knowledge and skill, may have little more value. Unless careful thermometric observation proves that the temperature has sunk below a certain point; unless the cadaveric stiffening of the muscles has become well established; all the ordinary signs of death may be fallacious, and the intervention of C.D. may have had no more to do with A.B.'s restoration to life than any other fortuitously coincident event." He then goes on to compare this miracle with an Islamic event. Sir Edmund Beckett, the Chancellor and Vicar-General of York, wrote for the Society for Promoting Christian Knowledge, a book analyzing Huxley's methodology and intelligence, concluding that Huxley on miracles was fairly useless. Because this book expresses clearly and cogently a believer's claim to the credibility of New Testament miraculous events, it is reproduced fully: A Review of Hume and Huxley on Miracles (1883). Preface IV to Science and Hebrew Tradition, written from the comfort of his new home, Hodeslea (designed by his son-in-law F. W. Waller), is eminently quotable in passages destroying inspiration, infallibility, demonology, and scriptural mythology, all of which he found not just unscientific, but immoral. "It is becoming, if it has not become, impossible for men of clear intellect and adequate instruction to believe, and it has ceased, or is ceasing, to be possible for such men honestly to say they believe, that the universe came into being in the fashion described in the first chapter of Genesis; or to accept, as a literal truth, the story of the making of woman, with the account of the catastrophe which followed hard upon it, in the second chapter; or to admit that the earth was repeopled with terrestrial inhabitants by migration from Armenia or Kurdistan, little more than 4,000 years ago, which is implied in the eighth chapter; or finally, to shape their conduct in accordance with the conviction that the world is haunted by innumerable demons, who take possession of men and may be driven out of them by exorcistic adjurations, which pervades the Gospels....Wherever bibliolatry has prevailed, bigotry and cruelty have accompanied it. It lies at the root of the deep-seated, sometimes disguised, but never absent, antagonism of all the varieties of ecclesiasticism to the freedom of thought and to the spirit of scientific investigation. For those who look upon ignorance as one of the chief sources of evil; and hold veracity, not merely in act, but in thought, to be the one condition of true progress, whether moral or intellectual, it is clear that the biblical idol must go the way of all other idols." On the idea of immortality, see the two other Metaphyical Society papers: Has a Frog a Soul (1870), Views of Hume, Kant, and Whately on the Immortality of the Soul (1870), and letter to Kingsley, September 23, 1860. Be not afraid, ye waiting hearts that weep; For still He giveth his beloved sleep, And if an endless sleep He wills, so best. |THE HUXLEY FILE| |GUIDES||TABLE OF CONTENTS| § 1. THH: His Mark § 2. Voyage of the Rattlesnake § 3. A Sort of Firm § 4. Darwin's Bulldog § 5. Hidden Bond: Evolution § 6. Frankensteinosaurus: Reptile to Bird § 7. Bobbing Angels: Human Evolution § 8. Matter of Life: Protoplasm § 9. Medusa et al. § 10. Liberal Education § 11. Scientific Education § 12. Unity in Diversity § 13. Agnosticism § 14. New Reformation § 15. Verbal Delusions: The Bible § 16. Miltonic Hypothesis: Genesis § 17. Extremely Wonderful Events § 18. Emancipation: Gender and Race § 19. Aryans et al.: Ethnology § 20. The Good of Mankind § 21. Jungle Versus Garden C. Blinderman & D. Joyce
<urn:uuid:21270cfa-3a57-4031-a23d-3c4de847419e>
CC-MAIN-2021-43
http://aleph0.clarku.edu/huxley/guide17.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00029.warc.gz
en
0.963171
3,341
2.921875
3
At the end of the Second World War former allies, the United States of America and the communist Union of Soviet Socialist Republics entered into a period that was aptly described as “the cold war”. Both superpowers, armed with ideological distrust and a large arsenal of atomic weapons, knew that a direct confrontation would only bring about mutually assured destruction. Each side fought the other indirectly by trying to influence foreign countries politically and economically while also aspiring to claim global prestige on the high ground of advanced technology – in particular, what became known in the 1960s as the “Space Race”. It was no doubt a rude shock to America when in 1961 the Soviets put the first man into space to orbit the earth in the spacecraft Vostok 1. Vostok (meaning Orient or East) became a household name around the world and one that was adopted by the communists for a little-known foray into World Championship Grand Prix motorcycle racing. Although the former eastern block countries of Czechoslovakia and East Germany are better recognised for their motorcycle production and Grand Prix prowess, thanks to CZ, Jawa and MZ, it was in the town of Serpukhov 99km south of Moscow that these not so widely known Russian racers were built. In 1942 the Central Construction and Experimental Bureau were established in Serpukhov with the aim of providing research and development for the numerous mass production motorcycle factories dotted around the USSR, in a bid to help the Soviet war effort during the Second World War. At the end of the conflict German motorcycle manufacturer, DKW fell into the hands of the Soviets. In the1930’s DKW had been the largest manufacturer of motorcycles in the world. The Russians plundered the Zschopau factory confiscating its technology and taking it to the Serpukhov Bureau, Unsurprisingly this spawned blatant copies of the two-stroke DKW racers. The S1B, the S2B and the S3B were all reproductions of pre-war DKW’s with capacities of 125cc, 250cc and 350cc while the “S” (sometimes referred to as “C” which translated from the Russian Cyrillic alphabet stands for “S”) in the acronym stood for the town of Serpukhov. Motorcycle competition and record-breaking took place post-war in the USSR but there was no participation in international events. The Soviet motorsport governing body the URSS was not affiliated with the Fédération Internationale de Motocyclisme (FIM), but by 1954 the communists became interested in competing on the international stage. The Central Automobile and Motor Cycle Club of Moscow joined the FIM two years later on the 1st of January 1956. But in 1954, in preparation for entry into international road racing, the Serpukhov Bureau designed (believed to be by Evgenij Mathiushin) a new series of four-stroke racers simply designated “S” for Serpukhov. The classification of these racers was quite simple. The S-154 had a 125cc capacity represented by the “1” and “54” was merely the year it was designed. Its architecture was double overhead camshaft driven by shaft and gears on the right-hand side. The single-cylinder was slightly inclined with a “square” bore and stroke of 54 x 54mm giving a capacity of 123cc and an output of 12.5hp. The chassis resembled a smaller version of the Norton Featherbed frame while the overall weight was approximately 80kgs with a top speed around 140kph. S-254 was designed as a 250cc twin-cylinder four-stroke racer with the same “square” dimensions of 54 x 54mm as the S-154 and also used double overhead camshafts, this time driven by an inclined shaft on the right-hand side of the engine to the inlet camshaft which in turn on its left-hand end used gears and a pinion to turn the exhaust camshaft. Ignition was by coil while twin carburettors supplied the fuel and final drive was by a five-speed gearbox. Weight was 126kg, and with 23bhp available, at 8,200rpm it boasted a top speed of 150kmh. For the chassis, a Featherbed type frame with earls type front forks was utilised, and initially, it was equipped with a dustbin fairing. Serpukhov’s 350cc machine was the S-354 and of the same design as the S-254 but with the bore and stroke taken out to 60 x 61mm for 348cc. Power was initially 33bhp at 8,200rpm and with a weight of 144kg was capable of 165kph. It used a duplex cradle frame was best described as a cross between a Manx Norton and a BSA Gold Star design and utilised earls type fork. A “bikini” fairing provided the aerodynamics. Then came the S-555, a bored-out version of the 350cc S-354 with a bore and stroke of 72 x 61mm giving the short-stroke engine a capacity of 498cc with a claimed power output of 47bhp at 7,400rpm and a top speed of 190kph. There was also a 175cc machine simply designated the S-175. This was not a bored out S-154 or half of the 350 twin and had a bore and stroke of 64 x 54mm for 174cc. It utilised a vertical cylinder like the later version of S-154, the S-157, and also boasted a twin-plug cylinder head, which became a feature of the S range in 1960. Although it was not an eligible capacity for international racing, a 175cc category was introduced into Soviet national competition. With no official factory based team running on a permanent basis the Bureau loaned the “S” racers to preferred motorcycle clubs in the major cities. These machines were made accessible to promising road racers as they were well in advance of the out-dated two-strokes and altered road bikes that were available to the majority of competitors in national events. Although these machines competed with a certain amount of success in race meetings mainly in the USSR, it was the Czechoslovakian manufacturer Jawa that in 1957 appeared to have a Grand Prix machine capable of competing at an international level bringing a halt to the development of the Serpukhov factories middleweight DOHC racers the S-257 and S-358. Czech racer Franta Stastny had ridden a Jawa 250cc racer to 12th place in the 1957 Lightweight TT on the demanding Isle of Man Mountain Course. This brought about a closer collaboration between the Serpukhov Bureau and Jawa. It effectively saw replicas of the Jawa 250cc, and 350cc racers re-badged as S-259 and S-360 Serpukhov machines, although a number of components were made in Russia. These two “S” racers used twin overhead camshafts driven by a vertical bevel shaft positioned behind the two cylinders, driving the inlet camshaft and a horizontal shaft across the top of the engine to drive the exhaust camshaft. The cylinders were inclined at 10 degrees, and a heavily finned wet sump held the engine oil. The cylinder head sported two valves per cylinder and twin spark plugs with a battery and coil ignition. A pair of Amal carburettors provided the fuel and final drive was via a six-speed gearbox. The frame for the two racers was conventional tubular construction either diamond or Featherbed with 19-inch wheels. The 248cc version had a bore and stroke of 55 x 52 mm and produced 38bhp at 11,000rpm. With a weight of 128kgs, a top speed of 190 km/h could be reached. It’s thought the 350cc version had a bore and stroke of 62 x 57.6mm and approximately 46bhp 10,300 rpm with a weight of 130kgs. 210 km/h was believed to be the top speed. The Jawa replicas were a step in the right direction for the Serpukhov Bureau. Russian rider Nikolai Sevostianov on the S-360 claimed third place in May 1961 at the Djurgardslopper international race meeting held at Helsinki in Finland. It should be noted that the Jawa 350cc “version” did considerably well over the course of the 1961 Grand Prix season with factory riders Franta Statsny and Gustav Havel claiming a double 1st and 2nd places in the German and Swedish Grand Prix’ eventually finishing 2nd and 3rd in the 350cc World Championship More progress came when the Soviet team made their debut in the World Championships at the East German Grand Prix at the Sachsenring in August 1962. By now the “S” racers were sometimes entered as CKB or on occasion as CKEB in reference to the Central Construction and Experimental Bureau in Serpukhov. Again it was Russian rider Sevostianov that provided the results finishing fifth in the 250cc class and in the 350cc category a fine sixth place. The team returned in 1963 to the East German Grand Prix taking fifth place for Sevostianov riding the S-360 in the 350cc class. Sevostianov accomplished an even better result at the Finnish G.P. held at the Tampere circuit coming home in fourth in the 350cc category, although there is a side story to this result as the outcome may have been a Podium. The following is the doyen of motorcycle journalists Chris Carter’s recollection of the event published in his book “Chris Carter at Large.” Carter, “Mike Hailwood was there on his 350cc and 500cc MV Agusta’s, and there was a Russian guy on one of these Russian four-cylinder Vostoks (authors note: it was, in fact, a twin-cylinder S-360). Down the straight, he kept looking across at Hailwood, and he wouldn’t brake for the first-right hander until Hailwood did. Hailwood became furious with this man, so in the end, quite deliberately, he didn’t brake at all. They both shot up the slip road, and then Hailwood … put his foot on this man’s petrol tank and shoved. The poor Russian and his Vostok went crashing to the ground.” Hailwood went on to win the race. Sevostianov was also entered in the 500cc class and took sixth place on a bored out S -360 twin. As the results of the “S” racers in the World Championship improved, the head of the Serpukhov Bureau, Ing. Ivanitsky, and the Deputy Director of Laboratories at the Vniimotopram Institute, V Kuznetsov, decided it was time to take on the European and Japanese factories at their own game with a completely new design. The 1964 S-364 was a 350cc four-cylinder four-stroke and the first from the Serpukhov Bureau to be entered as a Vostok. The ambitious project also included a 500cc version to challenge for the blue riband class but was still on the drawing board. The Vostok’s engine architecture took its design cues from the Italian multi’s and the Honda’s with double overhead camshafts being driven by a central gear train. Bore and stroke were oversquare with dimensions of 49 x 46mm for a capacity of 347cc. Ignition was by magneto and coil while four 30mm carburettors supplied the fuel and the final drive was via a dry clutch and six-speed gearbox. The first Vostoks used the frame and suspension units of the Jawa/CKB racers. Weight was around 130Kgs with a top speed of 230km/h. It was at the East German Grand Prix in July 1964 that the Vostok S-364 made its international debut, creating a flurry of interest, as these were the most technically advanced Grand Prix racers to come out of the Soviet Union. It was not to be the introduction though that the Serpukhov Bureau would have hoped for as both the entries of Sevostianov and Estonian rider Endel Kiisa retired with mechanical problems after holding third and fourth place behind Jim Redman on a Honda and Gustav Havel on a Jawa. Sevostianov also raced in the 500cc class on a bored-out version of the CKB S-360 twin and managed a fourth-place finish. In August at the Finnish Grand Prix Endel Kiisa recorded the Surpokhov racers best result in the World Championship so far with a podium third place behind Redman and Beale on Honda’s. But it was not on the Vostok four but the CKB S-360 twin cylinder. However, the Vostok four did appear again in September at Monza in the Nation’s Grand Prix. Unfortunately, Sevostianov and Kiisa both retired with mechanical problems, which was said to be with the ignition, but in reality, the S-364 was destroying its pistons as it had done on debut in East Germany. The four-cylinder reappeared again in 1965 at the first round of the championship, the West German Grand Prix at the Nurburgring. The Soviet team arrived a day late and Endel Kiisa could only manage one practice session. On the starting grid for the mandatory push start the Vostok refused to fire, but once he got on his way, Kiisa managed to fight his way through a pack of privateers to finish in fifth place. In a field that included riders of the calibre of Agostini and Hailwood on factory MV Agusta’s, it was a promising result. Only a week later at the non-championship Austrian Grand Prix, he very nearly gave the Vostok its maiden international triumph only to retire a just a kilometre short of victory. Before the East German Grand Prix later that year significant changes were made to the Vostok S-364. A new frame based on the Norton Featherbed design was employed, and the power unit was improved with a new cylinder head and an oil cooler mounted in front of the engine. Unfortunately, both Vostoks retired from the East German race, but only a week later, at the Czechoslovakian Grand Prix in Brno, Sevostianov took the honour of a 3rd place podium behind Jim Redman on a works Honda and Derek Woodman on an MZ. It was the best result so far for a Russian rider on a Russian designed and built racer in the classics. The Vostok did compete at the Nations Grand Prix at Monza in Italy in September with Kiisa finishing in eight spot, and again later that month for a meeting organised by the Automobile Club of Milan as an Italy vs USSR match race series. Italian riders filled the first six places of both races, and sadly this was also the last international event for the Vostok S-364. There was to be however one last hurrah for the Vostok racers. A 500cc version of the four-cylinder machine had been built with the designation S-565 presumably making it a1965 design although it was based on the 350cc model. With a bore and stroke 55 x 52mm for a capacity of 494cc the engine produced a reputed 80bhp at 12,400 rpm. Weighing in at 155kgs it was good for 250 km/h. There were some minor visual differences to the 350cc version with more fins to the cylinders a deeper sump and more fins on the front of the crankcases. In 1968 the Vostok team turned up for the Finnish Grand Prix just over the Soviet border at Imatra. With Honda and Mike Hailwwod’s withdrawal from the World Championship, it was assumed the race would be a cakewalk for Agostini and the MV Agusta triple. As expected “Ago” took the lead with Kiisa and the Vostok glued to the back wheel of the MV. Three laps in, and to the amazement of the crowd, the Vostok accelerated past the 500cc World Champions out of a slow corner. This was the first time a Soviet machine had led a 500cc Grand Prix. It was not to last with Kiisa experiencing ignition problems and retiring from the race. Sevostianov saved some face for the Vostok team by finishing in fourth place. For 1969 some improvements were made to the S-565 Vostok, with a new four-valve head and huge drum brakes fitted that were developed originally for the Jawa V-four 350cc two-stroke. The upgraded machines were entered in the East German Grand Prix at the Saschenring. It was not to be a good meeting for the Vostoks. During the wet race, Kiisa returned to the pits to change a spark plug finally managing tenth place, while his teammate fellow Estonian Juri Randla had held third place but a misfire and carburettor problems forced him to retire. Seven days later at the Czechoslovakian Grand Prix, both Vostoks retired on the second lap. It was a humiliating conclusion to an endeavour that held so much promise but was defeated by lack of an adequate budget to fully develop these fascinating Grand Prix racers.
<urn:uuid:299729d5-806b-45fd-9b57-59b3cd42fb95>
CC-MAIN-2021-43
https://motovue.net/2018/10/20/from-russia-with-love-the-vostok-racers/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00070.warc.gz
en
0.970666
3,676
2.53125
3
Metastatic breast cancer symptoms: The signs women with a history of breast cancer need to watch out for Breast cancer is the second most common type of cancer among women in America, according to the American Cancer Society (ACS). One in eight women will develop the disease at some point in their lives. For the most part, breast cancer, in general, is very treatable if detected early. But sometimes, that cancer can spread to distant parts of the body — places beyond the breast and nearby lymph nodes — and become too advanced to treat with the intent of a cure. This is known as metastatic breast cancer, or stage 4 breast cancer, and it’s the most advanced stage of the disease. The most common places for breast cancer to spread are the bones, liver, lungs, and brain; and less commonly, to the abdomen and skin, Nancy Lin, MD, an oncologist who specialises in breast cancer at Dana-Farber Cancer Institute in Boston, tells Health. Experts aren’t entirely sure why or how breast cancer spreads in this way, but per the National Cancer Institute (NCI), metastasis occurs when cancer cells find their way into the bloodstream and lymphatic system and thus are able to move throughout the body. Where, exactly, breast cancer metastasizes to matters a lot regarding how symptoms in stage 4 cancer present — the signs of metastatic breast cancer can vary significantly depending on where it has spread and how far it has progressed. Here, experts break down the many metastatic breast cancer symptoms, and what to know if you or a loved one are experiencing them. What are the systemic symptoms of metastatic breast cancer? As with any cancer that has progressed throughout the body, there are some systemic, or full-body symptoms of metastatic breast cancer. However, because these symptoms also overlap with symptoms of many other health conditions, it’s best to consult with your doctor before jumping to any conclusions to ensure you get proper treatment. In the case of metastatic breast cancer, these systemic symptoms are a result of your cancer cells starving your body of nutrients. “When you have metastatic disease, the body is really competing with cancer for survival, nutrition, and energy,” Evelyn Toyin Taiwo, MD, haematologist and oncologist at Weill Cornell Medicine and NewYork-Presbyterian Brooklyn Methodist Hospital, tells Health. “The body has to work a little bit harder than it normally does [to function.” Here are some of the more common full-body symptoms of metastatic breast cancer: This is a common cancer symptom in general, and can be a sign that a person’s cancer has metastasized. As mentioned, cancer cells rob healthy cells of nutrients in order to grow; this starves your cells and contributes to feeling tired, according to Johns Hopkins Medicine. Cancer can also cause anaemia, a condition in which a person lacks enough healthy red blood cells, says Dr Taiwo, which can also affect energy levels. Lack of appetite According to Dr Taiwo, anorexia (which in this case means lack of appetite) is a common symptom of metastatic cancer. If a person is experiencing other site-specific symptoms of their cancer like nausea or vomiting (more on those in a minute), they might not want to or be able to eat as much. Per the ACS, certain types of cancers might also release hormones that impact a person’s natural hunger signals. Extreme weight loss This again goes back to the fact that cancer is starving your healthy cells of nutrients. When a cancer has progressed to the point of metastasis, a person can start losing weight without intending to. Additionally, a person who doesn’t eat due to lack of appetite will eventually start to lose weight. What are the localised symptoms of metastatic breast cancer? Metastatic breast cancer most often spreads to the bones, lungs, liver, and brain. It doesn’t spread exclusively to those locations, but these are the most common sites of metastasis. Most metastatic breast cancer patients don’t experience symptoms in their breasts, says Dr Taiwo. That’s because in the majority of cases of metastatic breast cancer, a person was previously diagnosed with an earlier-stage breast cancer and received localised treatment to their breasts. Only a minority of metastatic breast cancer patients are initially diagnosed with stage 4 cancer; if they have a breast mass, it likely isn’t painful, she says. Very rarely does a breast cancer mass grow to the point where it becomes ulcerous and painful. Thus, most symptoms of metastatic breast cancer vary depending on where the cancer has spread. Someone who has cancerous lesions in their bone will have a different set of symptoms than someone whose cancer has metastasized to their brain or liver. Here’s an overview of the different symptoms for these common sites. Metastatic breast cancer symptoms in the bones: The bone is one of the most common places for breast cancer to metastasize—60% of metastatic breast cancer patients experience bone or lung metastasis, according to research published in the journal Cancer. The most common symptom is bone or joint pain that progressively gets worse, Dean Tsarwhas, MD, the medical director of cancer services for Northwestern Medicine Lake Forest Hospital, tells Health. Dr Taiwo adds that the most common areas for bone to be affected are in the hip and lower back. Identifying bone pain can be challenging for patients who have arthritis or other chronic pain issues, Dr Taiwo says. “Patients who have arthritis…aren’t that concerned about the pain that they’re having. They think it’s part of arthritis.” She says that any new pain that feels different from other chronic pain a patient may have experienced is a red flag that their breast cancer may have spread. In rare cases, Dr Taiwo says that patients find out they have metastatic breast cancer in their bones after breaking their bone (say from a fall or other injury). “In the process, images are done and we find that they have other [bone] lesions in the area.” This is known as a pathologic fracture. Metastatic breast cancer symptoms in the liver: This can be a bit trickier to identify because the symptoms can be similar to other stomach and gastrointestinal issues, says Dr. Taiwo. Often a person will have abdominal pain, nausea, and vomiting, or even jaundice (where the skin and whites of the eyes turn yellow), depending on how much cancer has spread in the liver. By the time that a patient tends to present with symptoms, they already have a fairly significant burden of disease, she says — meaning that their cancer has already progressed to make them very sick. Metastatic breast cancer symptoms in the lungs: As with the liver, there aren’t often symptoms of metastatic breast cancer in the lungs until the disease has progressed fairly significantly, says Dr Taiwo. Sometimes a person has a dry cough, or fluid builds up in the lungs to cause shortness of breath. Metastatic breast cancer symptoms in the brain: Metastatic breast cancer doesn’t often spread to the brain, although it is more common with triple-negative breast cancer, says Dr Tsarwhas. When it does, symptoms can include headaches, nausea, vomiting, dizziness, or trouble standing or walking, says Dr Taiwo. In rarer cases, a patient can experience seizures. These symptoms result from the increased intracranial pressure caused by the addition of cancer to the brain cavity—which is a pretty tight space, to begin with, Dr Taiwo says. What are the symptoms of metastatic breast cancer complications? If a person’s cancer has progressed significantly without treatment (or without response to treatment), it can cause more serious complications that can be life-threatening. Here are some of the most common: These are common complication from metastatic breast cancer that has spread to the bones, Alberto Montero, MD, director of the breast cancer program at University Hospitals Seidman Cancer Center in Cleveland, Ohio, tells Health. “Cancer in the bone can erode the integrity of the bone, causing a fracture,” he says. Spinal cord compression This can happen if cancer metastasizes into the spinal column, says Dr Taiwo. The cancer can press into the spinal cord and surrounding nerves (which are protected by the spinal column), causing weakness or numbness in the limbs — particularly the lower extremities, she says. If not addressed, a person can lose function of their bladder, bowels, or limbs. This is a less common complication affecting an estimated 3%–5% of cancer patients, as reported in the journal Clinical Medicine—although it’s more likely to happen in patients with breast, prostate, and lung cancer. This is where a person has too much calcium in their blood. It can be a complication of metastatic breast cancer (although it can happen in earlier-stage breast cancers). “Whenever there’s cancer in the bone, calcium can leach out,” says Dr Montero. Cancer cells release cytokines and proteins that disrupt the bone regrowth process, making the bone break down faster than it can regenerate itself — releasing calcium into the blood. “Really high calcium levels can cause heart abnormalities,” he says, as well as confusion, excessive thirst, confusion, and lethargy. Hypercalcemia is often a sign that the cancer has advanced significantly, and is associated with a poorer prognosis despite newer advancements in treatment, according to data in the Journal of Clinical Oncology. Malignant pleural effusion This is a complication of metastatic breast cancer in the lungs. It is caused by the buildup of cancer cells and excess fluid in the pleura (aka the tissues that cover and protect the lungs). Normally these tissues have a small amount of fluid for lubrication, says Dr Montero, which gets reabsorbed by your lymphatic system. “When there’s metastatic cancer, it can clog up the lymphatic system in your chest,” he says, leading to a buildup of fluid that causes coughing, shortness of breath, and chest pain. How is metastatic breast cancer diagnosed? Usually, an earlier-stage breast cancer diagnosis happens by mammogram, says Dr Lin. Often there’s a follow-up with an ultrasound or MRI, then a biopsy, to confirm that it is breast cancer and not a benign mass. But with metastatic breast cancer, a patient usually has already been diagnosed with and treated for breast cancer. So diagnosis typically comes in response to new symptoms. “Our antennae are always up,” says Dr Taiwo, if a patient with a history of breast cancer starts experiencing symptoms like new bone pain or unexplained nausea or weight loss. “We have a low threshold to investigate further to see if the patient is now metastatic.” For example: If a patient who was initially diagnosed with stage 2 breast cancer later complains of hip pain and trouble walking, Dr Lin says that she’ll typically do an X-ray and a bone scan to see if there’s any evidence of cancer in the bone. Similarly, if a person with a history of breast cancer starts experiencing headaches and dizziness, a doctor may perform an MRI to see whether cancer has spread to the brain. In the future, Dr Tsarwhas says there may be more proactive ways to diagnose metastatic breast cancer in the future, such as blood tests that can detect metastatic breast cancer cells in the bloodstream. Dr Lin says that these kinds of tests could help doctors begin treatment and potentially even eradicate cancer before it progressed to stage 4. Treatments are also improving to help drastically increase a patient’s lifespan, Dr Tsarwhas adds. If you have a history of breast cancer and are experiencing new, troubling symptoms, be sure to talk to your doctor as soon as possible. “There are times for optimism given all of the research and developments that have happened in the treatment of breast cancer,” Dr Tsarwhas says. By being proactive about any metastatic breast cancer symptoms you have, you can help ensure that you are getting the best possible care — and improving your odds for living a longer life with the disease. This story first appeared on www.health.com (Main and Feature Image Credit: Getty Images) © 2021. Health Media Ventures, Inc. . All rights reserved. Licensed from Health.com and published with permission of Health Media Ventures, Inc. . Reproduction in any manner in any language in whole or in part without prior written permission is prohibited. Health and the Health Logo are registered trademarks of Health Media Ventures, Inc. Used under License.
<urn:uuid:0de63dc2-cd7c-4ffd-b642-616699d5925d>
CC-MAIN-2021-43
https://watermark.co.th/metastatic-breast-cancer-symptoms-the-signs-women-with-a-history-of-breast-cancer-need-to-watch-out-for/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585449.31/warc/CC-MAIN-20211021230549-20211022020549-00230.warc.gz
en
0.943385
2,678
2.640625
3
As we have seen throughout this series, there are many lessons that we can learn from the life of Moses. In this article, we will look to learn from Moses’ role as both a spiritual and political leader, and try to understand what the role of the leader is fundamentally about. Although the initial call Moses received was to lead the Israelites out of Egypt, that task was only the start of his leadership. Through the journey in the wilderness, Moses’ role shifted from being an inspirational, revolutionary leader to leading a reluctant people on a depressing detour of their own making, away from and not toward the better future originally envisioned for them. As we will see in this article, Moses was instrumental in acting as a mediator between God and the people; in the institutionalization of values and practices; and, finally, in serving the people by preparing for a successor to lead in his inevitable absence. At the heart of all that Moses did was the recognition that his leadership was not about self-glorification. Instead, it was about serving one greater than himself and joining in his work. Leadership as Mediation To understand the role of the leader, it is important to first establish what lies at the heart of leadership. Through my experience in politics, I’ve come to see that leadership of any kind and at any level invariably involves the reconciliation of conflicting interests. In Moses’ case this meant not only mediating disputes among the Israelites themselves, but also acting as a mediator between God and his people. Initially, of course, Moses acted as a mediator between God, the Israelites, and Pharaoh. But once the Red Sea had been crossed, Moses began to face intense criticism from the people he was leading (a topic we will explore more deeply in the next article). Despite being freed from slavery, they resented the hardships of the desert journey toward the Promised Land and frequently demanded a return to Egypt. Most often their criticisms were directed at Moses as God’s representative, forcing Moses to stand in the gap between God and his people. For example, when the Israelites (after receiving the negative report from the spies) refused to enter the Promised Land, God threatened to destroy them and start all over again by creating a new nation from Moses’ own descendants. But Moses interceded as a mediator on their behalf, reciting back to God the promise he had declared to Moses on Mount Sinai: “The Lord is slow to anger, abounding in love and forgiving sin and rebellion” (Numbers 14:11-19). But perhaps the most striking example of Moses as mediator occurred when venomous snakes were sent among the people in response to yet another outbreak of rebellion. Again Moses interceded in prayer for the people, and God responded by instructing him to make a bronze snake and put it up on a pole. Whoever looked at the bronze snake, after being bitten, would live (Numbers 21:4-9). In the New Testament, Jesus specifically refers to this incident as analogous to his own role as a sin bearer and his mediatory death on the cross—“Just as Moses lifted up the snake in the desert, so the Son of Man must be lifted up, that everyone who believes in him may have eternal life” (John 3:14). As Christians, no matter what position we occupy in society or in an organization, we are called to practise the ministry of reconciliation. In doing so we are acting out one of the most central doctrines of our faith (II Corinthians 5:17-21). And while this is not the place to expand on all that the ministry of reconciliation involves, it is nevertheless instructive to recognize that mediation was one of the central tasks of Moses the political and spiritual leader, and that in this regard he models leadership in the spirit of Christ. Institutionalising for the Future While dealing with issues at hand through mediation is an unavoidable aspect of leadership, it is also critical to prepare for the future if the values, mission, and distinctive character of the organization or community is to be sustained over the long run. Such preparation includes more than succession planning; in particular it includes institutionalising those values and practices necessary to achieve long run sustainability. Thus—on instruction from God—Moses communicated to the children of Israel the legal, material, and procedural/ceremonial means whereby they were to worship and serve Him and one another. In fact, more than sixty chapters of the Pentateuch are devoted to descriptions and instructions pertaining to how the Israelites were meant to live with respect to their treatment of one another and resolving conflicts; how they were to celebrate the Sabbath and various feasts and festivals; how they were to worship individually and communally, and the role of priests within worship; what they were to eat, and the means by which they were to stay healthy; and the various punishments and blessings for their responses to these instructions. On the surface these laws may look like mere religious trappings. On closer inspection, however, they were about preparing the community for the future. In fact, all these regulations are means to facilitate the end of bringing glory to God through worship, obedience, and service. In order for the future to be prepared for, the correct end had to be kept as the central concern. But as the historian Will Durant has ruefully observed, “It is the tragedy of things spiritual, that they languish if unorganized and yet are corrupted by the material [and, I would add, intellectual] means of their organization.” True to Durant’s observation, many of the laws, structures, and ceremonies established under Moses and meant to facilitate the worship and service of God became, by Jesus’ time, ends in themselves. Moses’ Law had become corrupted to such a degree that, in Jesus’ judgment, the Temple was now a “den of thieves”; the Sabbath a wearisome burden; and the law itself was more about splitting hairs than about justice and mercy. The Rule of Law established by Moses had tragically degenerated for the most part into a dry and spiritually bankrupt legalism. It was perverted to the point where the Pharisees could even say to Pilate “we have a law [the Law of God], and by our law he [the Son of God] ought to die” (John 19:7). Any worthwhile pursuit—spiritual, political, economic, academic, or charitable—needs to be organized in some fashion if it’s to be sustained. More often than not, this is the leader’s responsibility. When done well, institutionalising sustains the life and purpose of the enterprise. But far too often the means of institutionalising can quench the spirit of an organisation. It takes wise leadership indeed to discern what leads to life and what leads to death. Being acutely aware of these possibilities, however, is the first step toward preventing institutionalisation from eventually strangling the organization or community it is meant to sustain. Preparing for Succession Providing for a qualified successor is often one of the last and most trying tasks of leadership. This task is complicated by the fact that there will be many others with distinct ideas as to who your successor should be. During Moses’ long tenure as Israel’s political and spiritual leader there were several attempts to displace or replace him as leader—by members of his own household (Numbers 12:1-16); by angry mobs of discontented and disillusioned followers (Numbers 14:1-4, 10); and even by the community leaders he had appointed (Numbers 16). But instead, God had Joshua in mind as a successor for Moses. And perhaps Moses was vaguely aware of this from an early stage as he assigned Joshua to lead the Israelites in one of their earliest battles (Exodus 17:10). He also picked Joshua to serve as his aide at the Tent of Meeting where Moses met face to face with God (Exodus 33:7-11). Likewise, Joshua was selected as one of the twelve spies to explore Canaan, and on the completion of this mission only he and Caleb still believed that God could give the Israelites the land (Numbers 13: 8; 14: 5-9). It seems like Joshua was being prepared by God, long before he ever received the mantle of leadership from Moses. Eventually Moses was clearly directed to “commission Joshua, and encourage and strengthen him, for he will lead this people across [the Jordan] and will cause them to inherit the land …” (Deuteronomy 3:28). By largely leaving succession and his own reputation in the hands of God, Moses left the leadership of Israel in capable hands as Joshua went on to fulfill the mission of leading the children of Israel into the Promised Land. The Leader’s Legacy At the end of the day, perhaps the greatest lesson we can learn from Moses is that true leadership isn’t about the leader. It’s about serving someone and something greater than one’s self. One of the most admirable things about Moses is that, unlike many modern leaders, he was not preoccupied in his latter years with creating a personal legacy. My father, who spent all of his adult years in politics and government, twenty-five as Premier of Alberta, described the dangers of a leader trying too hard to shape his own legacy while still in office: “It’s like trying to drive a car forward while looking in the rear view mirror. The most likely result will be a crash—and that will be your legacy.” Moses for the most part was willing to leave not only the choice of his successor but also his legacy in the hands of God. He made no provision for members of his family, or even members of his own tribe, to succeed him. He erected no monument to himself, named no institution after himself, and even his gravesite is known only to God. He steadfastly served his people by serving the one who had called him to that service and to whom he was ultimately accountable. And what a legacy of leadership that left for Israel and for us. The Books of Moses conclude with this fitting epitaph to Israel’s first political and spiritual leader: “No prophet has risen in Israel like Moses whom the Lord knew face to face” (Deuteronomy 34:10). Biography of Preston Manning Preston Manning works with the MI on the development and communication of faith-informed approaches to political leadership and public policy, including new approaches to the intersection of faith with democratic governance, the market economy, pluralism and multiculturalism, science and technology, and environmental stewardship. Preston served as a member of the Canadian House of Commons from 1993 to 2001, part of which he served as his party’s critic for Science, Technology and Innovation. He founded two new political parties—the Reform Party of Canada and the Canadian Reform Conservative Alliance—and was the Leader of the Official Opposition from 1997 to 2000. Preston also has 20 years of experience as an owner and manager of a consulting firm specializing mainly in strategic planning and communications advice to the energy sector. In 2005, he founded the Manning Centre for Building Democracy, which supports research, educational, and communications initiatives designed to achieve a more democratic society in Canada guided by conservative principles. Source: Marketplace Institute
<urn:uuid:39cdd681-8386-4f2d-9287-89016a85bd77>
CC-MAIN-2021-43
https://marketplace.regent-college.edu/ideas-media/society-politics/faith-politics--the-role-of-the-leader
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585671.36/warc/CC-MAIN-20211023095849-20211023125849-00310.warc.gz
en
0.980199
2,343
3.53125
4
Officially, there are 15 different confirmed sightings of spider species in Hawaii. Some of these spiders are unique to Hawaii, while others can also be found on other continents and countries. In this article, we’ll go through the spiders that can be found in Hawaii, and we’ll also take a look at some of the characteristics of these spiders. Spider Species in Hawaii These are the most common spiders found in Hawaii. 1. Hawaiian Garden Spider (Argiope appensa) The Argiope Appensa, or the Hawaiian garden spider, is a common spider species found in Hawaii. It is also found in other countries, such as Taiwan, Australia, New Caledonia, New Guinea, and Indonesia. These spiders are orb-weaving spiders, and they are communal spiders, which means they like to live in communities. The females are black-and-yellow, while males are brown, which means that these spiders show sexual dimorphism. This spider is commonly found in Hawaiian gardens and yards as they love to create webs in these areas, where they will prey on insects and other animals they can find. 2. Giant Daddy-Long-Legs Spider (Artema atlanta) The giant daddy-long-legs spider is the biggest daddy-long-legs spider in the world. It is commonly found in Australia and parts of Asia, but also Hawaii and other islands in the Pacific Ocean. The length of their legs is about 6.5 times the size of their body, which makes this spider the largest daddy-long-legs spider in the world. It is said that this species was originally found in Asia, although it was later distributed to other parts of the world, including Hawaii. The spider loves the Hawaiian climate so it will be found in different areas. 3. Huntsman Spider (Heteropoda venatoria) The huntsman spider, or the Heteropoda Venatoria, is one of the most famous spiders in the world. It is particularly known for its immaculate hunting techniques, as it can capture large amounts of prey in a single day. Huntsman spiders have venom, so many people are afraid of these spiders and their bites. However, the venom will usually not present big problems to humans. Instead, the spider will use this venom to attack other species, as it is one of the most effective species when it comes to hunting insects in the world. 4. Brown Widow Spider (Latrodectus geometricus) The brown widow spider, or the Latrodectus geometricus, is considered to be one of the most feared spider species in Hawaii. Their bites can be quite painful and might cause some discomfort for someone who’s been bitten, but they are rarely dangerous. This spider is known for its long, brown legs, and brown body. They also have black and white patterns on the sides of their abdomen, and they’re also known for their hourglass shape. The brown widow spider is quite common in Hawaii. It is one of the most commonly seen spiders, although they have been known to cause some problems for humans because of their bites. They will almost never bite on their own, though, and might only bite if they feel they have no escape. 5. Hentz Orb-Weaver (Neoscona crucifera) This spider is an orb-weaving spider that is found in both North and South America, but it is especially prevalent in states from Minnesota to Arizona. Sometimes, this spider is also called a spotted orb weaver or a barn spider due to the fact they’re sometimes found in barns. You’ll see this spider almost always in the comfort of its web. It will rarely leave its web and will create large-scale webs that are meant to both protect them and help them hunt. This spider is commonly seen in late summer and early autumn, and many sightings of this spider are reported in that time particularly. 6. Barn Funnel Weaver (Tegenaria domestica) The barn funnel weaver belongs to the group of spiders called Agelenidae, which is a funnel-web family that is found in Europe and the Americas. This spider is known for its funnel webs, which it will create in nature. This spider is distinguished by its long legs and relatively thick body. These spiders are orange to brown, and they typically have striped legs. They also have two long stripes on their cephalothorax, which makes them quite easy to distinguish. 7. Red House Spider (Nesticodes rufipes) The Nesticodes rufipes is sometimes seen in Hawaii, although not as common as some other spider species we’ve mentioned above. These spiders are venomous spiders with small, red bodies. Even though they are venomous, they are typically not dangerous to humans. They might appear menacing, but these spiders will rarely attack humans. You might find them hiding in your home, building webs, and hiding between furniture pieces. 8. Spiny-backed Orb Weaver (Gasteracantha cancriformis) The spiny-backed orb weaver is one of the most interesting spider species found in Hawaii. It is usually quite easy to spot thanks to its distinct appearance. It has that typical arrangement of six spikes on its abdomen, accompanied by black and white spots, which makes it look a bit like a crab. Not to be confused with a Crab Spider (Thomisidae) which is a small spider known for its ability to change its color to match its surroundings. This spider species is usually found inside a web, but it does not live very long. Their main aim is reproduction, and when they achieve that goal, most of these spiders will perish. 9. Grey House Spider (Badumna longinqua) The grey house spider is one of the more common spider species found in Hawaii. It is usually found in homes and it hides between furniture and in corners of your home. The spider has that typical grey appearance that many people will recognize quickly. They are also known for their striped legs. The spider is found all over the world, but most commonly in New Zealand, eastern Australia, Hawaii, Japan, the US, Mexico, and some other countries around the world. 10. Cithaeron praedonius Cithaeron praedonius is a species from the Cithaeronidae family of spiders. While commonly found in India, they are also spotted throughout the world. Their range may be expanding as they hitch-hike their way around the world on boats and planes. While they’re not abundant in Hawaii, there’s some evidence among people online that it may be present in urban areas. More research and crowdsourcing of spider identification is required. 11. Adanson’s House Jumper Adanson’s House Jumper (Hasarius adansoni) is a species that thrives in warmer climates. It’s common in India, Australia, Japan, and China. The spider is named after French naturalist Michel Adanson who identified it in 1826. They’re various colors of black, red, white, and brown. The males are more colorful than the females. They’re only small. The abdomen of a female reaches 8mm while the male abdomen only grows to 6mm long. 12. Mediterranean Recluse The Mediterranean Recluse is almost indistinguishable from its mainland cousin, the brown recluse. Like the brown recluse, it’s highly venomous and can cause serious harm to humans. There’s only one recorded death from the Mediterranean Recluse bite (in 2016), but treatment is required if it bites. There are no brown recluses in Hawaii, so if you think you saw a brown recluse on the island, chances are it’s the Mediterranean Recluse. 13. Neoscona theisi Neoscona theisi is an orb web weaver spider with a yellow tinge, although its colors range from brown through white on its dorsal. They’re mostly found in Australia, particularly tropical areas such as northern Queensland, but have also been identified around Hawaii, where the climate is similar to Australia’s. The men are identifiable for their more flamboyant dorsal patterns than those of the females. As with most spiders, the males are also slightly smaller. 14. Western Spotted Orb Weaver The Western Spotted Orb Weaver (Neoscona oaxacensis) is very common throughout North America. It was first identified in Oaxaca, Mexico, which is how it got its scientific name. They’re one of the more common orb weavers you can find, with large versions found on the Galapagos Islands, and others found in Venezuela, Peru, and the United States. Their dorsal patterns are highly variable, but they’re usually a mix of greys and creamy yellows. 15. Double Spotted Spiny Spider The Double Spotty Spiny Spider is from the Asian Spinybacked Orb-Weaver Family. They’re identifiable by their spikes on their backs, and the fact they spend their days sitting in their orb webs in gardens. Hawaii is the only known state in which the Double Spotty Spiny Spider lives. Its main home outside of Hawaii is the Philippines. Their spiky backs, often with red spikes, make them look fearsome and unpalatable to predators. Hawaii has its fair share of spiders, including some dangerous ones such as the Mediterranean Recluse. Of course, the ever-present daddy long legs (cellar spider) also makes its way into Hawaiian homes. The warm weather in Hawaii makes it a great home for spiders who, as cold-blooded creatures, rely on the warmth of the climate around them to keep their bodies warm.
<urn:uuid:5548ce84-7f21-45bb-bf07-168692c49534>
CC-MAIN-2021-43
https://faunafacts.com/spiders/spiders-in-hawaii/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587606.8/warc/CC-MAIN-20211024204628-20211024234628-00390.warc.gz
en
0.959817
2,082
2.84375
3
- Vaccine became the first in the world to be approved for mass use last month - Move sparked alarm because there was no scientific evidence to prove it works - But two early clinical trials, published today in The Lancet, indicate it's safe and Russia's Covid-19 vaccine might actually protect people from catching the disease, early studies show as the country finally publishes data about the controversial jab. The vaccine became the first in the world to be approved for mass use last month, with Vladimir Putin eyeing up nationwide injections in October. The move sparked uproar in the scientific community because there was no evidence to prove the vaccine - dubbed Sputnik V - worked or was safe. And it later emerged that British spies had detected a Russian cyber attack on Oxford University scientists who are developing an almost identical vaccine, raising fears that Moscow had tried to steal research from the UK. But results from two early clinical trials done in Moscow and published today in the prestigious British journal The Lancet, indicate the vaccine is safe and effective. The Russian scientists behind the studies said the jab stimulated an immune response in all inoculated participants and did not cause any serious health issues. Production of antibodies seen in the patients suggests the vaccine was able to prepare the body to be able to fend off Covid-19. Independent Western scientists said the results were 'somewhat reassuring' but warned the trials were too small and narrow to justify injecting millions of Russians. Just 76 people were involved in the study, only half of whom were actually jabbed, and volunteers were all healthy and mostly in their 20s and 30s. Vaccines can be more dangerous in elderly and vulnerable because their immune systems are too weak to fight off the tiny amounts of virus in the vaccine. And just because the jab does not cause harm does not mean it can actually prevent infection in real-life situations. More rigorous research will need to be done to prove this. Scientists in the US and UK, who were not involved with the work, said the results were 'encouraging' and that the vaccine showed 'promise'. They were still concerned, however, about the quality of the research and of jumping the gun and pumping the jab into people too soon. The research was not randomised or placebo-controlled, meaning it was not done to the highest scientific standard and the effects of the jab could not be compared to the health of people who didn't get it. Randomised controlled trials ensure participants do not know if they are really getting the vaccine or a dud and are deemed critical in removing bias. The trials took place in two hospitals in Moscow, the Burdenko Hospital and Sechenov University Hospital. Participants were aged between 18 and 60 and all deemed healthy with no underlying health conditions. In phase 1 of the trial, volunteers were given one part of the vaccine to see if they suffered any negative side effects. Nearly 60 per cent of participants suffered some pain at their injection site, while half suffered high temperatures - these are generally considered mild, acceptable effects. Four in 10 reported a sore head, while a quarter felt weak or a lack of energy and 24 per cent had muscle and joint pain. All of these symptoms were mild and quite common in many other adenovirus vaccines, so the Sputnik V was deemed to be safe and well tolerated. An adenovirus is a pathogen which is best known for causing common colds and which can be engineered to match the genetic sequence of SARS-CoV-2, the coronavirus that causes Covid-19. This technique is also being used in the vaccine prototypes developed by Oxford University and China's CanSino. Phase 2 saw volunteers given the full two-dose vaccine so scientists could monitor their bodies' immune response. All 40 subjects given the jab produced high levels of antibodies against Covid-19 within 28 days that, in theory, would be enough to fend off the infection. To analyse the level of immunity each person developed, scientists compared their antibody levels with blood samples taken from patients who had previously been infected with the disease. The authors say the antibody responses appear to be higher in people vaccinated than those with natural immunity. The scientists admit their studies were limited, including that they had a short follow-up (42 days), it was a small study, some parts included only male volunteers, and there was no placebo or control vaccine to compare it to. They say that more research is needed to evaluate the vaccine in different populations, including older age groups, individuals with underlying medical conditions, and people in at-risk groups. The vaccine will now move into phase 3 trials - which will see tens of thousands of people injected with the vaccine and sent back into the community. They will be regularly monitored to see if the jab can actually prevent them from being infected with Covid-19, which is still rife in Russia, in real-life situations. But rigorous phase 3 trials usually take many months - as has been the case with Oxford University's vaccine candidate. Oxford's jab has been in phase 3 studies for more than three months already and has not produced preliminary results yet. But Vladimir Putin has vowed to deliver his country's vaccine by next month and has turned the vaccine race into a matter of national prestige for Russia. There is growing concern that the studies will be rushed and fears the Kremlin is unlikely to admit defeat if it does not end up working in the end. Lead author of the early studies, Professor Alexander Gintsburg, from the Gamaleya National Research Centre for Epidemiology and Microbiology in Russia, said: 'Preclinical and clinical studies have been done, which has made it possible to provisionally approve the vaccine under the current Decree of the Government of the Russian Federation of April 3, 2020 no 441. 'This provisional licensure requires a large-scale study, allows vaccination in a consented general population in the context of a phase 3 trial, allows the vaccine to be brought into use in a population under strict pharmacovigilance, and to provide vaccination of risk groups.” 'The phase 3 clinical trial of our vaccine was approved on 26 August 2020. It is planned to include 40,000 volunteers from different age and risk groups, and will be undertaken with constant monitoring of volunteers through an online application.' Writing in a linked editorial in the Lancet, Dr Naor Bar-Zeev, from the International Vaccine Access Center at the Johns Hopkins Bloomberg School of Public Health, said the studies were 'encouraging but small'. He added: 'The immunogenicity [the fact it provokes an antibody response] bodes well, although nothing can be inferred on immunogenicity in older age groups, and clinical efficacy for any COVID-19 vaccine has not yet been shown. 'Showing safety will be crucial with COVID-19 vaccines, not only for vaccine acceptance but also for trust in vaccination broadly. 'A vaccine that reduces disease but does not prevent infection might paradoxically make things worse. 'It could falsely reassure recipients of personal invulnerability, thus reducing transmission mitigating behaviours. 'In turn, this could lead to increased exposure among older adults in whom efficacy is likely to be lower, or among other higher-risk groups who might have lower vaccine acceptance and uptake.' Commenting on the findings, Professor Ian Jones, a virologist at the University of Reading, said: 'The study confirms what has been seen with Adenovirus vectors elsewhere, that they are generally safe and that they generate an immune response to the Sars-CoV-2 protein that is incorporated. 'While the numbers are relatively low the double serotype approach seems to have generated good levels of neutralising antibodies and T-cell activity. 'What everyone wants to know is if this translates the protection in the field and the recently announced phase 3 trials should provide that.' Dr Michael Head, senior researcher in global health at the University of Southampton, added: 'This manuscript confirms some of the public statements from a few weeks ago, namely that this appears to be a promising vaccine candidate. 'Phase 1 and phase 2 trials have been carried out, and there is sufficient reason to scale up into much larger phase 3 trials. 'That would be the right way to go about vaccine development. Concerns do remain around some of the previously-made ambiguous comments that this vaccine is about to be formally approved and licensed. 'At this stage, we do not know if the vaccine actually works – that is what the phase 3 trials will tell us. 'Public confidence in any licensed vaccine is vital, and suggestions from both Russia and the USA that a vaccine may be fast-tracked without the proper research having taken place are problematic. 'We must be open and transparent about the effectiveness and safety profiles of all vaccine candidates. Ultimately, we must not pour additional fuel on the anti-vaccine lobby fires.' Russia claims that 20 countries have already ordered a billion doses of the vaccine, which was named Sputnik V after the former Soviet space satellites. Philippines President Rodrigo Duterte has already struck a deal for millions of doses while India, Brazil and Saudi Arabia have previously expressed an interest in the drug, according to Russian officials. Britain, the US and Canada claimed last month that Russia had tried to hack into Western vaccine research in its quest to win the race. Announcing the approval of the vaccine last month, Putin claimed it had undergone proper testing and been proven safe to use. 'I would like to repeat that it has passed all the necessary tests,' he said. 'The most important thing is to ensure full safety of using the vaccine and its efficiency.' The Russian leader added that one of his two adult daughters has received two shots of the vaccine and is feeling well. 'She has taken part in the experiment,' Putin said. Putin said his daughter had a temperature of 100F (38C) on the day of the first vaccine injection, which then dropped to 99F (37C) on the following day. After the second shot she again had a slight increase in temperature, but then it was all over, Putin said. He did not reveal whether it was his daughter Maria or Katerina who received the vaccine. However, reports in Russia said it was the younger Katerina who was inoculated. Further reports last month claimed that some of Russia's business and political elite had been given access to experimental vaccines as long ago as April. The Russian president said he hoped the country would soon start mass producing the vaccine. The Health Ministry said that the vaccine is expected to provide immunity from the coronavirus for up to two years.
<urn:uuid:9e9c3929-75fa-4446-87b8-2929b71fa736>
CC-MAIN-2021-43
http://www.webnewsys.com/2020/09/russias-covid-vaccine-might-actually.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00189.warc.gz
en
0.969345
2,206
2.8125
3
Decentralization or decentralisation (see spelling differences) is the process by which the activities of an organization, particularly those regarding planning and decision making, are distributed or delegated away from a central, authoritative location or group. Concepts of decentralization have been applied to group dynamics and management science in private businesses and organizations, political science, law and public administration, economics, money and technology. The word “centralization” came into use in France in 1794 as the post-French Revolution French Directory leadership created a new government structure. The word “decentralization” came into usage in the 1820s. “Centralization” entered written English in the first third of the 1800s; mentions of decentralization also first appear during those years. In the mid-1800s Tocqueville would write that the French Revolution began with “a push towards decentralization…[but became,] in the end, an extension of centralization.” In 1863, retired French bureaucrat Maurice Block wrote an article called “Decentralization” for a French journal that reviewed the dynamics of government and bureaucratic centralization and recent French efforts at decentralization of government functions. Ideas of liberty and decentralization were carried to their logical conclusions during the 19th and 20th centuries by anti-state political activists calling themselves “anarchists“, “libertarians“, and even decentralists. Tocqueville was an advocate, writing: “Decentralization has, not only an administrative value but also a civic dimension since it increases the opportunities for citizens to take interest in public affairs; it makes them get accustomed to using freedom. And from the accumulation of these local, active, persnickety freedoms, is born the most efficient counterweight against the claims of the central government, even if it were supported by an impersonal, collective will.” Pierre-Joseph Proudhon (1809–1865), influential anarchist theorist wrote: “All my economic ideas as developed over twenty-five years can be summed up in the words: agricultural-industrial federation. All my political ideas boil down to a similar formula: political federation or decentralization.” In the early 20th century, America’s response to the centralization of economic wealth and political power was a decentralist movement. It blamed large-scale industrial production for destroying middle-class shop keepers and small manufacturers and promoted increased property ownership and a return to small scale living. The decentralist movement attracted Southern Agrarians like Robert Penn Warren, as well as journalist Herbert Agar. New Left and libertarian individuals who identified with social, economic, and often political decentralism through the ensuing years included Ralph Borsodi, Wendell Berry, Paul Goodman, Carl Oglesby, Karl Hess, Donald Livingston, Kirkpatrick Sale (author of Human Scale), Murray Bookchin, Dorothy Day, Senator Mark O. Hatfield, Mildred J. Loomis and Bill Kauffman. Leopold Kohr, author of the 1957 book The Breakdown of Nations – known for its statement “Whenever something is wrong, something is too big” – was a major influence on E.F. Schumacher, author of the 1973 bestseller Small Is Beautiful: A Study of Economics As If People Mattered. In the next few years a number of best-selling books promoted decentralization. Daniel Bell‘s The Coming of Post-Industrial Society discussed the need for decentralization and a “comprehensive overhaul of government structure to find the appropriate size and scope of units”, as well as the need to detach functions from current state boundaries, creating regions based on functions like water, transport, education and economics which might have “different ‘overlays’ on the map.” Alvin Toffler published Future Shock (1970) and The Third Wave (1980). Discussing the books in a later interview, Toffler said that industrial-style, centralized, top-down bureaucratic planning would be replaced by a more open, democratic, decentralized style which he called “anticipatory democracy”. Futurist John Naisbitt‘s 1982 book “Megatrends” was on The New York Times Best Seller list for more than two years and sold 14 million copies. Naisbitt’s book outlines 10 “megatrends”, the fifth of which is from centralization to decentralization. In 1996 David Osborne and Ted Gaebler had a best selling book Reinventing Government proposing decentralist public administration theories which became labeled the “New Public Management“. Decentralization was one of ten Megatrends identified in this best seller Stephen Cummings wrote that decentralization became a “revolutionary megatrend” in the 1980s. In 1983 Diana Conyers asked if decentralization was the “latest fashion” in development administration. Cornell University‘s project on Restructuring Local Government states that decentralization refers to the “global trend” of devolving responsibilities to regional or local governments. Robert J. Bennett’s Decentralization, Intergovernmental Relations and Markets: Towards a Post-Welfare Agenda describes how after World War II governments pursued a centralized “welfarist” policy of entitlements which now has become a “post-welfare” policy of intergovernmental and market-based decentralization. In 1983, “Decentralization” was identified as one of the “Ten Key Values” of the Green Movement in the United States. According to a 1999 United Nations Development Programme report: “large number of developing and transitional countries have embarked on some form of decentralization programmes. This trend is coupled with a growing interest in the role of civil society and the private sector as partners to governments in seeking new ways of service delivery…Decentralization of governance and the strengthening of local governing capacity is in part also a function of broader societal trends. These include, for example, the growing distrust of government generally, the spectacular demise of some of the most centralized regimes in the world (especially the Soviet Union) and the emerging separatist demands that seem to routinely pop up in one or another part of the world. The movement toward local accountability and greater control over one’s destiny is, however, not solely the result of the negative attitude towards central government. Rather, these developments, as we have already noted, are principally being driven by a strong desire for greater participation of citizens and private sector organizations in governance.” Graphical comparison of centralized and decentralized system Those studying the goals and processes of implementing decentralization often use a systems theory approach. The United Nations Development Programme report applies to the topic of decentralization “a whole systems perspective, including levels, spheres, sectors and functions and seeing the community level as the entry point at which holistic definitions of development goals are from the people themselves and where it is most practical to support them. It involves seeing multi-level frameworks and continuous, synergistic processes of interaction and iteration of cycles as critical for achieving wholeness in a decentralized system and for sustaining its development.” However, it has been seen as part of a systems approach. Norman Johnson of Los Alamos National Laboratory wrote in a 1999 paper: “A decentralized system is where some decisions by the agents are made without centralized control or processing. An important property of agent systems is the degree of connectivity or connectedness between the agents, a measure global flow of information or influence. If each agent is connected (exchange states or influence) to all other agents, then the system is highly connected.” University of California, Irvine‘s Institute for Software Research’s “PACE” project is creating an “architectural style for trust management in decentralized applications.” It adopted Rohit Khare‘s definition of decentralization: “A decentralized system is one which requires multiple parties to make their own independent decisions” and applies it to Peer-to-peer software creation, writing: …In such a decentralized system, there is no single centralized authority that makes decisions on behalf of all the parties. Instead each party, also called a peer, makes local autonomous decisions towards its individual goals which may possibly conflict with those of other peers. Peers directly interact with each other and share information or provide service to other peers. An open decentralized system is one in which the entry of peers is not regulated. Any peer can enter or leave the system at any time… Decentralization in any area is a response to the problems of centralized systems. Decentralization in government, the topic most studied, has been seen as a solution to problems like economic decline, government inability to fund services and their general decline in performance of overloaded services, the demands of minorities for a greater say in local governance, the general weakening legitimacy of the public sector and global and international pressure on countries with inefficient, undemocratic, overly centralized systems. The following four goals or objectives are frequently stated in various analyses of decentralization. Participation In decentralization, the principle of subsidiarity is often invoked. It holds that the lowest or least centralized authority that is capable of addressing an issue effectively should do so. According to one definition: “Decentralization, or decentralizing governance, refers to the restructuring or reorganization of authority so that there is a system of co-responsibility between institutions of governance at the central, regional and local levels according to the principle of subsidiarity, thus increasing the overall quality and effectiveness of the system of governance while increasing the authority and capacities of sub-national levels.” Decentralization is often linked to concepts of participation in decision-making, democracy, equality and liberty from a higher authority. Decentralization enhances the democratic voice. Theorists believe that local representative authorities with actual discretionary powers are the basis of decentralization that can lead to local efficiency, equity and development.” Columbia University‘s Earth Institute identified one of three major trends relating to decentralization: “increased involvement of local jurisdictions and civil society in the management of their affairs, with new forms of participation, consultation, and partnerships.” Decentralization has been described as a “counterpoint to globalization [which] removes decisions from the local and national stage to the global sphere of multi-national or non-national interests. Decentralization brings decision-making back to the sub-national levels”. Decentralization strategies must account for the interrelations of global, regional, national, sub-national, and local levels. Diversity Norman L. Johnson writes that diversity plays an important role in decentralized systems like ecosystems, social groups, large organizations, political systems. “Diversity is defined to be unique properties of entities, agents, or individuals that are not shared by the larger group, population, structure. Decentralized is defined as a property of a system where the agents have some ability to operate “locally.” Both decentralization and diversity are necessary attributes to achieve the self-organizing properties of interest.” Advocates of political decentralization hold that greater participation by better informed diverse interests in society will lead to more relevant decisions than those made only by authorities on the national level. Decentralization has been described as a response to demands for diversity. Efficiency In business, decentralization leads to a management by results philosophy which focuses on definite objectives to be achieved by unit results. Decentralization of government programs is said to increase efficiency – and effectiveness – due to reduction of congestion in communications, quicker reaction to unanticipated problems, improved ability to deliver services, improved information about local conditions, and more support from beneficiaries of programs. Firms may prefer decentralization because it ensures efficiency by making sure that managers closest to the local information make decisions and in a more timely fashion; that their taking responsibility frees upper management for long term strategics rather than day-to-day decision-making; that managers have hands on training to prepare them to move up the management hierarchy; that managers are motivated by having the freedom to exercise their own initiative and creativity; that managers and divisions are encouraged to prove that they are profitable, instead of allowing their failures to be masked by the overall profitability of the company. The same principles can be applied to the government. Decentralization promises to enhance efficiency through both inter-governmental competitions with market features and fiscal discipline which assigns tax and expenditure authority to the lowest level of government possible. It works best where members of the subnational government have strong traditions of democracy, accountability, and professionalism. Conflict resolution Economic and/or political decentralization can help prevent or reduce conflict because they reduce actual or perceived inequities between various regions or between a region and the central government. Dawn Brancati finds that political decentralization reduces intrastate conflict unless politicians create political parties that mobilize minority and even extremist groups to demand more resources and power within national governments. However, the likelihood this will be done depends on factors like how democratic transitions happen and features like a regional party’s proportion of legislative seats, a country’s number of regional legislatures, elector procedures, and the order in which national and regional elections occur. Brancati holds that decentralization can promote peace if it encourages statewide parties to incorporate regional demands and limit the power of regional parties. The processes by which entities move from a more to a less centralized state vary. They can be initiated from the centers of authority (“top-down“) or from individuals, localities or regions (“bottom-up“), or from a “mutually desired” combination of authorities and localities working together. Bottom-up decentralization usually stresses political values like local responsiveness and increased participation and tends to increase political stability. Top-down decentralization may be motivated by the desire to “shift deficits downwards” and find more resources to pay for services or pay off government debt. Some hold that decentralization should not be imposed, but done in a respectful manner. Appropriate size Gauging the appropriate size or scale of decentralized units has been studied in relation to the size of sub-units of hospitals and schools, road networks, administrative units in business and public administration, and especially town and city governmental areas and decision making bodies. In creating planned communities (“new towns”), it is important to determine the appropriate population and geographical size. While in earlier years small towns were considered appropriate, by the 1960s, 60,000 inhabitants was considered the size necessary to support a diversified job market and an adequate shopping center and array of services and entertainment. Appropriate size of governmental units for revenue raising also is a consideration. Even in bioregionalism, which seeks to reorder many functions and even the boundaries of governments according to physical and environmental features, including watershed boundaries and soil and terrain characteristics, appropriate size must be considered. The unit may be larger than many decentralist bioregionalists prefer. Inadvertent or silent Decentralization ideally happens as a careful, rational, and orderly process, but it often takes place during times of economic and political crisis, the fall of a regime and the resultant power struggles. Even when it happens slowly, there is a need for experimentation, testing, adjusting, and replicating successful experiments in other contexts. There is no one blueprint for decentralization since it depends on the initial state of a country and the power and views of political interests and whether they support or oppose decentralization. Decentralization usually is conscious process based on explicit policies. However, it may occur as “silent decentralization” in the absence of reforms as changes in networks, policy emphasize and resource availability lead inevitably to a more decentralized system. Asymmetry Decentralization may be uneven and “asymmetric” given any one country’s population, political, ethnic and other forms of diversity. In many countries, political, economic and administrative responsibilities may be decentralized to the larger urban areas, while rural areas are administered by the central government. Decentralization of responsibilities to provinces may be limited only to those provinces or states which want or are capable of handling responsibility. Some privatization may be more appropriate to an urban than a rural area; some types of privatization may be more appropriate for some states and provinces but not others. Measurement Measuring the amount of decentralization, especially politically, is difficult because different studies of it use different definitions and measurements. An OECD study quotes Chanchal Kumar Sharma as stating: “a true assessment of the degree of decentralization in a country can be made only if a comprehensive approach is adopted and rather than trying to simplify the syndrome of characteristics into the single dimension of autonomy, interrelationships of various dimensions of decentralization are taken into account.” The academic literature frequently mentions the following factors as determinants of decentralization: - “The number of major ethnic groups” - “The degree of territorial concentration of those groups” - “The existence of ethnic networks and communities across the border of the state” - “The country’s dependence on natural resources and the degree to which those resources are concentrated in the region’s territory” - “The country’s per capita income relative to that in other regions” - The presence of self-determination movements
<urn:uuid:dac47cde-5395-4da1-899e-8d4fff765270>
CC-MAIN-2021-43
https://ezcrypto.nl/decentralization/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587606.8/warc/CC-MAIN-20211024204628-20211024234628-00390.warc.gz
en
0.932313
3,621
3.3125
3
In an era where the public is flooded with thousands of promotional materials and messages every day and are becoming more and more enlightened, there is a need for an organization to rethink how they are going to reach their target publics in a way that is more engaging as well as keeping with the changes in the communication technology (Barnett, 2008). Public relations have become more than just a basic way of communicating issues. Public relations entail nurturing favorable relations between an organization and its products and the key public categories by use of different communication channels and means. Public relations functions have broadened to cover creating awareness about the company as well as maintaining a favorable image, monitoring the media channels for the company and its products coverage, managing crises affecting the company or product, and cultivating goodwill among the target market and general public for the organization (European Union, 2007). Relationship marketing, on the other hand, entails a business creating a mutually beneficial exchange with its partners, according to Sorce (2002). This is a strategy that is created to encourage customer loyalty, long term retention, and interaction. This is done through availing to customers information that is geared to meet their needs and interests through open communication, which in return results to repeat business, customer’s willingness to provide information to the marketer, and increased word-of-mouth promotion (Stavros, 2003). The impact on PR regarding the changing society The world has undergone a succession of technological revolutions in the last few decades, which has changed the whole society and the economy. One of these revolutions is the computer-based information revolution, which is characterized by refined information or communication infrastructure, which has changed the way business is conducted, including public relations (Wright & Hinson, 2008). This has impacted the practice of public relations in that computer terminals are being used to write, edit and send messages at the same time receive feedback, data banks and libraries are now online, and available at the touch of a button, teleconferencing has enabled practitioners to hold meetings with stakeholders, talk to clients, share materials and hold press events. In addition to changing the way business is conducted, changes in society as a result of the information/communication revolution, new opportunities have been created in practice. These include upgraded research capabilities; electronic media has brought new ways of delivering messages through satellites, cable, home videos to reach stakeholders (Macnamara, 2010). PR professionals can now tailor messages for specific audiences rather than use traditional mass media messages. These include specific income classes, geographic regions, interests, and educational levels. Instant feedback from audiences has replaced the one-way communication experienced before. Finally, Practitioners will have improved chances for assessing the effectiveness of their public relations campaigns (Stonier, 1995). Literature review on some PR & RM theories Public relations theorists up until now have been borrowed from other related disciplines such as psychology, communication, sociology, and organizational studies. Modern public relations theoretical approaches, however, are coming from the discipline itself. The first modern theoretical approach was the four model concept of public relations developed by J. Grunig, known as the symmetrical approach. This model views public relations as programs that are aimed at advancing the interests and principles of the organization that foots the bill for these campaigns. This contradicts the earlier model, the Asymmetrical approach, which says that the public relations programs serve the interests of both the public and the sponsoring organization (Sriramesh, 2009). Critics of the symmetrical model say that this is basically idealistic and unrealistic as organizations hire public relations practitioners to be the advocates of their interests rather than the “do-gooders” chasing the interests of the outsiders who may have a different agenda from that of the organization. The symmetrical model, as Grunig says, is supported by research where public relations is more ethical, but the question raised by critics is whether senior managers in these organizations consider being ethical as paying. Claim Grunig responds to it by saying that it does not take place in an ideal situation but one where groups of publics meet to protect and advance their self-interests through dialogue, to listen and relationship building (Mackey, 2003). Another modern theory is the rhetorical approach to public relations advanced by Health in his book Handbook of Public Relations (2001). This theory defines rhetorical dialogue as a process of reaching conclusions and influence actions in a two-way manner. This Health could be done through the exchange of statements and counterstatements between groups about products, services, and public policies in order to gauge each group’s outlook on values, choices, and realities. In the “marketplace of disagreements,” as Health says, the clients and public relations professionals engage each other in adopting a persuasive discourse. One point of agreement between the symmetrical and rhetorical theories is that the playing ground should be level in ethical practice. It also adopts the asymmetrical view when health says that each idea or public policy should stand on its merit in the market place. Critics, however, argue that the rhetorical enactment rationale advanced by health does not make public relations more ethical unless all the publics involved are equally resourced (Rhee, 2004). In 2000, Ledingham and Bruning edited the book Public Relations as Relationship Management: A relational Approach to the Study and Practice of Public relations, which introduced another theoretical approach to public relations as relationship management (Brown R., 2009). This introduces the real meaning of public relations within the organizational structure and the society at large and benefits generated for both. The approach introduces dimensions of the relationship between the sponsoring organization and the public, such as commitment, cooperation, asymmetry, credibility, efficiency, and openness, among many others. In this model, the professionals are to outline which of these elements they mean in each project when they refer to a relationship (Valentini, 2009). In this model, however, the aspects of the relationship may not be symmetrical and, therefore, hard to compare with the above two theories. The relationship management approach is seen as an instrumental procedure, rather than an approach as indicated by the authors, for ‘doing’ public relations as compared to the essence of public relations or what it is. It can also be interpreted as an advancement of the “goodwill” aspect of public relations, as (Wright & Hinson 2008) says. In this argument, then, ‘goodwill’ can encompass many of the relationship dimensions mentioned above to serve many purposes though not all of them may be ‘symmetrical’ or fair to all involved. The Wimbledon Championships is a major sporting event in the world that draws a lot of interest. The 2011 championships were singularly important in that they were a crowning moment for the completion of three-stage major facility improvements, which had begun in 1993. Background to the Wimbledon 2011 Wimbledon championship is an international event with a rich history that began in 1877 and has consistently improved to keep with the changing situations. The event was first staged by the All England Lawn tennis and Croquet Club, which is a private club that started in 1868 in Wimbledon. The participants were drawn from England in the first years of the tournament and drew crowds until 1905 when it went international, and a United States of America citizen, May Sutton, became the first overseas champion in the Ladies Singles. The championship continued to draw crowds and oversees participation, and only during World War II that they were not held until 1949 when reconstruction work from the war in Europe was finished (Wimbledon, 2011). In the 1950s, improvement in air travel created a lot of interest among overseas players, but this was curtailed by the fact that the championships were not open. The proposal to make it open was rejected for many years until December 1967, when players from all categories were admitted. Since then, records have been made and broken in all events, major organizational changes made, and the ground alterations have been made to give improved facilities for all involved; players, officials, media, and spectators (Wimbledon, 2011). The club that hosts the tournament, the All England Lawn tennis club, has been on top in hosting the championship, and this is the reason why a long term plan to improve the quality of the event was unveiled in 1993. The first stage was to build a broadcast center and increase grass courts to two, something that was realized in 1997. The second stage saw the dismantling of No. 1Court to build a new building with facilities for the press, players, officials, and members and increase the seating capacity by 728 seats. Stage three involved construction of housing club staff, museum, bank, ticket area, new entrance building, and increase of seating capacity, among other developments. This was finished in 2011 and crowned with the 2011 championships (Wimbledon, 2011). The 2011 Championships were also important because they were marking the 125th anniversary of the events that started in 1877. This was marked by several special events and activities. First, a four-part 30 minute each documentary was broadcast on the history of the championships, the All England Club’s museum was showing new exhibits, merchandise all marked with the 125 years logo were sold, and a community art project. Internal for the Wimbledon championships include the All England lawn tennis club, members of the club, volunteers, press representatives, staff of the club, whether temporary or permanent, committee of management. External stakeholders include International Tennis Federation, players, spectators, press, officials, community, suppliers, The Lawn Tennis Association, Wimbledon local authorities, contractors, public service officials, transport providers (Wright & Hinson, 2010). Analysis of the PR strategies used on the internal stakeholders Goal and strategy alignment public relations strategies- This involves all those working in the planning and preparation of the championships clearly outlining their goals and those of the organization in order to set priorities and keep them in sight at all times (Goldstein, 2010). Professional development strategies- The organization outlined three professional development programs for all our staff, management committee, and others participating in preparation every year. This was to ensure they are kept enthusiastic about their roles and are brought to speed on developments in their line of engagement. One of the programs is web-based, and the rest are offsite and conferences and development seminars (Goldstein, 2010). Employee rounding as a key management tool is implemented in all departments where the managers interact with each employee or volunteer, or representative either in their duty station or in informal meetings with small groups. This helps create relationships with the leaders and other team members, and new ideas are exchanged in a friendly environment (Gill, 2009). Recognition and appreciation strategy-This involves going a step further than listening to their ideas and suggestions for implementing them and appreciating the employees. This includes thank you notes to individuals who have done well and shout outs or simply recognizing peers and subordinates who have done well in our regular meetings (Bacal, 2011). Work/life balance is another strategy Wimbledon Championships team uses to communicate to staff. This is by creating a flexible schedule and time offs during workday for the employees to participate in charity events, volunteer, exercise or eat well etc (McNamara, 2010). Analysis of the RM strategies used on the External stakeholders In order to communicate with the external stakeholders the Wimbledon championships uses the following strategies; a corporate website which acts as the first point of contact for the general public and messages and important communication is posted here. The schedules for tournaments, tournament results, advice to the spectators, what is available in the museums is all found on this site. Secondly, a media room controlled by the Public relations function of the event and linked to the corporate website is used to post all information intended for the public. This is updated regularly and carries a consistent message to that of the corporate website. A blog spot is also used by the public relations function to monitor relevant weblogs and to post the content on the match is also used. Here the public can post their comments, questions and suggestions about the championships and the PR team will respond to it (Nasreen & Reid, 2008). In addition to online strategies, Wimbledon uses press releases to communicate with various stakeholders. These are given to the media from which the Championships maintain good relations with. In addition, the preparation team for the event consists of several representatives from major media houses and once they catch the story, it is run on major news media all over the world. These press releases are then posted on the organization website and blog spot. Since the tournament is an important sporting event all over the world, and with players drawn from overseas, the event is covered by major media houses not only in Britain but also in other countries of the world (Brown, 2008). The Wimbledon 2011 had taken PR further by including a documentary that was shown in four parts just before the start of the tournament. This covered the history of the event since it was established and the major milestones it has made so far and how the future outlook is expected to be. Films of the matches are also sold at the organizations shop as well as other merchandise with the Wimbledon Championships logo (Barnett, 2008). Social awareness through community service activities and support is another PR strategy the organization uses. Donations and charitable contributions towards the welfare of the local community especially in Merton and Wandsworth are programs the championships, and the All England Club maintain. Excess proceedings from the tournament are forwarded by the club to the Tennis Association in the country to develop the sport. The club also launched the Wimbledon Junior Tennis initiative in 2001 under a program known as ‘The road to Wimbledon’ at the local and national level. Together with the Department of education, the club also launched the Museum education program in 2001 for primary and secondary level students taking leisure and tourism and physical education courses. There is also the study support centre program, young ambassadors, Wimbledon village summer fair among other programs (Wimbledon, 2011). In an era where a lot of noise abound in promotional materials and messages, public relations has gained a lot of importance as it cuts through this noise to relate directly with the stakeholders. Relationship marketing on the other hand involves mutual exchange between the business and the customers. The practice of public relations have been greatly affected by the changing society and this is the reason Wimbledon Championships organization have adopted strategies that reflect these changes. In managing public relations with the internal stakeholders who are mainly employees, the organization uses strategies such as goal and strategy alignment professional development strategies, recognition and appreciation strategy, work/life balance is another strategy, Employee rounding as a key management tool and professional development strategies. External stakeholders’ public relations are managed through the use of online strategies such as a corporate website and blogs, documentaries and films, press releases and use of media representative in the preparation team, selling of the organization memorabilia in their shop and a variety of community outreach programs. Bacal, R., 2011. Internal Communication Strategies – The Neglected Strategic Element. Web. Barnett, J., 2008. Developing a PR Strategy. Britain: Terena Secretariat. Brown, D., 2008. Top 5 PR Strategies. Web. Brown, R., 2009. Public Relations and the ZSocial Web: How to Use Social Media and Web 2.0 in Communications. United states of America: Kogan Page Publishers. European Union., 2007. Study on the Soicial Impact of ICT. Workshop of the Social- Impact Project (pp. 1-20). Brussels: European Union. Gill, R., 2009. An Intergrative Review of Strory Telling: Using Corporate Stories to Strengthen Employee Engagement and Internal and External Reputation. Australia: Swinburne University of Technology. Goldstein, S., 2010. Employee Communications Gudebook: The How-to Guide for Internal PR Strategies and Tactics. United States of America: Access Intelligent. Mackey, S., 2003. Changing Vistas in Public Relations Theory. PRism, 1-9. Macnamara, J., 2010. Public Communication Practices in the Web 2.0-3.0 Mediascape: The Case for PRevolution. P Rism, 1-14. McNamara, C., 2010. Basics in Internal Organisational Communications. United States of America: Authenicity Consulting, LLC. Nasreen, J., & Reid, G., 2008. The RM Knowledge Translation Toolkit: Designing a Communications Strategy. Research Matters. Rhee, Y., 2004. An Overview of Public relations Theory: Management Perspectives in Public Relations. United States of America: University of Maryland, Collage Park. Sorce, P., 2002. Rellationship Marketing Strategy. Rochester: Printing Industry Center. Sriramesh, k., 2009. The Global Public Realtions Handbook: Theory, Research, and Practice. United States of America: Taylor & Francis. Stavros, A., 2003. Advances in Communications and Media Research. United States of America: Nova Publishers. Stonier, T., 1995. The Communicative Society; A New Era in Human History. London: Ashdown Press Ltd. Valentini, C., 2009. Italian Public Realtions in a changing World: Historical Overview, Current Questions and Future Challanges. P Rism , 30-49. Wimbledon., 2011. Wimbledon in the Community. Web. Wright, D., & Hinson, M., 2008. Blogs and Social Media. Public Relations Journal, 69- 93. Wright, D., & Hinson, M., 2010. How Blogs and Social Media are Changing Public Relations and the Way it is Practiced. Public Relations Journal, 45-68.
<urn:uuid:2e4ff602-2d5d-4e78-8a89-223b4c914125>
CC-MAIN-2021-43
https://edufixers.com/2011-wimbledon-championships-public-relations-and-marketing/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583083.92/warc/CC-MAIN-20211015192439-20211015222439-00070.warc.gz
en
0.949747
3,652
2.796875
3
An important difference between the two cultures can be found in the fact that the Vietnamese are considered to be a predominately matrilineal culture, whereas the Confucian Chinese are extremely patriarchal. For instance, the first serious uprising against the Han was led by two sisters, Trung Tac and Trung Nhi, in 40 A.D. One beef was with the tax man and as such they called for the abolition of Han taxes, but the principal reason for the revolt was a desire to force out the foreign rulers from the north so the Viets could revert back to the traditional, decentralized Vietnamese feudal style of government. Although initially successful, the Chinese came back early the next year with a professional army from the north under a veteran general, Ma Yüan. The Vietnamese forces led by the rebel sisters were forced into battle on the southern edge of the Red River Delta in the spring of 42 A.D. and decisively defeated. According to Vietnamese legend the Trung sisters committed suicide rather than accept defeat. The Chinese sources say otherwise– in their version the women’s heads were sent to the Chinese court after being captured and executed. Whatever the true case may be, the Trung sisters hold a very high place in the pantheon of Vietnamese military heroes and are looked upon as symbols of Vietnamese independence to this day. Then, in 248 A.D., two centuries after the Trung sisters’ defeat, a revolt against the Chinese erupted in the regions south of the Red River Delta. The leader of the revolt was Lady Trieu Anh, who is said to have led her troops into battle astride her war elephant. The legend states that she had three foot long breasts which she slung over her shoulders and she carried a huge, razor-sharp silver sword. Like the Trung sisters, Trieu Anh is said to have committed suicide rather than accept defeat. Unlike them, she is known only from Vietnamese sources. Trieu Anh’s revolt represents the last overt gasp of traditional, pre-Chinese, Viet culture as a symbol of resistance. And again, it is a symbol in the guise of a warrior woman, this time with exaggerated female and martial qualities. The Han Chinese retained political control and ruled for several centuries, and as mentioned they were not overly oppressive in doing so. At the same time the March South proceeded, delta by delta. The further south the Vietnamese expanded, the looser the degree of control the Chinese exercised over them. The relationship between the Han and the Vietnamese was rocky at times, but if nothing else it was predictable, and as such the two peoples were able to function together for a long period. All that changed abruptly in the seventh century with the founding of the T’ang dynasty (618-907 A.D.). The T’ang were one of the most powerful dynasties in Chinese history. In fact, by 751A.D. T’ang armies had conquered as far west as the Talus River in Central Asia where they were stopped by the Arabs. Unlike the Han before them, the T’ang were tough masters, they were serious about collecting taxes. Under the Han, taxation was a method employed to support the garrisons and governing officials. To keep the lights on basically. Beyond that it was largely symbolic—exotic tributes like elephant tusks to shower on the emperor in China for example. But the T’ang began heavily taxing ordinary rice growers. As a result, significant numbers of Vietnamese fled from their rice paddies and migrated into the nearby hills. There they continued to live as before, growing rice in terraced paddies in the upland valleys or dry rice when necessary. These displaced people became the Muong. Muong language is in the same family as Vietnamese, in fact the name of the family is Muong-Viet. Muong is a language stuck in time in some sense, it is the same as that which a Vietnamese would have spoken in the eighth and ninth centuries. The Muong are animists, meaning they believe that ghosts and spirits preside over specific places and behavior. Animist beliefs persist among Vietnamese also, but in a watered down form that was influenced by Taoist, Buddhist, Confucian, and even Christian teachings. The isolated Muong were not privy to those philosophies. The Muong follow a sort of feudal social organization, and in a sense their society is a throwback to pre-Chinese times. Looking ahead, many of the Muong tribes will side with the French against the Vietminh, actively fighting on the French side. A few thousand Muong were evacuated to the Central Highlands of South Vietnam in the aftermath of French defeat at Dien Bien Phu. Many were not. Their fate is unknown. Vietnamese attempts to throw out their T’ang rulers were intermittent and the intensity of the struggle varied as a function of how strong the Chinese empire was at any given time. Much of the thousand year struggle for independence was, in fact, a series of civil wars fought out between pro- and anti-Chinese factions with the victors, whether pro- or anti-Chinese, promptly seeking recognition from the Chinese emperor. At some point in the process, the Chinese changed the name of the country from Nam Viet to Annam, meaning “pacified south.” For three hundred years Vietnam was racked by guerrilla wars in which the Vietnamese fought on both sides. Ultimately the T’ang dynasty collapsed in 907 A.D., and after a civil war between pro-Chinese and pro-independence factions the Vietnamese established their independence under Ngo Quyen. The defeated pro-Chinese faction appealed for help to the Southern Han dynasty. The Southern Han had come back to power in southern China with the fall of the T’ang. They responded by sending an invasion fleet in January of 939, right at the peak of the dry campaigning season. The Battle of Bach Dang (939 A.D.): the Chinese plan was apparently to bring their fleet up the Bach Dang river at the northeastern tip of the Red River Delta, not far from modern Haiphong, and disembark their army upriver to control the delta region. The Vietnamese under Ngo Quyen met them near the mouth of the river. What followed was the Battle of Bach Dang, January 939, a major turning point in Asian history. The Vietnamese planted sharpened stakes in the bottom of the river estuary just underwater at low tide. Ngo Quyen must have had excellent intelligence. He apparently knew when and where the Chinese were arriving. As the Chinese fleet approached he ordered his ships into the river just beyond the stakes but in plain view of the Han attackers. The Chinese took the bait and gave chase. Their fleet came in at high tide, then the tide went out and the Chinese ships were stranded. The Vietnamese in their smaller craft surrounded the Chinese and burned and destroyed their ships. After a thousand years of struggle, Vietnam was finally independent. The Chinese influence: the Vietnamese adopted the chu nôm system of writing, based on Chinese ideographs, but it still relies on Vietnamese phonetic values. Confucian values became dominant and Buddhism became a major religious force in Vietnam, but animism and ancestor worship continued to have strong influence. The Chinese occupied Vietnam for so long that the Vietnamese borrowed tones from Chinese and incorporated them into their language but the language itself remained defiantly Vietnamese. All of these things point to the complex relationship that the Vietnamese have with Chinese culture. On one hand, many Vietnamese resented their Chinese occupiers and wanted them out. On the other hand, many Vietnamese, particularly those who wanted to get ahead, developed a deep respect for Chinese culture and language. They learned to write in Chinese, they emulated Chinese behavior in many respects, like dress, cuisine, Confucianism, and so on. Buddhism: Buddhism entered Indochina from the north in the form of Mahayana Buddhism. Buddhism also entered Indochina from India. Known as Theravada Buddhism, it became the dominant form in the South and is the variant associated with temples and saffron-robed monks. With it came considerable Indian cultural and political influence. Of the two forms of Buddhism, the Mahayana version is more prevalent; it permeates Vietnamese and Laotian society. Theravada is an organized religion; Mahayana is more philosophy than a religion– the form of Mahayana Buddhism with which we’re most familiar is Japanese Zen Buddhism. Laos has been affected by Buddhism much like northern Vietnam with Mahayana being the dominant form. Therevada Buddhism dominates in Thailand, where it is the state religion, and it has significant influence in Cambodia. Independence and the Mongol Invasions: Vietnam, or more properly Nam Viet, the land of the Southern Viets, remained independent until the Mongols invaded in the 1280s. The Mongols had conquered China in the early 1200s; they devastated Central Asia and Russia and almost overran western Europe in the 1230s. They invaded Japan in the 1270s and were defeated by bad luck—their fleets wrecked by the famous Kamikaze, the divine wind and storm. They were tough, tenacious and superbly organized. They had their own breed of horses that could survive on grass alone. They had a weaponry advantage in the form of the Turco-Mongol composite recurved bow. It had a 150-plus pound draw force and could get off six shots in a minute that were deadly accurate. The arrows could penetrate plate armor at moderate ranges. So how did the Vietnamese stop the Mongols? The Mongols had little difficulty in dispersing the Vietnamese field armies or in capturing and controlling the capital. But the Vietnamese pulled back into the rice paddies and swamps and started grinding down their enemy in a war of raids, ambushes and attrition. This pattern will repeat itself throughout the ages as we shall see. In 1285 the Vietnamese defeated the Mongols in battle. In 1288, the Mongols mounted a counter offensive, a naval invasion aimed at the Dragon’s Belly area up the Bach Dang River. This was the Second Battle of Bach Dang, fought on 9 April 1288. The tactics were different but the result was the same as in 939. Vietnamese victory. With victory under their belts, the Vietnamese continued to be an aggressive people. Always expanding ever southward they continued to push native peoples into the mountains, or they assimilated them. Southern Expansion and Civil War, AD 1000-1757: The Ly dynasty had led the Vietnamese to independence but it soon declined and its emperors became figureheads. They were replaced in the 1200s by the Le dynasty. Meanwhile the relentless march southward proceeded. Then in the 1580s there was a dynastic war between the northern Trinh family and the Nguyen family, who controlled southernmost Vietnam, with both sides claiming to be the true protectors of the Le emperors. It turned into a century and a half civil war that split Vietnam in half, perhaps unsurprisingly right about where the demilitarized zone would be established in 1954. In the eighteenth century a rebellion erupted led by three brothers from the town of Son Tay in Nghe Anh province. The Son Tay rebellion was based on resistance to over-taxation and over-rule by the mandarins. By 1786, they had eliminated the Trinh in the north and they had the Nguyen clan on the ropes in the south. Then fate took over. First, the defeated Nguyen prince in the south, Nguyen Anh, sought refuge with a French Jesuit missionary, Father Pigneau de Béhaine. The good Father put him in touch with French officials and adventurers in India who were interested in getting involved in Vietnam. Second, the self-proclaimed last of the Le emperors escaped to China and sought the help of the Qing Dynasty. The Qing Emperor responded by sending a Chinese army that invaded from the north in 1788, took Hanoi, and put the “legitimate” Le emperor on the throne. Using tactics resembling those used centuries before against the Mongols, the eldest of the Son Tay Brothers, Nguyen Hue, let the Chinese have Hanoi, and then faded back into the swamps and rice paddies to raid and harass the occupying forces. Then he organized a counter attack. It was well planned and perfectly executed. Launched on 30 January 1788—Têt—it caught the Chinese garrison dispersed through the city, busily celebrating the Lunar New Year. The foreign invaders were violently put to route. Nguyen Hue was a powerful and charismatic figure and by all accounts a genuine Vietnamese patriot. Had he not died in 1792, he might well have founded a stable dynasty. But… Meanwhile, Nguyen Anh had linked up with his French backers in India and an expedition under Pigneau sailed for Vietnam in 1789 (the year of the French Revolution). Nguyen Anh was a determined and competent leader and the few hundred French mercenaries he had recruited in India turned out to be the decisive factor. In early February 1802, ten years after Nguyen Hue’s death, Nguyen Anh’s forces defeated the last Son Tay holdouts in the Saigon area. Four months later the Nguyen Dynasty was founded and he was installed as the Gia Long Emperor. Vietnam’s long civil war was finally over. The Nguyen Dynasty was to rule Vietnam, at least on paper, until after the final French defeat at the hands of the Vietminh in 1954. Buttinger, Joseph. The Smaller Dragon Duiker, William J. Sacred War. Karnow, Stanley, Vietnam: A History.
<urn:uuid:b999dd86-1aa0-402d-850a-4665bec10d97>
CC-MAIN-2021-43
https://parallelnarratives.com/vietnam-notebook-the-early-history-of-vietnam-to-gia-long/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585671.36/warc/CC-MAIN-20211023095849-20211023125849-00310.warc.gz
en
0.976049
2,836
3.921875
4
As data centers become more and more saturated with data thanks to the increasing number of IoT devices coming online daily and the availability of 5G networks bringing more devices online than ever before, data center operators are looking for ways to extract as much performance as possible from their servers. Datacenter operators can extract more performance from the same hardware by adding SmartNICs to their servers. SmartNICs allow operators to extract more performance from existing hardware because they can offload some of the networking, storage, and security functions from the server’s CPU to the SmartNIC. This is possible thanks to the powerful processing power and performance accelerators that SmartNICs are equipped with. Now that we know why we are even discussing SmartNICs let’s examine the difference between a regular NIC and a SmartNIC, but before we dive into the difference, let’s explain what a regular NIC is and what a SmartNIC is? What is a Regular NIC? A network interface controller, commonly known as a NIC, is a computer hardware component that connects a computer to a network. A regular NIC enables communication between computers on the same local area network (LAN) and large-scale networks through the internet protocol (IP). Today, our focus will be standard wired NICs, which are often used in data centers because of their reliability and robustness. What is a SmartNIC? A SmartNIC is a dedicated piece of hardware that can be used to accelerate networking, storage, and security functions. Also, they can perform virtualization, load balancing, and data path optimization. SmartNICs are typically made from a network interface controller, a multi-core CPU, with the option to add an FPGA and/or GPU. SmartNICs are equipped with computing power, allowing them to offload all networking functions, security function, and storage functions from the host server to the SmartNIC, freeing up valuable processing power. Freeing up processing power allows the server to focus on running revenue-generating enterprise applications and the OS more efficiently. Furthermore, network virtualization protocols can be offloaded to the SmartNIC. Protocols that can be offloaded include VXLAN, NVGRE, Geneve protocols, and many more. Also, SmartNICs are capable of performing the following functions: packet inspection, flow table processing, encryption, VXLAN overlays, and NVMe-oF. SmartNIC vs. Regular NIC Regular NICs only operate as a middleman between data center servers or computers on a data network. SmartNICs, on the other hand, can be programmed to perform functions that regular NICs are not capable of performing. For example, a regular NIC is not capable of packet processing functions that include packet filtering, timestamping, deduplication, flow shunting, and flow classification. Basic NICs only facilitate communication between computers on a network; they are not intelligent enough to perform other functions, nor are they intelligent enough to offload functions from the host system’s CPU. Let’s explore some of the functions that SmartNICs are capable of that cannot be performed on a regular NIC. This is so because SmartNICs have a compute layer that is not present on regular NICs. The compute layer enables the NIC to run custom software on the SmartNIC itself. 1. Networking Functions Network functions that a SmartNIC is capable of running include routing, firewalling, telemetry, load balancing, NAT, and overlay networks. All of this can be processed by the SmartNIC’s CPU, reducing the load on the host server’s CPU, freeing up cycles to run other revenue-generating enterprise applications. 2. Storage Functions SmartNICs can also function as storage controllers, managing the hard drives (HDDs) or SSDs (solid-state drives) found on data center servers. Furthermore, SmartNICs are typically connected to the same BUS as the storage that is in servers. As such, the SmartNIC can talk directly to the storage devices, negating the need for data to flow to the server’s CPU, instead data only needs to flow from the storage device to SmartNIC. Moreover, SmartNICs can run VMware NSX on the NIC itself, improving network bandwidth, reducing latency, and freeing up CPU cycles for better application performance. 3. DDoS Defense SmartNICs can protect data center servers from DDoS attacks. DDoS attacks occur when a person or organization floods the target network or server with an overwhelming amount of traffic, causing a denial of service to normal traffic to the target site or network. SmartNICs have the ability to block DDoS attacks. Offloading the detection and prevention of DDoS attacks from the host server to the SmartNIC prevents the main system CPU from being overwhelmed by the DDoS attack and improves DDoS mitigation capacity. This is so because SmartNICs can be programmed to drop DDoS attack packets dynamically. F5 claims that a data center server equipped with a SmartNIC can withstand a DDoS attack 300x in magnitude when compared to a server without a SmartNIC. Moreover, SmartNICs can filter all inbound and outbound packets, similar to how Ip Tables works, providing a robust architecture for filtering network traffic. Also, DPUs can accelerate data center servers by offloading data encryption from the server’s CPU to the DPU. Data processing units have built in hardware-based encryption and key infrastructure engines, including a true random number generator, built-in PKI engine, and a secure key store that keep session keys encrypted in memory. Additionally, when it comes to security, SmartNICs provide significant security since they create an air gap between the host system’s operating system and the SmartNICs operating system, preventing attacks on the SmartNIC’s OS. 5. Offloading Tasks from CPU to SmartNIC The ability of SmartNICs to offload computationally intensive tasks from a server’s CPU onto a SmartNIC is of significant importance for data center because operators typically want to extract as much performance from existing hardware as possible, and SmartNICs allow them to do so by offloading tasks from the host server’s CPU to the SmartNIC’s multi-core processor. SmartNICs offer data center operators more performance without having to change out all of the existing hardware. SmartNICs can easily be integrated into legacy data center servers as they plug in via PCIe slot. What Are the Main Components of a Regular NIC vs SmartNIC? A regular NIC is made from ethernet ports, a small amount of memory to store data that’s being communicated, and a low-powered processor for converting the data message so it can be communicated. SmartNICs, on the other hand, are made using powerful multi-core processors, a high-performance network interface controller equipped with (10/25/50/100/200 Gigabit Ethernet ports), and a rich set of flexible, programmable acceleration engines to improve the performance of specific applications. Additionally, some SmartNICs also come equipped with a GPU to accelerate AI workloads, such as machine learning and deep learning. So, as you can probably tell at this point, SmartNICs are significantly beefier and equipped with technology that makes them significantly more intelligent than regular NICs. That said, regular NICs are still often used on servers even ones equipped with SmartNICs for moving data between data center servers and computers. What Other Performance Accelerators Are Data Centers Using? Let’s look at some of the other performance accelerators that are being used in data centers to cope with the increase in the volume and velocity of data being stored and accessed. Performance accelerators include GPUs (graphics processing units), computational storage devices (CSDs), and FPGAs. 1. GPU (Graphics Processing Unit) Source Credit (Nvidia) GPUs are often added to servers to accelerate workloads that involve mathematical calculations. GPUs are great for such workloads because they often have thousands of small cores, enabling them to perform many tasks in parallel. For this reason, GPUs are often used for demanding workloads, such as machine learning and deep learning, because they can process multiple computations simultaneously. Additionally, GPUs can handle huge amounts of data much better than are CPUs. So, the larger the amount of data being processed, the more likely it is that adding a GPU will improve the performance of a server. The ability of GPUs to process data in parallel makes them great for servers that will be tasked with performing artificial intelligence, high-resolution video editing, medical imaging, and many other demanding workloads. 2. CSD (Computational Storage Device) Source Credit (Samsung) Computational storage is another performance accelerator that’s being used in data center servers to accelerate servers. Computational storage devices are different from regular storage devices in that they are equipped with a multi-core processor that allows them to process data at the storage device level. Processing data at the storage device level places less stress on the main CPU since data does not need to be sent to the CPU. Furthermore, processing data at the storage device level allows organizations to extract valuable insights in real-time. Also, using computational storage devices reduces latency since the data is processed on the storage device itself, negating the need for data to travel through the system to the CPU. Moreover, since the data is processed on the storage device and does not need to travel, data is less vulnerable to being misappropriated. Furthermore, our systems support Peer to Peer DMA, which allows the system to send data directly from one device to another without going through the CPU nor RAM. This is great because there is no CPU overhead or need for synchronization when sending data from one device to another over the PCIe BUS. Additionally, it provides lower latency, and less data movement, freeing up precious PCIe bandwidth. 3. FPGA (Field Programmable Gate Array) Source Credit (Mouser Electronics) FPGAs is an integrated circuit that is made from logic blocks, I/O cells, and other performance accelerators that can be reprogrammed and reconfigured according to a user’s specific requirements. FPGAs have gained popularity because of their ability to accelerate artificial intelligence workloads, such as machine learning and deep learning. FPGAs are also being used in the making of SmartNICs because of their reprogrammable nature. FPGA-based SmartNICs can offload networking, storage, and security functions from the host server’s CPU to the SmartNIC, freeing up precious CPU cycles for running enterprise applications and the operating system. The customizability and adaptability of FPGAs to the ask at hand cannot be found elsewhere. That said, professional training is required for individuals tasked with programming them. The Bottom Line The bottom line is that SmartNICs are significantly more intelligent than regular NICs because they are equipped with multi-core processors and performance accelerators that can offload the processing of networking, security, and storage functions from data center server CPUs to the SmartNIC, freeing up precious CPU cycles that can be used to improve the performance of revenue-generating enterprise applications. Freeing up CPU cycles to improve revenue generating applications’ performance is becoming increasingly important as the amount and velocity of data being stored and accessed continues to increase. With Moore’s Law slowing down and processors performance improvements slowing down, data center operators are looking at performance accelerators such as SmartNIC enabled servers to improve their data centers’ performance. Additionally, SmartNICs are intelligent because they are programmable, providing OEM and organizations deploying them with a solid platform that they can program according to their specific requirements. Premio offers a variety of SmartNIC servers for you to choose from. If you need assistance choosing a server equipped with SmartNICs, contact us and one of our SmartNIC server professionals will assist you with choosing a solution that meets your specific requirements.
<urn:uuid:1af6598c-4473-42f0-adba-b045faa1a8e7>
CC-MAIN-2021-43
https://premioinc.com/blogs/blog/smartnic-vs-regular-nic-differences-explained
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585246.50/warc/CC-MAIN-20211019074128-20211019104128-00630.warc.gz
en
0.918234
2,519
2.75
3
CLENCH, JOSEPH BRANT, Indian Department official, militia officer, justice of the peace, and office holder; b. c. February 1790, probably in Niagara (Niagara-on-the-Lake, Ont.), eldest child of Ralfe Clench* and Elizabeth Johnson, granddaughter of Sir William Johnson*; m. before June 1816 Esther Serena Joseph Leon, and they had at least five sons and three daughters; d. 22 Feb. 1857 in London, Upper Canada. Early in 1811 Joseph Brant Clench, who lived in Niagara Township, took the oath of allegiance and successfully petitioned for a 200-acre grant as the son of a loyalist. In the tradition of the maternal side of his family, on 25 Oct. 1813 he entered the Indian Department, as a clerk in charge of Indian stores at Fort George (Niagara-on-the-Lake). During the War of 1812 he conducted himself with “bravery” and “zeal” in action on the Niagara frontier, on the Grand River, and at Amherstburg; his “military talent” led to his employment on secret service by Major-General John Vincent*, Lieutenant-Colonel Christopher Myers, and Major John Bachevoye Glegg. In 1816 Lieutenant-Colonel John Harvey tried unsuccessfully to have Clench appointed to the vacant post of superintendent of Indian affairs at Amherstburg, but, through the efforts of Lieutenant Governor Francis Gore and Clench’s great-uncles Sir John Johnson* and Colonel William Claus*, the position went instead to John Askin Jr. On 24 Aug. 1817 Clench was reduced to “writingout” clerk at Fort George, responsibility for Indian stores having been transferred to the office of the storekeeper general. In addition to this position within the Indian Department, Clench, like his father, played an active role in local government. By 1818 he had been appointed district court clerk for Niagara and in 1823 he received his first commission as a magistrate. On several occasions he was unanimously elected chairman of the Court of Quarter Sessions for the Niagara District. During the 1820s, though officially a clerk, Clench served the Indian Department as an interpreter and also performed most of the duties of Alexander McDonell, the assistant secretary at Fort George. In these capacities he visited Kingston, Richmond, Belleville, and the Trent River in 1824 and again in 1825. During the winter of 1825–26 Clench was bitterly disappointed when, despite McDonell’s assurances, he did not succeed him following the assistant secretary’s transfer to York (Toronto). However, on the strength of his service within the department and his need to support and educate his ever-growing family, in January 1826 Clench successfully petitioned Henry Charles Darling, the deputy superintendent general of Indian affairs in the Canadas, to have his stipend increased to 4s. 8d. a day. As well, he was employed for a time at Amherstburg on what he described as “very important duty” under the special orders of Lieutenant Governor Sir Peregrine Maitland. In 1828–29 he attempted, with varying results, to secure additional positions. A member of the Church of England, he applied to Charles James Stewart*, bishop of Quebec, to be made secretary to the Upper Canada Clergy Corporation, but in November 1828 he learned that George Herchmer Markland* had already been appointed to the office. Clench was further disappointed that year when his presumed kinsman, John Brant [Tekarihogen*], was appointed superintendent of the Six Nations rather than himself. By 1829, however, Clench had been transferred to York as a clerk and was receiving £1 sterling a day. Early in 1829 he attained the superintendency of the Mohawks and the Mississaugas of the Bay of Quinte and Rice Lake, at a salary of £185 14s. 4d. a year. In April 1830, as a result of the departmental reorganization recommended by Lieutenant Governor Sir John Colborne* the previous year, Clench was named superintendent of Indian affairs in Delaware and Caradoc townships in Middlesex County. The new duties of superintendents included bringing the Indians together in villages, and Clench was directed to “select an eligible spot for a village” for “the Chippewas and Munceys, now residing on the River Thames.” The location he selected was either the existing settlement of Muncey Mission or the site of Upper Muncey, a short distance upstream, in Caradoc. In 1833, while living in Caradoc, Clench was appointed a magistrate for the London District and he later served as chairman of the district’s Court of Quarter Sessions. By November 1834 he had become lieutenant-colonel of the 5th Regiment of Middlesex militia. In the aftermath of the uprising led by Charles Duncombe* during December 1837, Clench was foreman of the grand jury which found bills leading to the indictment of “a great number of Persons Charged with High Treason and misprison of treason.” But, so convinced was he that a greater crisis was impending – he believed that rebels planned to hang him and murder the Indians under his charge – that he wrote late in June 1838 to Samuel Peters Jarvis, chief superintendent of Indian affairs for Upper Canada, begging that he and the Indians be armed so “that we may die like Men!” On 6 December, two days after the so-called battle of Windsor [see John Prince*], Clench was directed by Lieutenant-Colonel John Maitland of the 32nd Foot “to cause 150 of the most active Indians to be in readiness to move” with that regiment to the west. He was further informed that “one hundred Stand of Arms will be taken from here to equip such of them as may not at present be provided with efficient Arms.” On the 8th he was appointed to the court martial which, under Judge Advocate Henry Sherwood, tried some 44 prisoners, including Joshua Gwillen Doan* and Elijah Crocker Woodman*, between 27 December and 19 January. As a result of the reorganization begun within the Indian Department in 1844 [see Sir James Macaulay Higginson*], Clench was placed in charge of the entire Western superintendency, comprising the reservations within the London and Western districts. At the same time he was named visiting superintendent of the Grand River superintendency, while David Thorburn became superintendent. In 1845, by which time Clench had moved to the town of London, he was also appointed agent for conducting the sale of Indian lands in the Western and London districts. Though he diligently sought to safeguard and promote the interests of the Indians, he generally believed that he knew what was best for the various bands under his charge, regardless of their views. In the spring of 1847, when the Credit River Mississaugas were preparing to settle on land donated by the Six Nations on the Grand River, he cautioned the Reverend Peter Jones that the young people at the Grand were the “next thing to worthless” and warned him to ignore the demands of the poor there. In London the Clench family was not part of the inner circle, despite invitations to various military and civilian balls and dinners. Clench, however, did enjoy some prominence and in March 1847 he was called upon by John Duggan, a Toronto lawyer, to use his support and influence to help him win a seat in a London by-election. Between 1839 and about 1848 Clench served as inspector of shop, still, and tavern licences for the London District. It was probably his knowledge of the adverse effects of alcohol that led him, as inspector, to draw up in about 1842 a memorandum advocating tighter controls and increased taxes on its sale. He appears to have been president of the temperance society in London in 1852. The following year his daughter Victorine Leon married Francis Evans Cornish*, a future mayor of the city. But, at the height of his career, things began to sour for Clench. The late 1840s had seen the breakup of the marriage of his daughter Caroline and her committal to an insane asylum. His wife, a native of Germany and probably the first Jewess to settle in the London District, was beginning to have increasingly expensive tastes in clothes and furnishings, and their son Leon Moses was, by 1852, known by Clench to be appropriating, for himself and his mother, monies entrusted to Clench from the sale of Indian lands. In the early 1850s, and evidently before that, Clench’s “want of success and apparent inertness” in conducting his duties as Indian land agent were censured by successive superintendents general Thomas Edmund Campbell* and Robert Bruce. Early in September 1854 Superintendent General Laurence Oliphant directed Thomas Worthington and C. E. Anderson to investigate the “seeming irregularities” in Clench’s capacity as agent and his “refusal to afford any explanation thereof.” A month later they recommended that he be suspended. Clench’s “state of health” was one “almost amounting to imbecility” and he was confined to bed. Monies sent through the mails to his house were not reaching his hands and might never have been known to him. Accordingly, he was removed from office on 9 October, and in December departmental policy was revised, requiring that all payments to the department be deposited in a chartered bank. At the court of inquisition held in London in August 1855, it was learned that Clench’s wife and two of his sons, Leon and Holcroft, had purchased properties with monies belonging to the Indian Department. It was subsequently estimated that, with interest, some £9,000 had been embezzled. Of this, £5,950 had been recovered and £1,207 15s. 6d. had been secured in mortgages and in cash. During the investigation, which had led to the tarnishing of his good name, Clench himself refused to name his sons and wife as the persons directly responsible for the defalcation. The strain of the disclosure of the embezzlement led to alienation between him and his family and to further deterioration of his health. Possibly as a result of the strain, Clench resigned as lieutenant-colonel of the 6th Battalion of Middlesex militia in December 1855. Leaving London, he retired to Caradoc Township. His death in 1857, from an apoplectic fit, occurred while he was temporarily staying at the Western Hotel in London. The London Free Press and Daily Western Advertiser in its obituary described him as “an upright, good, and just man” and, while viewing him as “the victim of others villany,” saw a tragic flaw in “his want of firmness and discretion.” At the time of his death he still owed the Indian Department more than £6,950. PAC, RG 1, L3, 98: C10/16; 99: C11/133, 150; RG 8, I (C ser.), 266, 268, 270; RG 10, B8, 802; CI, 2, vols.446–47, 570; 10017; RG 68, General index, 1651–1841: 451, 477. Private arch., F. H. Armstrong (London, Ont.), Elida Clench to Armstrong, 19 Feb. 1969, containing genealogical information. UWOL, Regional Coll., Middlesex County, Ont., Chancery Court records, 1838–1912, cases, 1859, Gibson, E. v. Clench, L. M., doc.3. U.C., House of Assembly, App. to the journal, 1839–40: 1, pt.ii: 143–44. London Free Press and Daily Western Advertiser, 24 Feb. 1857. Canadian biog. dict., 1: 589–90. The roll of the regiments (the Sedentary Militia), comp. H. M. Jackson (n.p., 1960), 37. Elizabeth Graham, Medicine man to missionary: missionaries as agents of change among the Indians of southern Ontario, 1784–1867 (Toronto, 1975). Hist. of Middlesex, 20, 74, 151, 269.
<urn:uuid:fb9d620b-30f6-4f49-bc86-94e6a4df81ee>
CC-MAIN-2021-43
http://www.biographi.ca/en/bio/clench_joseph_brant_8E.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00189.warc.gz
en
0.98034
2,614
2.703125
3
The semi-analytic planetary theory VSOP (French: Variations Séculaires des Orbites Planétaires) is a mathematical model describing long-term changes (secular variation) in the orbits of the planets Mercury to Neptune. The earliest modern scientific model considered only the gravitational attraction between the Sun and each planet, with the resulting orbits being unvarying Keplerian ellipses. In reality, all the planets exert slight forces on each other, causing slow changes in the shape and orientation of these ellipses. Increasingly complex analytical models have been made of these deviations, as well as efficient and accurate numerical approximation methods. VSOP was developed and is maintained (updated with the latest data) by the scientists at the Bureau des Longitudes in Paris. The first version, VSOP82, computed only the orbital elements at any moment. An updated version, VSOP87, computed the positions of the planets directly at any moment, as well as their orbital elements with improved accuracy. At present, the difference between computational predictions and observations is so small that the model seems essentially complete in its physical principles. Such hypothetical deviations are often referred to as post-Keplerian effects. Predicting the position of the planets in the sky was already performed in ancient times. Careful observations and geometrical calculations produced a model of the motion of the solar system known as the Ptolemaic system, which was based on an Earth-centered system. The parameters of this theory were improved during the Middle Ages by Indian and Islamic astronomers. The work of Tycho Brahe, Kepler, and Isaac Newton in early modern Europe laid a foundation for a modern heliocentric system. Future planetary positions continued to be predicted by extrapolating past observed positions as late as the 1740 tables of Jacques Cassini. The problem is that, for example, the Earth is not only gravitationally attracted by the Sun, which would result in a stable and easily predicted elliptical orbit, but also in varying degrees by the Moon, the other planets and any other object in the solar system. These forces cause perturbations to the orbit, which change over time and which cannot be exactly calculated. They can be approximated, but to do that in some manageable way requires advanced mathematics or very powerful computers. It is customary to develop them into periodic series which are a function of time, e.g. a+bt+ct2+...×cos(p+qt+rt2+...) and so forth one for each planetary interaction. The factor a in the preceding formula is the main amplitude, the factor q the main period, which is directly related to a harmonic of the driving force, that is a planetary position. For example: q= 3×(length of Mars) + 2×(length of Jupiter). (The term 'length' in this context refers to the ecliptic longitude, that is the angle over which the planet has progressed in its orbit, so q is an angle over time too. The time needed for the length to increase over 360° is equal to the revolution period.) It was Joseph Louis Lagrange in 1781, who carried out the first serious calculations, approximating the solution using a linearization method. Others followed, but it was not until 1897 that George William Hill expanded on the theories by taking second order terms into account. Third order terms had to wait until the 1970s when computers became available and the vast amounts of calculations to be performed in developing a theory finally became manageable. Pierre Bretagnon completed a first phase of this work by 1982 and the results of it are known as VSOP82. But because of the long period variations, his results are expected not to last more than a million years (and much less, maybe 1000 years only on very high accuracy). A major problem in any theory is that the amplitudes of the perturbations are a function of the masses of the planets (and other factors, but the masses are the bottlenecks). These masses can be determined by observing the periods of the moons of each planet or by observing the gravitational deflection of spacecraft passing near a planet. More observations produce greater accuracy. Short period perturbations (less than a few years) can be quite easily and accurately determined. But long period perturbations (periods of many years up to centuries) are much more difficult, because the timespan over which accurate measurements exist is not long enough, which may make them almost indistinguishable from constant terms. Yet it is these terms which are the most important influence over the millennia. Notorious examples are the great Venus term and the Jupiter–Saturn great inequality. Looking up the revolution periods of these planets, one may notice that 8×(period of Earth) is almost equal to 13×(period of Venus) and 5×(period of Jupiter) is about 2×(period of Saturn). A practical problem with the VSOP82 was that since it provided long series only for the orbital elements of the planets, it was not easy to figure out where to truncate the series if full accuracy was not needed. This problem was fixed in VSOP87, which provides series for the positions as well as for the orbital elements of the planets. In VSOP87 especially these long period terms were addressed, resulting in much higher accuracy, although the calculation method itself remained similar. VSOP87 guarantees for Mercury, Venus, Earth-Moon barycenter and Mars a precision of 1" for 4000 years before and after the 2000 epoch. The same precision is ensured for Jupiter and Saturn over 2000 years and for Uranus and Neptune over 6000 years before and after J2000. This, together with its free availability has resulted in VSOP87 being widely used for planetary calculations; for example, it is used in Celestia and Orbiter. Another major improvement is the use of rectangular coordinates in addition to the elliptical. In traditional perturbation theory it is customary to write the base orbits for the planets down with the following six orbital elements (gravity yields second order differential equations which result in two integration constants, and there is one such equation for each direction in three-dimensional space): Without perturbations these elements would be constant and are therefore ideal to base the theories on. With perturbations they slowly change, and one takes as many perturbations in the calculations as possible or desirable. The results are the orbital element at a specific time, which can be used to compute the position in either rectangular coordinates (X,Y,Z) or spherical coordinates: longitude, latitude and heliocentric distance. These heliocentric coordinates can then fairly easily be changed to other viewpoints, e.g. geocentric coordinates. For coordinate transformations, rectangular coordinates (X,Y,Z) are often easier to use: translations (e.g. heliocentric to geocentric coordinates) are performed through vector addition, and rotations (e.g. ecliptic to equatorial coordinates) through matrix multiplication. VSOP87 comes in six tables: VSOP2000 has an accuracy that is a factor of 10-100 better than its predecessors. The uncertainty for Mercury, Venus and the Earth is reported to be around 0.1 mas for the interval 1900–2000, and that for the other planets a few milliarcseconds. The publication of and the data for VSOP2000 are publicly available. Bretagnon's last work was on the implementation of relativistic effects, which was supposed to improve the accuracy with another factor of 10. This version was never finished, and still had weaknesses for Uranus and Neptune. The VSOP2010 files contain the series of the elliptic elements for the 8 planets Mercury, Venus, Earth-Moon barycenter, Mars, Jupiter, Saturn, Uranus, Neptune and for the dwarf planet Pluto. The VSOP2010 solution is fitted to the DE405 numerical integration over the time interval +1890...+2000. The numerical precision is 10 times better than VSOP82. Over a greater interval −4000...+8000 a comparison with an internal numerical indicates that the VSOP2010 solutions are about 5 times better than VSOP2000 for the telluric planets and 10 to 50 times better for the outer planets. The VSOP2013 files contain the series of the elliptic elements for the 8 planets Mercury, Venus, Earth-Moon barycenter, Mars, Jupiter, Saturn, Uranus, and Neptune and for the dwarf planet Pluto of the solution VSOP2013. The planetary solution VSOP2013 is fitted to the numerical integration INPOP10a built at IMCCE, Paris Observatory over the time interval +1890...+2000. The precision is of a few 0.1″ for the telluric planets (1.6″ for Mars) over the time interval −4000...+8000. This is an analytical solution for the (spherial and rectangular) positions (rather than orbital elements) of the four planets Jupiter, Saturn, Uranus, and Neptune and the dwarf planet Pluto. This solution is fitted to the Ephemeris DE405 over the time interval +1890...+2000. The reference system in the solution TOP2010 is defined by the dynamical equinox and ecliptic J2000.0. This solution is fitted to the numerical integration INPOP10a built at IMCCE (Paris Observatory) over the time interval +1890...+2000. The reference system in the solution TOP2013 is defined by the dynamical equinox and ecliptic of J2000.0. The TOP2013 solution is the best for the motion over the time interval −4000...+8000. Its precision is of a few 0.1″ for the four planets, i.e. a gain of a factor between 1.5 and 15, depending on the planet, compared to VSOP2013. The precision of the theory of Pluto remains valid up to the time span from 0 to +4000.
<urn:uuid:44117709-7e67-431c-a00e-81934d8f5878>
CC-MAIN-2021-43
https://www.knowpia.com/knowpedia/VSOP_(planets)
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00590.warc.gz
en
0.927072
2,058
3.71875
4
Book of Isaiah Isaiah is called "The Book of Salvation." The name Isaiah means "the salvation of the Lord" or "the Lord is salvation." Isaiah is the first book containing the writings of the prophets of the Bible. And the author, Isaiah, who is called the Prince of Prophets, shines above all the other writers and prophets of Scripture. His mastery of the language, his rich and vast vocabulary, and his poetic skill have earned him the title, "Shakespeare of the Bible." He was educated, distinguished, and privileged, yet remained a deeply spiritual man. He was committed to obedience over the long haul of his 55-60 year ministry as a prophet of God. He was a true patriot who loved his country and his people. Strong tradition suggests that he died a martyrs death under the reign of King Manasseh by being placed within the hallow of a tree trunk and sawed in two. Isaiah's calling as a prophet was primarily to the nation of Judah (the southern kingdom) and to Jerusalem, urging the people to repent from their sins and return to God. He also foretold the coming of the Messiah and the salvation of the Lord. Many of his prophesies predicted events that occurred in Isaiah's near future, yet at the same time they foretold the events of the distant future (such as the coming of the Messiah), and even some events still to come in the last days (such as the second coming of Christ). In summary, the message of Isaiah is that salvation comes from God—not man. God alone is Savior, Ruler and King. Click on title below to view chapter This inspired writer is called by the Holy Ghost, the great prophet, (Ecclesiasticus 48.25), from the greatness of his prophetic spirit, by which he hath foretold so long before, and in so clear a manner, the coming of Christ, the mysteries of our redemption, the calling of the Gentiles, and the glorious establishment, and perpetual flourishing of the Church of Christ. The prophet complains of the sins of Juda and Jerusalem: and exhorts them to a sincere conversion. All nations shall flow to the Church of Christ. The Jews shall be rejected for their sins. Idolatry shall be destroyed. The confusion and other evils that shall come upon the Jews for their sins. The pride of their women shall be punished. After an extremity of evils that shall fall upon the Jews, a remnant shall be comforted by Christ. The reprobation of the Jews is foreshewn under the parable of a vineyard. A woe is pronounced against sinners: the army God shall send against them. A glorious vision, in which the prophet's lips are cleansed: he foretelleth the obstinacy of the Jews. The prophet assures King Achaz that the two kings who are his enemies shall not take Jerusalem. A virgin shall conceive and bear a son. The name of a child that is to be born: many evils shall come upon the Jews for their sins. What joy shall come after afflictions by the birth and kingdom of Christ; which shall flourish for ever. Judgments upon Israel for their sins. (Chapter 9) Woe to the makers of wicked laws. The Assyrians shall be a rod for punishing Israel: but for their pride they shall be destroyed: and a remnant of Israel saved. (Chapter 10) Of the spiritual kingdom of Christ, to which all nations shall repair. A canticle of thanksgiving for the benefits of Christ. The desolation of Babylon. (Chapter 13) The restoration of Israel after their captivity. The parable or song insulting over the king of Babylon. A prophecy against the Philistines. (Chapter 14) A prophecy of the desolation of the Moabites. (Chapter 15) The prophet prayeth for Christ's coming. The affliction of the Moabites for their pride. (Chapter 16) Judgments upon Damascus and Samaria. The overthrow of the Assyrians. A woe to the Ethiopians, who fed Israel with vain hopes, their future conversion. The punishment of Egypt: their call to the church. The ignominious captivity of the Egyptians, and Ethiopians. The destruction of Babylon by the Medes and Persians: a prophecy against the Edomites and the Arabians. (Chapter 21) The prophet laments the devastation of Juda. He foretells the deprivation of Sobna, and the substitution of Eliacim, a figure of Christ. The destruction of Tyre. Is shall be repaired again after seventy years. The judgments of God upon all the sinners of the world. A remnant shall joyfully praise him. A canticle of thanksgiving for God's judgments and benefits. A canticle of thanks for the deliverance of God's people. The punishment of the oppressors of God's people. The Lord's favour to his church. The punishment of the Israelites, for their pride, intemperance, and contempt of religion. Christ the cornerstone. God's heavy judgments upon Jerusalem, for their blind obstinacy: with a prophecy of the conversion of the Gentiles. The people are blamed for their confidence in Egypt, God's mercies towards his church: the punishment of sinners. The folly of trusting to Egypt, and forgetting God. He will fight for his people against the Assyrians. The blessings of the reign of Christ. The desolation of the Jews, and prosperity of the Church of Christ. God's revenge against the enemies of his church. The happiness of the heavenly Jerusalem. The general judgment of the wicked. (Chapter 34) The joyful flourishing of Christ's kingdom: in his church shall be a holy and secure way. (Chapter 35) Sennacherib invades Juda: his blasphemies. (Chapter 36) Ezechias, his mourning and prayer. God's promise of protection. This Syrian army is destroyed. Sennacherib is slain. (Chapter 37) Ezechias being advertised that he shall die, obtains by prayer a prolongation of his life: in confirmation of which the sun goes back. The canticle of Ezechias. (Chapter 38) Ezechias shews all his treasures to the ambassadors of Babylon: upon which Isaiah foretells the Babylonish captivity. (Chapter 39) The case for and against unity. The prophet comforts the people with the promise of the coming of Christ to forgive their sins. God's almighty power and majesty. The reign of the just one: the vanity of idols. The office of Christ. The preaching of the gospel to the Gentiles. The blindness and reprobation of the Jews. God comforts his church, promising to protect her forever.: He expostulates with the Jews for their ingratitude. God's favour to his church. The folly of idolatry. The people shall be delivered from captivity. A prophecy of Cyrus, as a figure of Christ, the great deliverer of God's people. The idols of Babylon shall be destroyed. Salvation is promised through Christ. God's judgment upon Babylon. He reproaches the Jews for the obstinacy: he will deliver them out of their captivity, for his own name's sake. Christ shall bring the Gentiles to salvation. God's love to his church is perpetual. (Chapter49) The synagogue shall be divorce for her iniquities, Christ for her sake will endure ignominious afflictions. (Chapter50) An exhortation to trust in Christ. He shall protect the children of his church. Under the figure of the deliverance from the Babylonish captivity, the church is invited to rejoice for her redemption from sin. Christ's kingdom shall be exalted. (Chapter 52) A prophecy of the passion of Christ. (Chapter 53) The Gentiles, who were barren before, shall multiply in the Church of Christ: from which God's mercy shall never depart. God promises abundance of spiritual graces to the faithful, that shall believe in Christ out of all nations, and sincerely serve him. God invites all to keep his commandments: the Gentiles they keep them shall be the people of God: the Jewish pastors are reproved. The infidelity of the Jews: their idolatry. Promises to humble penitents. (Chapter 57) God rejects the hypocritical fasts of the Jews: recommends works of mercy, and sincere godliness. The dreadful evil of sin is displayed, as the great obstacle to all good from God: yet he will send a Redeemer, and make an everlasting covenant with his church. The light of true faith shall shine forth in the Church of Christ, and shall be spread through all nations, and continue for all ages. The office of Christ: the mission of the apostles; the happiness of their converts. The prophet will not cease from preaching Christ: to whom all nations shall be converted: and whose church shall continue for ever. Christ's victory over his enemies: his mercies to his people: their complaint. (Chapter 63) The prophet prays for the release of his people; and for the remission of their sins. (Chapter 64) The Gentiles shall seek and find Christ, but the Jews will persecute him, and be rejected, only a remnant shall be reserved. The church shall multiply, and abound would graces. (Chapter 65) More of the reprobation of the Jews, and of the call of the Gentiles.
<urn:uuid:8fe624a8-1e0c-46da-ada5-d8a0f5a8064b>
CC-MAIN-2021-43
https://www.pamphletstoinspire.com/isaiah-with-commentary
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00670.warc.gz
en
0.946035
2,070
3.09375
3
THE MONTESSORI METHOD Dr. Maria Montessori, the first female physician in Italy, through her work with deprived preschool age children, made a startling and revolutionary discovery. If a young child is placed in an environment rich in materials that meet his developmental needs and he is given the freedom to choose his activities according to these needs, he learns spontaneously, effortlessly and joyously. In such an environment, the child unfolds, exhibiting traits formerly thought to be impossible of the preschooler, such as tremendous concentration and attention span, self-discipline, a high degree of large and small muscle coordination, a real desire to help and share with others and a love of peace and silence. The essence of Montessori’s discovery is that a child between the ages of 0 and 6 learns in a different way altogether. He absorbs skills and concepts from his world and actually incorporates them into his being. The only example we can relate to as adults is language. Our mother tongue is literally a part of us. We cannot forget it, or remember learning it or imagine never knowing it. Whatever a child learns at this important age, be it math, courteous behavior, or the musical scale, it becomes a part of him not to be forgotten. Why freedom to choose? The child learns with his “absorbent” mind in different stages of development which we will call sensitive periods. He does not take an avid interest in everything at the same time. That would result in chaos, not intelligence. Nature has an orderly plan that is unique to each child. Using the example of language again, we can see that when the baby becomes interested in or sensitive to language, he is insatiable until he has mastered it. He asks over and over, “What’s that?” because he is fulfilling a vital need. It is the same for all other learning. The child will have a sensitive period for colors, shapes, numbers, reading, writing and a host of other things too numerous to list. If he is in an environment conducive to meeting these needs, he will select and pursue them with his whole effort until they are his forever. Children do not differentiate between work and play. What ever appeals is what they want to do. The Montessori Method classroom, scaled to the child and full of fascinating things to do, is irresistible. Outside pressure does not exist in the classroom. The emphasis is not on competition or production, but on mutual cooperation and the fullest possible development of each child according to his capabilities. There is much discipline that goes hand in hand with the freedom the children experience. There is no learning without discipline, Dr. Montessori said, but the authority of the teacher is replaced by the individual inner discipline in the children as the year progresses. In class where the virtues of character are as highly prized as academic achievement, children grow not only in self-confidence, but also in a sense of responsibility. Intellect, physical powers, and moral insight must all be developed if a child is to be prepared to meet the demands of life. Dr. Maria Montessori believed that no human being is educated by another person. He must do it himself or it will never be done. A truly educated individual continues learning long after the hours and years he spends in the classroom because he is motivated from within by a natural curiosity and love for knowledge. Dr. Montessori felt, therefore, that the goal of early childhood education would not be to fill the child with facts from a preselected course of studies, but rather to cultivate his own natural desire to learn. WHO IS MARIA MONTESSORI? She was a remarkable woman, born in 1870. Despite extreme social pressure, she was the first woman to attend medical school and the first female doctor of medicine in Italy. Through her work with handicapped and socially deprived children, she developed her unique educational method, known as the Montessori Method. As a result of her further study, observation and experimentation, she found the principles of her method to be applicable to all children. HOW IS A MONTESSORI SCHOOL DIFFERENT FROM OTHER PRESCHOOLS? The materials used by the children in a Montessori class are specially designed sensorial (able to be experienced and manipulated through the senses) materials, each with a unique educational and developmental purpose. They give the child clear, orderly, concrete impressions in all areas of learning. One of their greatest attributes is that they have universal child appeal. They entice the child to fall in love with learning by providing him with successful, stimulating and satisfying first encounters with classroom education. It is a preschool with goals and a program that is specifically designed to accomplish those goals for each and every child. DO THE CHILDREN RECEIVE TLC? The Montessori Method emerged out of Dr. Montessori’s love and respect for children. The teachers who have adopted this method have invested considerable time and money into being trained for a lifetime of working with little children. In this environment of caring and sharing, the children themselves express great love and kindness towards each other. The “tender loving care” of Montessori class can never take the place of a loving home, but it gives the child a secure and happy experience for his first “going out” into the world. WHAT IS THE TEACHER’S ROLE IN A MONTESSORI CLASS? Since the Montessori materials are self-correcting and designed for the child to do the manipulating, the teacher’s role is a different one than in most schools. She even has a different name – a “Directress” – instead of a teacher. As her name implies, her job is giving the child direction. She is the link between the child and the environment. She is the guiding force that introduces him to new experiences, sets him on a correct course, and then steps aside for him to gain the knowledge, the thrill of discovery, and the satisfaction of achievement for himself. She is constantly observing, recording and planning each child’s progress and setting the stage for him to gain a well-rounded intellectual and developmental experience. WHAT ABOUT KINDERGARTEN? We encourage parents to take advantage of the Montessori class until the child enters first grade. For the five-year-old, his final year in the Montessori class is often the most exciting. Great feats of new learning take place and the children have the added benefit of reviewing many of the fundamentals by acting as the teachers of the little ones. The five-year-old is a very precious individual to the class. It is his caring for the harmony of the class and for the younger children which make it the wonderful, warm community that it is. WHY THE AGE SPAN OF 18 MONTHS to 3 YEARS FOR TODDLER AND 3 YEARS TO 6 YEARS FOR PRIMARY? From birth to about five years old, the child possesses what Dr. Montessori called the “absorbent mind.” Children literally absorb skills from their environment. In the Montessori class, the little ones benefit greatly by their continuous contact with the high level of learning and control going on among the older children. They often unconsciously absorb these new skills. Since each child works at his own rate, the older children are not held back by the younger ones. The older children learn patience, kindness and understanding in dealing with those not as advanced as they. In real life, people do not always deal with people of their exact age. A wide span of ages is the normal situation. The ultimate goal of the Montessori class is to prepare the child for the real world. WITH ALL OF THE INDIVIDUAL WORK, WHERE DOES SOCIALIZATION COME IN? When we speak of individual activity, what is meant is self-chosen activity where children progress at their own rates. This often takes the form of children working in small groups as well as children working alone or with the teacher. Being free to move around the class and enter and exit into different groups develops the child’s social skills. Larger group activity is also included in the Montessori class. Children spend some time each day in a larger group singing, listening to stories, doing finger plays and poems and participating in the many events that take place at circle time. HOW DO MONTESSORI CHILDREN ADAPT TO FIRST GRADE? Individual school studies have shown that the feedback from first grade teachers is very positive. The children have more initiative, self-reliance, self-control, creativity and ability to associate. They are able to articulate more easily and are class leaders. They seem to take with them all of the positive attitudes they have developed, as well as their intellectual achievements. Children are the most adaptable of all people. The vast majority enter new situations enthusiastically, expecting the best unless they have been led to believe otherwise. WHAT IS MEANT BY FREEDOM AND DISCIPLINE IN A MONTESSORI CLASS? The freedom given to the children in the Montessori environment is in no way license. There are rules to be understood, respected and carried out. In a Montessori class, self-discipline is the goal, not the point of departure. Over the course of the year, the children move more and more towards this goal and away from the need for outside regulation. In the beginning, however, the source of control is the teacher exercising loving firmness, fairness and consistency. Discipline, even in the beginning, never really becomes a problem. Most misbehavior in young children stems from boredom. There is too much to do and see and learn in the Montessori class for the children to waste their time misbehaving. WHAT ARE THE GOALS OF A MONTESSORI CLASS? The goals are to actively aid each child in achieving for himself: independence, self-control, self-discipline, initiative, self-reliance, self-respect, the ability to concentrate, sharing with and caring for others, courteousness, a high degree of large and small muscle coordination, the foundations of intelligent thinking and a lasting love of learning. Our Montessori class is composed of the blending of age 3 to 6 year old children. It is a prepared environment that meets the needs of the whole child – his mind, his body and his spirit. The children work at their own rates with self-chosen materials which encourage and stimulate them to investigate their world through practical life and sensorial activities, math, language, reading, geography, history, creative writing, science, indoor and outdoor gardening, sewing, music, and art. The benefits the children derive from this program are: independence, self-discipline and self-control, the ability to work together and share, a community spirit, self-confidence, self-respect, a successful and positive school experience and a lasting love of learning. Maria Montessori: Her Life and Works, E. M. Standing. The Absorbent Mind, Dr. Maria Montessori The Secret of Childhood, Dr. Maria Montessori QUESTIONS OR MORE INFO? Jan Haas, Administrator 305 Park Avenue Newport, KY 41071
<urn:uuid:f3de1b10-61ef-4f88-97a8-6790c041bce8>
CC-MAIN-2021-43
https://trentmontessori.com/what-is-montessori/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00630.warc.gz
en
0.965653
2,344
3.4375
3
Human civilization has witnessed several pandemics since its inception. The different killer pandemics in history mostly originated from animals and contaminated humans leading to massive death. Science proved to be helpless in front of mother nature. As a result, during most of the pandemics, millions of people died. Lucky are those who got cured! Scientifically speaking, with human civilization’s growth, many people started flocking in one place, even with pet animals. Not all areas had proper sanitation and drainage systems. As a result, localities became the breeding ground of the diseases as well. Today, we will see the world’s Top 10 Worst Pandemics in History that left very few human beings alive and millions of people worldwide to death. Let’s have a look: Table of Contents - 1. Antonine Plague (165) - 2. Plague of the Justinian (541-542) - 3. Bubonic plague (1330-1353) - 4. Third Cholera Pandemic (1846-1860) - 5. Russian Flu (1889-1890) - 6. 6th cholera pandemic (1899-1923) - 7. The Spanish flu (1918) - 8. Asian flu (1957-1958) - 9. Hong Kong Flu (1968) - 10. HIV/AIDS (1980-81) - 11. COVID-19 1. Antonine Plague (165) The Antonine Plague of 165 to 180 AD was an ancient pandemic brought to the Roman Empire by troops returning from campaigns in the Near East. Scholars have suspected it of having been either smallpox or measles, but the real cause remains undetermined. The disease broke out again nine years later, causing up to 2,000 deaths a day in Rome, one-quarter of those who were affected, giving the disease a mortality rate of about 25% - Casualties: 5 million people. - Symptoms: Swollen and sore throat and fever. - Countries affected: Italy, Egypt, Greece, and Asia minor. - Duration: 15 years (165 – 180) Below is a documentary on surviving a pandemic in ancient Rome: 2. Plague of the Justinian (541-542) This disastrous pandemic started from 541 to 542 AD. But that was not the end as there was recurrence till 750 AD. The Byzantine Empire (which is currently the Eastern Roman), precisely it’s Capital Constantinople, along with Sassanian and other port cities all around the Mediterranean Sea. Based on the DNA tests done later of bones from the graves, it was found that this plague was of Bubonic kind, which is Yersinia Pestis. However, the pneumonic and septicemic type was also seen. - Casualties: 25-50 million people. - Symptoms: Chills, fever, headache, swollen lymph nodes, and gangrene. - Countries affected: The empire of emperor Justinian I of Byzantine. - Duration: 2 years (541 – 542) Below you can watch a documentary about the Justinian Plague: 3. Bubonic plague (1330-1353) The bubonic plague started its devastating pandemic in the year 1330 till 1353. This is one of the three types of epidemics that started from Yersinia Pestis. Generally, after getting affected, a person used to show flu-like symptoms after 7days. The most popular theory behind the end of this Bubonic Theory is quarantine. People used to stay at home and not go out to keep themselves safe. People who used to live in a congested area and couldn’t afford to stay at home suffered the most. - Casualties: 75 to 200 million people. - Symptoms: Vomiting, black boils, chills, fever, diarrhea, along with pain. - Countries affected: Mostly, Europe and Asia - Duration: 23 years (1330 – 1353) Watch below a documentary about the great plague: 4. Third Cholera Pandemic (1846-1860) Originating from India, the third cholera outbreak was the third major pandemic that ruined many lives in the nineteenth century. Hydration was the primary way of treatment for cholera during this time. Though antibiotics were used, they were not used in mild cases. Sometimes intravenous fluids were injected to keep the patients hydrated. - Casualties: 1 million people worldwide. - Symptoms: Vomiting, diarrhea, cold skin, and muscle cramps. - Countries affected: Asia, Europe, Africa, and North America. - Duration: 14 years (1846-1860) 5. Russian Flu (1889-1890) A flu pandemic is also known as the Russian flu as this originated in Russia and spread to the entire world because of fast population growth in the 19th century. This pandemic arrived in Europe during November or December in 1889 from the eastern countries. This devastating pandemic took only four months to spread throughout the world. The data was found from 172 cities in Europe and America. - Casualties: 1 million people. - Symptoms: Fever, running cold, and a headache was the symptoms seen in the people affected. - Countries affected: Turkestan, Canada, Greenland. - Duration: 2 years (1889 – 1890) 6. 6th cholera pandemic (1899-1923) This deadly cholera pandemic was one of the fatal top pandemics in the world. The Pandemic spread through the Haridwar Kumbh Mela and gradually spread to the European countries via Punjab (a province of the British Empire). - Casualties: Almost 1 million people - Symptoms: Vomiting, diarrhea, muscle cramps, and chills. - Countries affected: Originated in India. It later spread to Africa, Asia, and America. - Duration: 24 years (1899 – 1923) 7. The Spanish flu (1918) This deadly flu killed almost 25 million people in just 25 weeks and roughly 50-100 million people in total. Five hundred people got contamination with this killer disease. Isn’t it scary? The influenza virus that had an avian origin was the reason for this outbreak of this pandemic. - Casualties: 50 million people - Symptoms: Normal flu-like signs were common. - Countries affected: Originated in China. Still, the outbreak happened in Madrid in 1918, and hence the name Spanish Flu. - Duration: 1 year (1918) Watch this video to find out why the Spanish flu killer over 50 million people worldwide. 8. Asian flu (1957-1958) This deadly pandemic occurred by the H2N2 subtype of the influenza A virus that originated in China. This virus was borne with the genetic mutation of the avian and human influenza virus. Like the recent coronavirus, this strain of the virus was also a novel type, which means people had no immunity against this virus as this was entirely a new type of virus. - Casualties: 1-2 million people. - Symptoms: Cough, chills, fever, weakness, body aches, loss of appetite - Countries affected: Worldwide. - Duration: 2 years (1956 – 1958) 9. Hong Kong Flu (1968) The reason behind this flu was the H3N2 subtype of Influenza A virus that killed millions of people worldwide. The disease originated in Hong Kong hence also known as Hong Kong Flu. It was a category two pandemic that devastated the world in less than two years. - Casualties: 1 million - Symptoms: Chills, fever, muscle pain. - Countries affected: United States, Australia, the Philippines, several countries in Europe, Singapore, and Vietnam. - Duration: 1 year 10. HIV/AIDS (1980-81) Originated in Haiti in the 20th century, this disease spread to New York and San Francisco. Even now, 70 million people are living their lives with this transmissible disease. This disease originated from the Chimpanzee virus in western Africa. - Casualties: 36-36 million people. - Symptoms: Pneumonia, diarrhea, rapid weight loss, fever, and many more. - Countries affected: Worldwide - Duration: Continues Watch this video about how HIV/AIDS developed and how to prevent the infection. The 21st century started with the deadly COVID-19 disease that spread worldwide like rapid-fire, killing almost lakhs of people worldwide at the time of writing. The symptoms include fever, sore throat, muscle pains. The ailment is spread probably from Pangolin to the humans originating in China and then spreading to the entire world like Italy, Germany, the USA, India, Pakistan, Spain, and many more countries. Still have questions about Coronavirus? Check our dedicated article on this topic. History repeats itself. The article shows how history has repeated itself since the time of its origin. Whenever the outbreaks occurred, science and humans bowed down in front of Mother Nature. However, science and technological uses in the present era work at a high pace to eliminate this deadly disease outbreak. We hope that the death percentage will not be as high as the previous pandemics. We can keep hope only. Rest, it is nature which is to decide our fate. - https://www.foreigner.fi/articulo/news/top-ten-worst-pandemics-in-recent history/20200315111728004786.html
<urn:uuid:0fe269dd-a5e9-4698-b48b-f8527af27876>
CC-MAIN-2021-43
https://ten.info/worst-pandemics-in-history/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585828.15/warc/CC-MAIN-20211023224247-20211024014247-00430.warc.gz
en
0.937771
2,048
3.375
3
Queen Elizabeth National Park is one of the most popular and oldest savannah national parks located in the western region of Uganda. It covers 1,978 km² piece of land with 95 species of mammals and over 600 species of birds. Queen Elizabeth National Park is also situated astride the Equator in the Western Rift valley of South West Uganda, close to the Southernmost tip of the fabled, mist covered Mountains of the Moon – Rwenzori Mountains and is contiguous with Virunga National Park in the Democratic Republic of Congo. It is a region of varied habitats including open grassland with thickets, thick bush, forest, swamps and lake shore. Queen Elizabeth National Park together with Virunga encircles Lake Edward which is connected to Lake George by the Kazinga Channel. The Park is a world bio-sphere reserve (UNESCO 1979) includes a RAMSAR wetland site and is classified Important Bird Area (IBA) by Bird life International. Queen Elizabeth National Park has over 600 of Uganda’s 1027 species of birds (over a quarter of Africa’s bird species) more than any other park in Africa. There is potential to view lions relaxing and elephants ambling and giant forest hog snuffing. Any visitor to this park cannot fail to be amazed by the enormous diversity in each kingdom of creation. It is simply a visual feast. Take a boat trip, a game drive, crater walk, a woodland walk or simply enjoy any of the myriad stunning views. Queen Elizabeth National Park provides unforgettable and unique experience. In the Southern part of the park is the Ishasha sector where tree climbing lions may be found perched on Savannah fig trees. There is a high concentration of game in this Savannah setting that includes Lake Edward and the Ishasha River flats, and the Ishasha riverine forest. The hippo pools in the Ishasha River and Congo escarpment provides splendid scenery. Maramagambo Forest is one of the largest forests in Uganda forming part of Queen Elizabeth National Park. It is a medium altitude moist, semi-deciduous forest. Characteristics of such forest are increasingly becoming rare in Africa. It has very spectacular lakes and craters. It is the only place in the park where one could find Blue Lakes. Other features of attraction in the forest include; primate’s e.g. L’hoest’s monkeys, Chimpanzees, bush baby, baboons, vervet monkeys, red-tailed monkeys, etc. Due to its location, Maramagambo Forest has a high diversity of butterflies. The bat and the hunters cave are other pleasant experiences that the forest offers, and of course some forest birds. The Northern Crater Area comprises a scenic area of explosion craters, some containing salt lakes, formed by volcanic activity some 8-10,000 years ago. Some of these craters are dry. These unique scenic vantage points are important as dry season watering points for animals. It was in 1906 when the northern part of Lake George was declared as a game reserve to prevent and protect the unregulated hunting by Africans, Europeans and also the necessary growing of cotton and wheat in these parts. Then in 1912, the whole parts of Lake George and Ishasha areas where restricted which forced the affected people who were practicing agriculture and fishing to migrate to safer areas. So the area was abandoned for a long time which promoted the increase of wildlife hence the emergence of Lake George game reserve. Later, the existence of the game reserve was also facilitated by the long spell of sleeping sickness until 1930,s which forced people to abandon the game reserve areas for a long time. In 1952, the game reserve was upgraded to National Park status hence Kazinga National Park together with Murchison Falls National Park but after two (2) years (1954), the name was changed from Kazinga National Park to Queen Elizabeth National Park commemorate a visit by Queen Elizabeth II of England. MAIN TOURISM ACTIVITIES AT QUEEN ELIZABETH NATIONAL PARK Game Drive at Kasenyi plains, Mweya Peninsula and Ishasha Sector Early morning, evening and night game drives along Kasenyi and Queens Mile makes visitors encounter elephants, buffalo, water bucks, warthogs, lions, leopards, Uganda Kobs, lakes and a variety of birds. Visitors will be accompanied by the ranger guide on a safari vehicle with pop up roof which enables clients to sight animals while in the safari vehicle. With very many trucks designated for game drives at Queen Elizabeth National Park, visitors are able to view most of the animals in this park. Game drives take 3-4 hours in search and viewing of the animals and early morning game drive start at exactly 6:00am, evening game drives between 3:00pm and 4:00pm and Night game drives start at 7:30pm or 8:00pm depending on how you have organized with your driver guide. The main reason why game drives are done in the morning, evening and night hours is that most of the animals will be out of their hiding places to search for food and this now gives our visitors a variety to see in open and designated places. Please note that night game drives enables visitors to view animals in a closer distance than day game drives. Ishasha sector enables visitors to see the tree climbing lions. The drive takes you through the unique western rift valley escarpment and the southern part of Queen Elizabeth National Park. Viewing of Lions and predators at Queen Elizabeth National Park can be guaranteed by taking up an activity known as Lion tracking organized by Uganda Carnivores Project (UCP). Boat cruise at Kazinga Channel Boat cruise / Launch trips on Kazinga Channel down the shore of Lake Edward provides a unique vantage of viewing Savannah wildlife. A launch trip starts at Mweya the park headquarters along the Kazinga Channel, which joins the water flow from Lake George to Lake Edward for a distance of 32km. Truly, this is among the most exciting and memorable experience offered by the park. While on the trip expect to be thrilled by yawning hippos and closer views of water birds along the shores. Two hour Boat cruise along the famous Kazinga channel is worthwhile an opportunity to see Hippo, Bufallo, Kobs, Elephants, warthogs etc. This trip also enables visitor chance to see spectacular birds like Great White and Pink-Backed Pelicans, African Shoebill, Yellow Billed Stork, Great and Long Tailed Cormorants, Open-Billed Stork, Saddle Bill Stork, Darters, Black Crake, African Jacana among other bird species. The boat trips are scheduled and they start mostly at 2:00pm and 4:00pm. There is also one for 9:00am operating with the minimum of 4 (four) people on board. Chimpanzee Tracking at Kyambura Gorge Kyambura Gorge or canyon is one of the forests located in the heart of Queen Elizabeth National Park and it is a habitat to a variety of wildlife including the chimpanzees. The canyon or gorge was formed as a result of weathering and erosive activity of the river over a given time forming a deep cleft between escarpments. Most especially, rivers have a tendency of cutting the underlying surfaces hence wearing away rock sediments downstream. The forest developed in this escarpment and it has supported the existence of Chimpanzees in this forest. There are over 27 individual of chimpanzees at Kyambura Gorge which has enhanced the chimpanzee tracking activity in Queen Elizabeth National Park. The chimpanzee tracking experience is accompanied with a variety of primate species like red-tailed monkey, black-and-white colobus, baboons and vervet monkeys. The gorge is also known for its variety of bird species including various African skimmer, Ovampo sparrow hawk, Papyrus Gonolek, white winged warbler, martial eagle among other species. The habituated chimpanzee tracking takes 2-4 hours with both morning and afternoon session. The morning session starts from 8:00am with the briefing from the ranger guide and there after you will be escorted to the forest to search for the closest creatures to human beings known as the chimpanzees. The afternoon session starts from 2:00pm and it ends in the evening. The activity costs USD$ 50 per person for both foreign residents and Non Foreign residents and UGX 30,000 for East African residents. Bird Watching / Birding at Queen Elizabeth National Park With over 600 bird species more than any other park in East Africa, Queen Elizabeth National Park offers a great experience for bird watching. The park has been classified as the Important Birding Area (IBA) by Birding International. The bird watching spots at Queen Elizabeth National Park includes Kazinga Channel, Kasenyi Area, Mweya Peninsula, Maramagambo Forest, Ishasha Sector, Lake Kikorongo, Katunguru Bridge area and Katwe Area. The experience birding guide will be organized and provided for the bird watchers to Queen Elizabeth National Park and the guide will spot most of bird species you need to discover in this park. Please if you did not see your favorite, tell it to your birding guide and he/she will sight it for you. Some of the birding species at Queen Elizabeth National Park include Martial Eagle, Black-rumped Buttonquail, African Skimmer, Chapin’s Flycatcher, Pink-backed Pelican, African Broadbill, Verreaux’s Eagle Owl, Black Bee-eater, White-tailed Lark, White-winged Warbler, Papyrus Gonolek, Papyrus Canary, Corncrake, Lesser and Greater Flamingo, Shoebill, Bar-tailed Godwit among other species. Guide Nature Walks at Queen Elizabeth National Park Nature walks involve walking in designated points in the Park. The clients will be escorted by the armed ranger guide to protect visitors, describe and spot both fauna and flora. Also, it is an opportunity for clients to view animals in a closer range and stretch the muscles as part of the exercise. The Nature walk points at Queen Elizabeth National park include the Maramagambo forest, Mweya peninsula, and Ishasha River. Nature walks at Maramagambo forest will expose visitors to the bat cave where thousands of bats rest. So, during the nature walks various animals will be spotted, birds and useful tree species and their uses will be spotted and described. ACCESS / HOW TO GET THERE Clients can be picked up either from Kampala city or Entebbe town then driven through Kampala, Mityana, Mubende, Fort portal road then to Queen Elizabeth National Park. It takes over 420km on a safari vehicle to reach the Mweya Peninsular and almost 7 hours will be spent on your way to Queen Elizabeth National Park via this particular route. Alternatively, clients can be driven through Kampala, Masaka, Mbarara and Bushenyi road to Queen Elizabeth National Park. It will cost over 400km and 7 hours drive to reach the Mweya Peninsular which is the central activity point. In this route, clients will be able to visit and take photos at Equator in Kayabwe and Mbarara town will be the next stopover as you experience the cultures of the Ankole people at Igongo Cultural Museum. Domestic flight can be arranged to Queen Elizabeth National Park. Clients can fly from Entebbe International airport to Mweya airstrip or Kasese airstrip and on the client’s arrival, they will be transferred to their place of stay while at Queen Elizabeth National Park. WHERE TO STAY HIGH END AND LUXURY LODGES MID RANGE LODGES - Buffalo Safari Lodge - Elephant Plains lodge - Enganzi Game Lodge - Kikorongo safari lodge - Jacana Safari Lodge - Parkview Safari Lodge - Kyangabi Crater Resort - Ihamba Lakeside Safari Lodge - Tembo Safari Lodge - Bush Lodge - Simba Safari Camp - Engiri Game Lodge - Pumba Safari Cottages
<urn:uuid:a516b03c-a0ff-498f-a628-b97abd9e1a51>
CC-MAIN-2021-43
https://www.africanpearlsafaris.com/queen-elizabeth-national-park.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00230.warc.gz
en
0.924308
2,520
2.78125
3
Great Gatsby description “‘Her voice is full of money,’ [Gatsby] said suddenly. That was it. I’d never understood before. It was full of money- that was the inexhaustible charm that rose and fell in it, the jingle of it, the cymbals’ song of it. .. High in a white palace the king’s daughter, the golden girl” (127). This jarring reference to the intoxicating allure Daisy Buchanan holds over Jay Gatsby is the essence of F. Scott Fitzgerald’s The Great Gatsby. Gatsby, throughout the novel, is utterly infatuated with Daisy in an extravagant, idealistic, and narcissistic fashion. Gatsby’s former lover from his days as a military officer in Kentucky, Daisy. adiant with glamour, prestige, dignity, sophistication, social grace, and all the blessings bestowed by the gods of wealth. has since married the effete, aristocratic Tom Buchanan. Gatsby, a diligent and resourceful man and one of literature’s great Platonic dreamers, literally creates a new identity for himself in hopes of achieving the intrepid and impractical goal of retrieving his long-lost love. What at first appears to be genuine romantic love one would expect to find in 19th century romanticism is actually a thinly veiled form of materialistic lust.While Gatsby professes to adore Daisy, this is because Gatsby’s fantastic worldview has objectified Daisy into a consumer product to be acquired through his own accumulation of wealth: what Gatsby holds so dear is not Daisy’s frightful personality, but rather her wealth and luxurious lifestyle. Fitzgerald aptly laces profound socioeconomic arguments into the novel by exploring contemporary themes, including materialism, class stratification, changing morality, the hopelessness of “the lost generation” and, above all, the ultimate unraveling of the American Dream and its ideal of economic mobility.Gatsby instills Daisy with a kind of idealized perfection that she neither deserves nor possesses. Gatsby’s dream is ruined by the unworthiness of its object, just as the American Dream in the 1920s is ruined by the unworthiness of its object. money and pleasure. Fitzgerald uses the moral contrast between Gatsby’s meretricious materialistic instincts and his diligent idealism to lucidly illustrate how materialism and the unrestrained pursuit of wealth lead to the unraveling of the traditional American Dream.Gatsby is at heart an idealist, and yet throughout the novel his actions and emotions are driven by meretricious impulses. From the reader’s first introduction to Gatsby, his persona. at once gaudy, ostentatious, charismatic and irreverent. reeks of his nouveau riche status. One scene describing the usual Saturday night parties at his garish West Egg estate is especially telling: “At least once a fortnight a corps of caterers came down with several hundred feet of canvas and enough colored lights to make a Christmas tree of Gatsby’s enormous garden.On buffet tables, garnished with glistening hors d’oeuvres, spiced baked hams crowded against salads of harlequin designs and pastry pigs and turkeys bewitched to a dark gold. ” (39) The sheer material excess of Gatsby’s opulent parties should be enough to dull the morals and egalitarian instincts of any reader. Gatsby’s parties are the scenes of such prolonged drunkenness and debauchery that they reach the level of a materialistic escapism stemming from the revelers’ decayed moral values and lack of nobler goals. Morality or the absence thereof is an important theme in The Great Gatsby.Indeed, that the book is devoid of any reference to organized religion suggests that even established religions, the ancient standard-bearers of traditional morality, have been replaced by something more sinister and capricious. As the novel’s opening scene indicates, materialism is the incumbent deity of the jubilant 1920s: “This is a valley of ashes. a fantastic farm where ashes grow like wheat into ridges and hills and grotesque gardens; where ashes take the forms of houses and chimneys and rising smoke and, finally, with a transcendent effort, of men who move dimly and already crumbling through the powder air?Immediately the ash-gray men swarm up with leaden spades and stir up an impenetrable cloud, which screens their obscure observations from your sight. But above the gray land and the spasms of bleak dust which drift endlessly over it, you perceive, after a moment, the eyes of T. J. Eckleburg. ” (20) In this scene the reader is given a very brief glimpse into the dank underbelly of an America dominated by a brazen bourgeoisie, epitomized in the characters of Gatsby and Jordan Baker, as well as the more aristocratic Tom and Daisy Buchanan.This scene not only demonstrates the moral bankruptcy of an upper class whose values have corroded away due to the uninhibited pursuit of wealth and capricious materialism; it also reminds the reader of those unfortunate proletarians who represent the losers of a Social Darwinist economic order, the tragic victims of an era that seemed to reverse many of the monumental gains of the Progressive period, such as unionization, progressive tax structures, a stable currency, and urban reforms that had just begun to lessen social and economic ills. Extraordinary pity for the plight of these “ash-gray men” is evoked in this scene, as the hideous eyes of T. J. Eckleburg seem to taunt the indigent masses for their lack of material wealth. Whereas the forces of materialism ruthlessly oppress the working class, the wealthy Gatsby harnesses materialism as a means to meet his idealistic ends. Although it is demonstrably impossible for Gatsby to rekindle his relationship with a now-married Daisy, Gatsby is a relentless dreamer who musters all of his skill to win Daisy over with romantic gestures, lavish parties, and spectacular wealth.One of Gatsby’s most intriguing qualities is his ability to, in a very Emersonian fashion, transcend reality and adhere to his alternate persona. “The truth was that Jay Gatsby of West Egg, Long Island, sprang from his Platonic conception of himself. He was a son of God. a phrase which, if it means anything, means just that. and he must be about His Father’s business, the service of a vast, vulgar, and meretricious beauty” (99). Fitzgerald demonstrates that while Gatsby is in spirit a lovesick, naive young man, his reinvented self has caused great harm to others. Especially pertinent is the scene in which Gatsby shamelessly fraternizes with Meyer Wolfsheim, a corrupt gangster who helped fix the 1919 World Series. Nick is naturally shocked by this abhorrent marriage of convenience: “The idea staggered me. I remembered, of course, that the World’s Series had been fixed in 1919, but if I had thought of it at all I would have thought of it as a thing that merely happened, the end of some inevitable chain. It never occurred to me that one man could start to play with the faith of fifty million people. with the single-mindedness of a burglar blowing a safe. (74) This scene demonstrates not that Gatsby is malicious towards baseball fans, but that he is utterly self-absorbed, entirely obtuse to the feelings and concerns of others, and consumed by his plan to pay for Daisy in cash. In addition, Jay Gatsby is involved in numerous bootlegging operations and attempted to kill his mentor, Dan Cody, for inheritance money. Despite the severity of these crimes, Gatsby is completely unfazed. All of these actions, in his view, allow him to accumulate wealth with which to win over Daisy, and thus they are just actions.Gatsby is, in many respects, an entirely immoral character in that he favors material excess and debauchery at the expense of his own moral values, and that he favors a hideously amoral accumulation of wealth at the expense of the working class, all in pursuit of a nakedly unrealistic dream. Despite Gatsby’s destructive means of pursuing his dream, his negative character flaws are not necessarily clear-cut. Gatsby is, above all, a remarkably idealistic dreamer. While his dream is certainly impractical, Gatsby shows a remarkable work ethic that should be applauded.A posthumous examination of Gatsby’s diary entries yields striking insights into the tenacious manner with which he approached all aspects of his life. “Rise from bed? Dumbbell exercise and walking? Study electricity? Work? Baseball and Sports? Practice elocution, poise and how to attain it? Study needed inventions” (174). Gatsby’s “General Resolves” show that he was also incredibly goal-oriented, hardworking, and meticulous about the minutest details of his life. Anyone with such a painstaking approach to life would have been bound to succeed in the context of the traditional American dream as it existed before the 1920s. One cannot help but pity Gatsby for the man that he could have become had he not chosen to pursue Daisy so doggedly. In retrospect, it is tragic that a man with such an excellent work ethic, kind-hearted and tenacious character became inebriated with the elixir of materialistic luxury, rather than that of spiritual enrichment. Thus Gatsby irrevocably bound his happiness to the whims of his material wealth and his association with such aristocrats as Daisy Buchanan, whom he valued not for their delightful company but for the comfort of their wealth itself.In essence, Gatsby himself is a demonstrative example of how once-pristine American ideals of hard work, thrift, vitality, self-improvement, and individualism have been supplanted by an unrestrained, amoral quest for wealth. Towards the closing chapters of The Great Gatsby, it becomes clear that Gatsby’s ultimate demise and the failure of his dream is due to the materialism and amoral pursuit of wealth that come to define his person. Already it is apparent that Gatsby has built his entire identity around wooing the unattainable Daisy through flashy displays of wealth and glamour.In the midst of their brief period of re-unity, Gatsby seems almost blissfully unaware of Daisy’s marital status. “‘I wouldn’t ask too much of her,’ [Nick] ventured. ?You can’t repeat the past. ‘. Can’t repeat the past? ‘ he cried incredulously. ?Why of course you can! ‘” (111). Gatsby is so infatuated with the possibility of fulfilling his lifelong dream that he is unaware of the fundamental unworthiness of its object, let alone the impracticality of its all. In no time Gatsby’s bubble bursts when Tom finally confronts the awkward situation and permanently seizes Daisy as his possession.Ironically, a possession is all she is to either Tom or Gatsby, as both characters have objectified her into a consumer product, no longer a human being. With Gatsby’s lifelong mission in utter ruins, the novel foreshadows its own conclusion with, “So we drove on toward death through the cooling twilight” (137). Immediately after this Daisy and Gatsby kill Myrtle, Tom’s working-class paramour, with their car. Myrtle’s husband, the insipid George Wilson, soon finds out that Gatsby was the driver, and seeks a final resolution to the disaster life has become. It was after we started with Gatsby toward the house that the gardener saw Wilson’s body a little way off in the grass, and the holocaust was complete” (163). This is Fitzgerald’s most effective of all possible conclusions. Any other writer would have dwelled for pages on the scene and nature of the murder, yet Fitzgerald brilliantly encapsulates it all simply by saying “the holocaust was complete. ” Essentially, Gatsby has undergone two deaths: one is psychological, occurring with the end of the dream of winning Daisy he built his life around. The second is, of course, his physical death at the hand of George Wilson.Fitzgerald correctly emphasizes the former, as Gatsby’s fundamental reason for his existence has ended. Throughout the novel Fitzgerald stresses the developments precipitating this tragic chain of events. Because Gatsby is infatuated with materialism, he objectifies Daisy and constructs an entirely new identity to attain her luxurious grace. Gatsby’s ultimate failure arises from the fact that Daisy is unattainable (thus his dream unrealistic) and that Gatsby’s amoral pursuit of wealth has caused him to place undue value on unworthy people. Many comparisons between the 1920s and the 1990s have been made in recent historical writings.As many scholars note, very similar economic trends were at work in both periods: the stock market boom, lax government regulations, corporate consolidation, class stratification, technological revolutions, and a more materialist consumer culture. Fitzgerald reinforces the sentiment that the traditional American Dream has been lost to the forces of materialism and the uninhibited pursuit of wealth. “As the moon rose higher the inessential houses began to melt away until gradually I became aware of the old island here that flowered once for Dutch sailors’ eyes. fresh, green breast of the new world. Its vanished trees, the trees that had made way for Gatsby’s house, had once pandered in whispers to the last and greatest of human dreams; for a transitory enchanted moment man must have held his breath in the presence of this continent, compelled into an aesthetic contemplation he neither understood nor desired, face to face for the last time in history with something commensurate to his capacity for wonder” (182). Fitzgerald uses a naturalistic metaphor to skewer Gatsby’s character. He compares trees to the economic and societal foundations created by Gatsby’s predecessors and excoriates Gatsby for trading the essential promises of the American Dream. vitality, individualism, and upward mobility. for a selfish and materialistic dream that never pans out. An apt comparison can be drawn to the 1990s here. Progressive historian Thomas Frank once lamented the same death of economic democracy, a period when “Americans imagined that economic democracy meant a reasonable standard of living for all, that freedom was only meaningful once poverty and powerlessness had been overcome.Today, however, American opinion leaders seem generally convinced that democracy and the free market are simply identical. ” Nearly the exact same consensus occurred during the 1920s when it was popular for political candidates to boast “the business of America is business. ” Fitzgerald sends an enduring warning to avoid the materialistic folly of Jay Gatsby that. on a national scale. has the potential to once again erode the American Dream.
<urn:uuid:0a5b8185-4658-487a-b479-448f90e37a47>
CC-MAIN-2021-43
https://freebooksummary.com/great-gatsby-51
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585916.29/warc/CC-MAIN-20211024081003-20211024111003-00270.warc.gz
en
0.961042
3,205
2.609375
3
Tuning the garbage collector is the most important thing that can be done to improve the performance of a Java application. GC is typically caused when the JVM decides GC is necessary, specifically when: - a minor GC will be triggered when the new generation is full; - a full GC will be triggered when the old generation is full; - a concurrent GC (if applicable) will be triggered when the heap starts to fill up OpenJDK has three collectors suitable for production, with different performance characteristics. In order to study the GC behaviours in application, it is important to turn on GC logging. The detailed step is different in JDK 8 and JDK 11. Java developers don’t need to manage life cycle of objects explicitly as the JVM automatically fress the object. In order to track objects that are still in use, it is insufficient to count references to objects. Instead, the JVM must periodically search the heap for unused objects. Once it finds unused objects, the JVM frees the memory occupied by those objects. It also needs to compact the memory to prevent memory fragmentation. The performance of GC is dominated by these basic operations (finding unused objects; freeing up their memory; compacting the heap), no matter which collector is used. Some algorithms delay compaction until absolutely necessary, some compact entire sections of the heap at a time, and some compact the heap by relocating small amounts of memory at a time. These different approaches are why different algorithms have different performance characteristics. Java programs are typically heavily multithreaded, and the garbage collector itself often runs multiple threads too. We refer to the application logic threads as mutator threads, since they are mutating objects as part of the application logic. When GC threads track object references or move objects around in memory, they must make sure application threads are not using those objects on the move. This introduces a pause when all application threads are stopped (known as stop-the-world pauses), which generally has the greatest impact on the performance of an application. Minimizing those pauses is one important consideration when tuning GC. Garbage collectors are generational Most garbage collectors work by splitting the heap into generations. These are called the old (or tenured) generation, and the young generation, which is further divided into sections known as eden and survivor spaces, with eden taking up the vast majority of the young generation. The rationale for having separate generations is that many objects are used for a very short period of time in the real life of application programming. Garbage collector is designed to take advantage of this. Objects are first allocated in the young generation, which is a subset of the entire heap. When the young generation fills up, the garbage collector will stop all the application threads and empty out the young generation. Objects that are no longer in use are discarded, and objects that are still in use are moved elsewhere. This operation is called a minor GC or a young GC. Common GC algorithms have stop-the-world pauses during collection of the young generation. This design has two performance advantages. First, Cleaning up young generation as a only a portion of the entire heap causes shorter pause than cleaning up the entire heap. Second, by moving used objects to survivor spaces or old generation, and discarding unused objects, compatction is achieved. With used objects moved to the old generation, eventually it woo will fill up, and the JVM will needt o find any objects within the old generation that are no longer in use to discard. This is where GC algorithms have their biggest differences. The simpler alghorithms stop all application threads, find the unused objects, free their memory, and then compact the heap. This process is called a full GC, and it generally causes a relatively long pause for the application threads. On the other hand, sophisticated alghrithms are able to find unused objects while application threads are running. These algorithms are called concurrent collectors, or low-pause collectors. A concurrent collector typically allows an application to experience fewer and shorter pauses. The biggest trade-off here is the overall CPU required by the sophisticated algorithms. The three main algorithms Serial GC is the simplest and the default for single core host (e.g. client-class machine, single-processor VM or Docker container). The serial collector uses a single thread to process the heap. It will stop all application threads as the heap is processed (for either a minor or full GC). During a full GC, it will fully compact the old generation. The serial collector is enabled by using the -XX:+UseSerialGC flag. The throughput collector (aka parallel collector) is the default collector for any 64-bit machine with two or more CPUs. The throughput collector uses multiple threads to collect the young generation, which makes minor GCs much faster than when the serial collector is used. This uses multiple threads to process the old generation as well. The throughput collector stops all application threads during both minor and full GCs, and it fully compacts the old generation during a full GC. Since it is the default in most situations where it would be used, it needen’t be expliticly enabled. To enable it where necessary, use the flag -XX:+UseParallelGC The G1 GC (or garbage first garbage collector) uses a concurrent collection strategy to collect the heap with minimal pauses. It is the default collector in JDK 11 and later for 64-bit JVMs on machines with two or more CPUs. G1 GC divides the heap into regions, but it still considers the heap to have two generations. Some of those regions make up the young generation, and the young generation is still collected by stopping all application threads and moving all objects that are alive into the old generation or the survisor spaces, using multiple threads. In G1 GC, the old generation is processed by background threads that don’t need to stop the application threads to perform most of their work. In G1 GC, the old generation is processed by background threads that don’t need to stop the application threads to perform most of their work. Because the old generation is divided into regions, G1 GC can clean up objects from the old generation by copying from one region into another, which means that it compacts the heap during normal processing. This helps keep G1 GC heaps from becoming fragmented. The trade-off for avoiding the full GC cycles is CPU time; the multiple background threads G1 GC uses to process the old generation requires CPU cycles available at the same time the application threads are running. G1 GC is enabled by specifying the flag -XX:+UseG1GC. It is the default in JDK 11, and functional in JDK 8 as well, with some performance feature missing. In all cases, GC is caused when the JVM decices GC is necessary; a minor GC will be triggered when the new generation is full; a full GC will be triggered when the old generation is full, or a concurrent GC (if applicable) will be triggered when the heap starts to fill up. Java also provides a mechanism for applications to force a GC to occur: the System.gc() method, although it is always a bad idea to call that method explicitly because it triggers a full GC which hangs the application threads. This method can be disabled by including -XX:+DisableExplicitGC in the JVM arguments. As to choosing GC algorithm, the rule of thumb is that G1 GC is the better choice. However, in JDK 8, the ability of G1 GC to avoid a full GC is also a key consideration. In this case we may need to choose betwen serial collectors and throughput collectors, based on the number of CPUs on the machine. The serial collector makes sense when running CPU-bound applications on a machine with a single CPU, even if that single CPU is hyper-threaded. The throughput collector makes sens on multi-CPU machines running jobs that are CPU bound. Even for jobs that are not CPU bound, the throughput collector can be the better choice if it does relatively few full GCs or if the old generation is generally full. Basic GC tuning Sizing the heap If the heap is too small, the program will spend too much time performing GC and not enough time performing application logic. On the contrary, a very large heap will increase the time spent in GC pauses, even thought the pauses occur less frequently. It is also potentially dangerous due to interaction with memory swap. If a Java program with a 12 GB heap is running on a system where swap is enabled, the OS may handle it by keeping 8GB of the heap in RAM and 4GB on disk. The JVM does not know about this because swapping is handled by the OS. The JVM will happily fill up all 12GB of heap it has been told to use. This can cause a sever performance penalty when OS swaps data from disk to RAM. Worse, the one time this swapping is guaranteed to occur is during a full GC, when the JVM must access the entire heap. Swapping during full GC makes the pause an order of magnitude longer. So heap size (total for all JVMs) should never exceed the amount of physical memory on the machine. Size of heap is controled by two values (Xms as initial value and Xmx as maximum value). Having an initial and maximum size for the heap allows the JVM to tune its behaviour depending on the workload. If the JVM sees that it is doing too much GC, with the initial heap size, it will continually increase the heap until the JVM is doing the “correct” amount of GC, or until the heap hits its maximum size. A good rule of thumb is to size the heap so that it is 30% occupied after a full GC. To calculate this, start your application and push it to high load. Then connect to the application with jconsole, force a full GC, and observe how much memory is used when the full GC completes. Sizing the generations The JVM must also decide how much of the heap to allocate respectively to they young generation and old generation. THe JVM usually does this automatically and usually does a good job in determining the optimal ratio. In some cases you might hand-tune these values. In general, if there is a relatively larger young generation, young GC pause times will increase, but the young generation will be collected less often, and fewer objects will be promoted into the old genration. But on the other hand, older generation will be relatively smaller and fill up more frequently and do more full GCs. The command-line flag to tune the generation sizes are: The size of initial young generation is determined by initial heap size and new ratio: Initial Young Gen Size = Initial Heap Size / (1 + NewRatio) The young generation will grow in tandem with the overall heap size, but it can also fluctuate as a percentage of the total heap (based on the initial and maximum size of the young generation). Adaptive sizing controls how the JVM alters the ratio of young genration to old gneeration within the heap. It should be kept enabled in general. For finely tuned heaps, adaptive sizing can be disabled for a small performance boost. Sizing the metaspace When the JVM loads classes, it must keep track of certain metadata about those classes. This occupies a separate heap space called the metaspace. In older JVMs this was handled by a different implementation called permgen. To end users, the metaspace is opaque. It does not hold the actual instance of the class. The objects are held in the regular heap. Information in the metaspace is used only by the compiler and JVM runtime, and the data it holds is referred to as class metadata. Tuning the metaspace is fairly rare these days because the default values for the size of metaspace are very generous. It is sized dynamically based on an initial size (-XX:MetaspaceSize=N) and will increase as needed to a maximum size (-XX:MaxMetaspaceSize=N). Resizing the metaspace requires a full GC, so it is an expensive operation. If there are a lot of full GCs during the startup of a program (as it it loading classes), it is often because permgen or metaspace is being resized, so increasing the initial size is a good idea to improve startup in that case. All GC alghorithms except the serial collector use multiple threads. The number of these threads is controlled by the -XX:ParallelGCThreads=N flag. Bacuase these GC operations stop all application threads from executing, the JVM attempts to use as many CPU resources as it can in order to minimize the pause time. By default, that means the JVM will run one thread for each CPU on a machine, up to eight. Once that threashold has reached, the JVM adds new thread for only every 1.6 CPus. Sometimes this number is too large relative to the heap size and hand tuning is needed. Reference: Java Performance by Scott Oaks
<urn:uuid:29f67f3e-d75b-4cf4-a84b-4bacd379aae0>
CC-MAIN-2021-43
https://www.digihunch.com/2020/08/java-garbage-collection/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585516.51/warc/CC-MAIN-20211022145907-20211022175907-00630.warc.gz
en
0.933614
2,713
3.421875
3
“Chapter 8: ‘Search Me, O God, and Know My Heart’” Teachings of Presidents of the Church: Lorenzo Snow (2011) “Chapter 8,” Teachings: Lorenzo Snow On December 15, 1899, President Lorenzo Snow, then President of the Church, spoke at the funeral of President Franklin D. Richards, who had served as President of the Quorum of the Twelve Apostles. Near the end of his sermon, President Snow said, “I ask the Lord of Israel to bless the Latter-day Saints and that we may be prepared for the events of the near future, with our hearts right before the Lord.” Illustrating the need to keep “our hearts right before the Lord,” President Snow told of an experience he and President Richards shared in the 1850s, when they were new Apostles. At that time, President Brigham Young led a reformation in the Church, calling on Latter-day Saints everywhere to repent and renew their commitment to righteous living. “When President Young was aroused to call upon the people to repent and reform,” recalled President Snow, “he talked very strongly as to what ought to be done with some people—that their Priesthood ought to be taken from them, because of their failure to magnify it as they should have done. The brethren who lived in those days will remember how vigorously he spoke in this direction. Well, it touched Brother Franklin’s heart, and it touched mine also; and we talked the matter over to ourselves. We concluded we would go to President Young and offer him our Priesthood. If he felt in the name of the Lord that we had not magnified our Priesthood, we would resign it. We went to him, saw him alone, and told him this. I guess there were tears in his eyes when he said, ‘Brother Lorenzo, Brother Franklin, you have magnified your Priesthood satisfactorily to the Lord. God bless you.’”1 Throughout his life, President Snow wanted his heart to be right before the Lord, and he also encouraged the Saints to examine their own worthiness. He spoke with “a view of riveting more forcibly upon our understanding” the need to establish “a proper character, as Latter-day Saints, before God our Father.”2 [See suggestion 1 on page 125.] I am under the strongest impression, that the most valuable consideration, and that which will be of the most service when we return to the spirit world, will be that of having established a proper and well defined character as faithful and consistent Latter-day Saints in this state of probation. In cases where a stranger applies for employment, or an office of trust, it is often required that he produce papers attesting his worthiness, from reliable parties, letters of recommendation and of introduction which are exceedingly useful in their way, assisting in obtaining favors and privileges which otherwise would be difficult to secure. It is, however, comparatively easy to obtain a written character, as it is termed, a character that one can put in his pocket; and, indeed, according to my observation it is not infrequently the case that people are the bearers of written characters which their real and true character fails to attest. There are those among us who are recognized as members of this Church who take a vast amount of pains to be favorably known by those around them, but whose real character, or the inwardness so to speak, of such people, is veiled or disguised. … Now this prayer that I [refer] to—“Search me, O God, and know my heart: try me, and know my thoughts; and see if there be any wicked way in me, and lead me in the way everlasting” [Psalm 139:23–24]—is very significant; it was a prayer that David in the principal course of his life could conscientiously and with a degree of confidence offer up to the Lord. But there were times when he would feel the faltering and quivering sensation of weakness in offering up a prayer of this kind. I have reason to believe that many of the Latter-day Saints, during a great portion of their lives, could approach the Lord in all confidence and make this same prayer—“Search me, O God, and know my heart, and see if there be any wicked way in me;” but if we, as a people, could live so as to be able at all times to bow before the Lord and offer up a prayer like this, what a delightful thing it would be, what an attainment we should have acquired in righteousness and good works! … I would recommend that [every person] adopt this prayer of David, and see how near he can live according to the light that he has, so as to make it in all sincerity part of his devotions to God. Many fail in coming up to this standard of excellence because they do things in secret where mortal eye cannot penetrate, that have a direct tendency to alienate them from the Almighty and to grieve away the Spirit of God. Such persons cannot in their private closet use this prayer; they could not unless they had repented of their sins and repaired the wrong they may have committed, and determined to do better in the future than they had done in the past, and to establish a character before God that could be relied upon in the hour of trial, and that would fit them to associate with holy beings and with the Father himself when they shall have passed into the spirit world. … We must be true men and true women; we must have faith largely developed, and we must be worthy of the companionship of the Holy Ghost to aid us in the work of righteousness all the day long, to enable us to sacrifice our own will to the will of the Father, to battle against our fallen nature, and to do right for the love of doing right, keeping our eye single to the honor and glory of God. To do this there must be an inward feeling of the mind that is conscious of the responsibility that we are under, that recognizes the fact that the eye of God is upon us and that our every act and the motives that prompt it must be accounted for; and we must be constantly en rapport [in harmony] with the Spirit of the Lord.3 [See suggestion 2 on page 125.] There are many things that I admire in the character of the prophets, and especially in that of Moses. I admire his determination to carry out the word and will of God with regard to Israel, and his readiness to do everything that was in the power of man, assisted by the Almighty; and above all I admire his integrity and fidelity to the Lord. … God admires the men and women today who pursue a course of rectitude and who, notwithstanding the powers of Satan that are arrayed against them, can say, Get thee behind me Satan [see Luke 4:8], and who live a righteous, a Godly life, and such people have influence with God and their prayers avail much [see James 5:16]. Moses, for instance, had such power with the Almighty as to change His [God’s] purpose on a certain occasion. It will be remembered that the Lord became angry with the Israelites and declared to Moses that He would destroy them, and He would take Moses and make of him a great people, and would bestow upon him and his posterity what He had promised to Israel. But this great leader and lawgiver, faithful to his trust, stood in the gap and there pled with the Lord on behalf of his people; by the power that he could exercise and did exercise, he was the means of saving the people from threatened destruction. [See Exodus 32:9–11; Joseph Smith Translation, Exodus 32:12.] How noble and glorious Moses must have appeared in the eyes of the Lord, and what a source of satisfaction it must have been to Him to know that His chosen people, in their obstinate and ignorant condition, had such a man at their head. In Jonah again we find an interesting trait of character. When upon the raging water, and fears were expressed by the sailors as to their ability to save the ship, Jonah feeling conscience stricken at the course he had taken in not proceeding to Nineveh as commanded of the Lord, came forward and confessed himself as being the cause of the disaster that was about to befall them, and was willing to be sacrificed in the interest of those on board. [See Jonah 1:4–12.] Also in other prophets and men of God, although they may have on certain occasions, like Jonah, exhibited weaknesses, there is something really grand and admirable shown in their character.4 [See suggestion 3 on page 125.] Such traits of character as we find evinced in the ancient worthies are not the products of accident or chance, neither are they acquired in a day, a week, a month, or a year, but are gradual developments, the results of continued faithfulness to God and to truth, independent of either the plaudits or criticisms of men. … It is important that we, as Latter-day Saints, should understand and bear in mind that salvation comes through the grace of God and through the development in us of those principles that governed those righteous people before mentioned. The idea is not to do good because of the praise of men; but to do good because in doing good we develop godliness within us, and this being the case we shall become allied to godliness, which will in time become part and portion of our being. … Do we not at times do things that we feel sorry for having done? It may be all very well provided we stop doing such things when we know them to be wrong; when we see the evil and then reform, that is all we can do, and all that can be asked of any man. But undoubtedly, it is too much the case with some that they consider and fear the publicity of the wrong they commit more than committing the wrong itself; they wonder what people will say when they hear of it, etc. And, on the other hand, some are induced to do certain things in order to receive the approbation of their friends, and if their acts fail to draw forth favorable comments or to be recognized, they feel as though their labor had been lost, and what good they may have done was a total failure. Now, if we really desire to draw near to God; if we wish to place ourselves in accord with the good spirits of the eternal worlds; if we wish to establish within ourselves that faith which we read about and by which ancient Saints performed such wonderful works we must, after we obtain the Holy Spirit, hearken to its whisperings and conform to its suggestions, and by no act of our lives drive it from us: It is true that we are weak erring creatures liable at any time to grieve the Spirit of God; but so soon as we discover ourselves in a fault, we should repent of that wrongdoing and as far as possible repair or make good the wrong we may have committed. By taking this course we strengthen our character, we advance our own cause, and we fortify ourselves against temptation; and in time we shall have so far overcome as to really astonish ourselves at the progress we have made in self-government, and improvement.5 [See suggestion 4 on page 125.] We have received a Gospel that is marvelous in its operations: through obedience to its requirements we may receive the choicest blessings that have ever been promised to or bestowed upon mankind in any age of the world. But, like the child with the toy or the plaything, we too often satisfy ourselves with the perishable things of time, forgetting the opportunities we have of developing within us the great, the eternal principles of life and truth. The Lord wishes to establish a closer and more intimate relationship between Himself and us; He wishes to elevate us in the scale of being and intelligence, and this can only be done through the medium of the everlasting Gospel which is specially prepared for this purpose. Says the Apostle John: “Every man that has this hope in him purifieth himself, even as He (Christ) is pure.” [1 John 3:3.] Are the Latter-day Saints applying the principles of the Gospel to their lives, and thus accomplishing the design of God? … What can we do under the circumstances to elevate ourselves still higher in the righteousness of our God? What advantages, blessings and privileges does this system of salvation, which we have obeyed, afford, and what means shall be employed to realize them? If there should be a sacrifice demanded it will be very opportune for all those who wish to make their religion a study, and who are endeavoring to conform to its requirements, by living it in their everyday life, to show their willingness to bow to the will of Jehovah, acknowledging his hand in adversity as in prosperity. … It would be well to examine ourselves, hold communion with ourselves in the secret closet, to ascertain how we stand … before the Lord, so that if need be we may renew our diligence and faithfulness, and increase our good works. There is no doubt, speaking of the people as a whole, that we are greatly improving in the sight of God. But although this is undoubtedly the case, I am convinced there are persons among us endowed with spiritual gifts and susceptible of cultivation, that could be exercised, if they chose, to a far greater extent than they are, and who could move much faster in the ways of holiness and get much nearer to the Lord. But the spirit which attends the things of this world is operating upon them to that extent that they do not increase those spiritual powers and blessings; they do not place themselves in that close relationship to the Lord that it is their privilege.6 Our character, as Latter-day Saints, should be preserved inviolate, at whatever cost or sacrifice. Character, approved of God is worth securing, even at the expense of a life-time of constant self-denial. While thus living we may look forward … , with full assurance that … we shall be crowned with the sons and daughters of God, and possess the wealth and glory of a Celestial kingdom.7 [See suggestion 5 below.] Consider these ideas as you study the chapter or as you prepare to teach. For additional help, see pages v–vii. As you review the account on pages and 119, what do you learn from the actions of Elder Lorenzo Snow and Elder Franklin D. Richards? Consider how you might share these principles with family members or others. President Snow said, “We must be true men and true women” (page 120). What do you think it means to be a true man or a true woman? Consider President Snow’s observations about the examples of Moses and Jonah (pages 121–22). What do you see in each of these accounts that can help us improve our character? Ponder the second full paragraph on page 123. Why do you think we need to be aware of our faults in order to strengthen our character? How can we allow ourselves to see our own shortcomings without becoming discouraged? Review President Snow’s counsel in the final section of the chapter (pages 123–25). Consider making time to examine yourself and determine how you stand before the Lord.
<urn:uuid:695f92de-64a7-4d94-9910-9be3166d4a18>
CC-MAIN-2021-43
https://www.churchofjesuschrist.org/study/manual/teachings-of-presidents-of-the-church-lorenzo-snow/chapter-8-search-me-o-god-and-know-my-heart?lang=eng
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588242.22/warc/CC-MAIN-20211027181907-20211027211907-00550.warc.gz
en
0.977353
3,169
2.546875
3
We all know that the current changes in our planet’s climate are redrawing the world and magnifying the risks for instability in all forms. Water is one of the most valuable resources on Earth. Probably every manufactured product uses water during some part of the production process. It is the source of life on Earth and quite possibly beyond. It covers over two-thirds of the planet’s surface, makes up around 70% of the human body and is essential for life. Water is indispensable to human life. In theory, the amount of water on earth will always remain the same. How likely are the water wars to arise? Water has ranked in the top five risks for seven consecutive years in the World Economic Forum’s Global Risk Report. There is already plenty of evidence to suggests that climate change drives conflict and social unrest, directly linking both in a cause-and-effect relationship. Water-related challenges such as shortages and sanitation are already increasing smaller-scale conflict and instability within and across national borders. Its scarcity is playing a role in fuelling the political and security crisis in Yemen. Afghanistan’s efforts to harness the waters of the Helmand River and the Harirud to support post-conflict reconstruction and development have alarmed Iran. The long-standing conflict over water from the Cauvery River between the Indian states Karnataka and Tamil Nadu has recently resurfaced. However, it is rarely the lack of water as such that fuels conflict, but rather its governance and management. And if you look at the headline threats to humanity and the planet over the next decade, as pinpointed by 1,000 experts, all but one are linked to water. These include extreme weather, natural and man-made disasters, climate change, biodiversity loss and ecosystem collapse. This is a grim fact of modern life and despite having contributed the least to anthropogenic climate change of anyone, low-income, resource-poor nations will be affected the most. You can’t escape climate change if your feet are on the ground. It is widely agreed that a business-as-usual approach cannot address global water challenges in the future, nor will our current strategies sustain the world’s thirst much longer, particularly when the population hits eight, nine or ten billion in the coming decades. Yet cold, hard data on how our water systems function is still lacking. The World Health Organization estimates 844 million people lack basic drinking water; some two billion use a source contaminated with faeces. With a warming of 2 to 4C, most regions in Africa will experience a 60 to 80 per cent reduction of surface run-off by 2100. Last year, Cape Town came within a few drops of Day Zero when the taps are turned off. A serious drought was only just averted. There is no need here to draw a picture of what would happen if New York or any other city with a few million inhabitants suffered fresh water shortages. With 55% of us already living in urban areas which are forecasted to hit 68% by 2050 many cities and towns that are in low-lying coastal locations are under threat to flooding. Let’s face it, water is chronically undervalued and, in some cases, not valued at all. Only by embedding its true financial, social and environmental value into policymaking, governance, and financial and risk reporting can we instil a better mentality. The resilience of our society, both in terms of economic growth and human security, must be addressed through a water lens. As the Paris climate change conference showed making pledges, is one thing, delivering on them often another. The emerging fourth industrial revolution technologies – machine-learning, artificial intelligence, advanced sensors, satellite imagery, robotics and others – have the potential to unlock a wealth of previously unobtainable data about water systems at the global, regional, watershed and local level. Unfortunately, all this data will achieve little or nothing unless its value is realized and appreciated today. In 2021, the Surface Water Ocean Topography mission, a joint satellite mission between Nasa and France, will use radar technology to provide the first global survey of Earth’s water, measuring how bodies of water change over time. The satellite will survey at least 90 per cent of the planet, studying lakes, rivers, reservoirs and oceans roughly twice every 21 days. WHAT THEY WILL DISCOVER IS BY 2021 WE WON’T NEED A SATELLITE TO SURVEY THE EARTH’S WATER. OUR PLANET IS ALREADY SENDING DISTRESS SIGNALS. Consumers may already be aware of the environmental impact of producing goods in terms of energy or pollution, but they might be surprised to learn how much water is needed to create some daily goods. Growing coffee beans is a thirsty business, as is growing cotton – 10,000 litres of water in a pair of jeans – and 2,500 litres in the average T-shirt. Avocados, almonds – even bottles of water themselves, are all highly water-intensive enterprises. Common sense says it’s TIME TO STOP EATING – HAMBURGERS. A hamburger takes 2,400 litres, or 630 gallons, of water to produce. Thousands of litres are needed to make shoes and microchips. Somewhere around 30 litres of water is required for tea itself, 10 litres for a small dash of milk and a further 6 litres for each teaspoon of sugar. This means that a simple cup of tea with milk and two sugars could actually require 52 litres of water – enough to fill my kettle more than 30 times. Agriculture uses about 70% of freshwater across the globe. When countries and regions with water shortages pour their water into exports, on the surface it can look as if they are making a profit, but in the long term their reliance on diminishing water resources will be damaging. WHAT IF ANYTHING ARE WE DOING ABOUT WATER? There is the same amount of freshwater on earth as there always has been. Water scarcity is an abstract concept to many and a stark reality for others. It is the result of myriad environmental, political, economic, and social forces. In essence, only 0.007 per cent of the planet’s water is available to fuel and feed its 6.8 billion people. Desalinated seawater is now a mainstay of the Israeli water supply. A hundred million gallons of ocean water is to be pumped through the Carlsbad Desalination Project each day. … The fat pipe, also known as the brine pit, is where the salt that’s been removed from the drinking water is returned to the ocean wreaking havoc with the ocean’s delicate ecosystems. Worldwide, some 700 million people don’t have access to enough clean water. In 10 years the number is expected to explode to 1.8 billion. The UN predicts that by 2025 14 per cent of the world will rely on desalination to meet water needs. Desalination is being used as a last resort in California. Water obtained from desalination costs twice the amount of water from freshwater sources. The only way desalination can be a good option for solving the water crisis is if renewable energy is used and the salt extracted is not returned to the sea. These kinds of industrial desalination plant are generally constructed near the coastline and the discharge-pumped back into the sea causing indirect but well-documented environmental pollution; Combining renewable energy with improved technology could make desalination a more viable option however desalination is not a silver bullet. At the moment 844 million people do not even have access to a basic water source. There is no global governance system for water. 60% of all surface water on earth comes from river basin shared by separate nations and almost 600 aquifers cross national boundaries. It would cost just over £21bn a year to 2030, or 0.1% of global GDP, to provide water and hygiene to all those who need it, but the World Bank estimates that the economic benefits would be $60bn a year. Bottled water privatization creates a monopoly on a resource that should otherwise be available to the people who live in the region where the water is located. If you asked me I would say that we will have to learn once again to show humility, even reverence, for this vital liquid. In other words, coping with drought and water shortage by reducing water consumption, rather than (fueling consumption by) increasing water supply. For example, the EU is generating an enormous amount of pollution in other countries by consuming imported products without having to deal with the consequences. The challenge we now face as we head into the future is how to effectively conserve, manage, and distribute the water we have. Nobody knows how much water is left. We’ve buried our head in the sand for far too long. Rough estimates say in little over a decade half of the world will be living in areas where there simply isn’t enough to go round. The one thing we do know is that even though the earth is changing on its own, we’re ultimately responsible for the dangers we’re facing today. It’s time to start making big changes before it’s too late. How about recharge our groundwater from melting glaciers. Hopefully, we’ll come up with ways to produce more water before we hit the point where half the world will be desperate for it. Perhaps here in the European Union, we could make it compulsory for all farmers to use field sensors, ( that are available for as little as 10 euros a year,) that can monitor the moisture content in soil, letting farmers know whether irrigation is needed and allowing them to calibrate the irrigation more finely than has previously been possible. But science and technology can only go so far. As with most water issues, the biggest problem is still governance and equity. Even if when you factor in the fact that with global warming well underway 2/3 of the freshwater in the world is locked up in frozen glaciers. One of the potentially most destabilising global water-related threats will be rising food prices and increased hunger. Climate change is, self-evidently, becoming a global phenomenon. 95% of this drama will unfold in the next 50 to 100 years. The crux of the matter is that climate change isn’t just a ubiquitous problem, it’s also deeply complex. With or without climate change water will be the key environmental issue of the century. IN THE MEANTIME MY ADVICE IS START CONSERVING IT. All human comments appreciated. All like clicks and abuse chucked in the bin.
<urn:uuid:18100192-967b-434f-9f70-86fe75be7155>
CC-MAIN-2021-43
https://bobdillon33blog.com/2019/03/07/the-beady-eye-says-by-2025-one-in-every-two-people-on-the-planet-will-be-live-with-water-stress/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585537.28/warc/CC-MAIN-20211023002852-20211023032852-00470.warc.gz
en
0.936401
2,239
3.453125
3
"Fourth position" is a perceptual position which involves being associated in the whole system or 'field' relating to a particular interaction. It involves experiencing a situation with the best interest of the entire system in mind. Fourth position is a "we" position, and is characterized by the use of 1st person plural language - "We are," "Us," etc. Fourth position is an essential component of wisdom and ecology. Although it was not included in the original group of perceptual positions (first position - self, second position - other, third position - observer), fourth position is just as fundamental. It is essential for effective leadership, team building and the development of group spirit. As the term implies, fourth position presupposes and encompasses the other three perceptual positions. People who are not able to achieve fourth position have difficulty experiencing themselves as a member of a group or community. The experience of fourth position comes from finding the deeper common factors and characteristics which unite and connect all of the members of a group or system. It is the foundation of what is known as "groupmind". Fourth position should be distinguished, however, from simple consensus. Consensus is essentially agreement among individuals. Fourth position comes from a felt sense of "sameness" and identification with all members of a system. It also presupposes that one has already taken the other three perceptual positions. The relationship of fourth position to the others can be most easily envisioned as the tip of a pyramid. The foundation of the pyramid is made up of the three primary perceptual positions -- self, other and observer. The fourth position, or system position, is the crest of the pyramid, which encompasses and adds depth to the other three. In functional systems, all the members of the system are able to assume and experience fourth position to some degree. The ability to reach a fourth position perspective greatly facilitates group management and is a key characteristic of visionary leadership. Effective leaders are able to identify with the whole system they are influencing. Fourth position is also a key perspective for modeling. Fourth position, for example, can be especially important when exploring and understanding other cultures in which individuality, or the sense of a personal "I" is not emphasized, or the notion of the community or the "we" is the rule. In Bali, for example, particular social castes have only four names for all of the people within that group. The names essentially stand for "first born," "second born," "third born" and "fourth born." If a family has more than four children, the name of the fifth child starts again with the name for "first born." Thus, the names reflect the group or the caste, not the individual. Theirs is organized more around the experience of the community than the individual. The first explicit use of a "fourth perceptual position" in an NLP technique was in the Meta Mirror process (Dilts, 1988, 1990, 1992), developed by Robert Dilts as a result of the Syntax of Behavior series he did with John Grinder in 1988. The process was based on getting a position that both encompassed and reflected upon first, second and third positions, in order to help resolve problems resulting from judgments made from third position. In 1989, the concept of 'fourth position' was expanded to be a "system position", or what was often referred to as a "company position" in the Meta Map for Leadership (Dilts, 1989, 1998), as a result of Dilts' modeling of the skills and strategies of effective leaders. This position was characterized by the word "we" and involved the "identification" with the team, group or system which one was leading, creating "a thinking vision of the system," and "considering the best interests of the entire system." It was at this time that fourth position began to become referred to also as a "We" position. Webster's Dictionary defines the use of the term "we" as referring to "a group that is consciously felt as such by its members." In his classic work on group dynamics, Kurt Lewin (1939) referred to the sense of cohesiveness (the feeling of "we-ness") as one of the basic properties of any group. When cohesiveness is high, members are motivated to participate in the group's activities and to help the group attain its goals and objectives. Such an experience provides group members a sense of security and identity, and a feeling of personal worth or in Lewin's words, "the ground on which the person stands." The degree of cohesiveness experienced by a group is generally a function of the degree of overlap of the interests and values of group members, and the degree of communication and 'rapport' that they are able to achieve with one another. The NLP concept of rapport stems back to 1976. Creating rapport is generally defined as the establishment of trust, harmony and cooperation in a relationship. "Harmonious mutual understanding," "agreement," being "in tune" and "in accord," are some of the words used to describe the process or state of being in rapport with another. The process of body mirroring to create rapport is one of the earliest and most well known NLP techniques (although mirroring is not a guarantee of the creation of the state of rapport because a person can still easily stay in his or her own "first position" and not necessarily enter the "we" experience.) The NLP notion of rapport was derived from the work of Milton Erickson. As a hypnotherapist, Erickson created and entered into a special state of rapport called the "therapeutic trance." In 1978, a student noticed that, as Erickson was in the process of leading a client into a trance state, Erickson himself exhibited the characteristics of trance, including pupil dilation, change of muscle tonus and breathing. When asked if he was entering trance when he hypnotized his clients, Erickson's response was "invariably." To this reply the student asked, "Who is hypnotizing who in that case?" Again Erickson replied "invariably," suggesting that the state of rapport is a loop of mutual influence and interaction in which each element is influencing, and influenced by, the other elements. The first use of the term "we" as an explicit part of an NLP technique was in the Composition Strategy (Dilts & Grinder, 1982) format for creative writing. "We" is the fourth of the narrative positions used to generate "prompts" for stimulating ideas while writing; along with "I," "You," "She," He," and "They." The advent of the notion of spatial sorting and psychogeography (the psychological effects of physical location) in NLP (Dilts, 1987, 1990), along with perceptual positions, brought new developments to the NLP notions of perceptual positions, rapport and the experience of "we". It could be easily demonstrated that shifting one's 'psychogeography' while communicating with another would dramatically alter the perception of the relationship. Standing or sitting face-to-face, for example, tends to focus attention strongly on the perception of "I" and "you." Standing side-by-side promotes the experience of operating as partners in a framework of "we." The use of psychogeography to create the experience of being aligned with another person, sharing the perception of partners and operating as a "we" unit, is an explicit step of both the Meta Mirror and Meta Map for Leadership processes. The Logical Level Co-Alignment process (Dilts, 1992), was designed to create a sense of "we-ness" between individuals in a group by finding commonalities as multiple levels of experience. The process primarily emphasizes overlaps with respect to beliefs, values, a sense of identity and "spiritual" perceptions (defined as "the experience of being part of a larger system that reaches beyond ourselves as individuals to our family, community and global systems; the sense of something that goes beyond our own image of ourselves, our values, beliefs, thoughts, actions or sensations i.e., who and what else is in the larger systems of which we are a part.") The Spiritual Healing process, developed by Dilts and McDonald for the Tools of the Spirit program (first conducted in 1992), incorporated a state of "spiritual wholeness" as an additional element of the "fourth position." "Spiritual wholeness" was defined as "the sense of being part of something larger than oneself" (Dilts & McDonald, 1997). This fourth position was used to create 'spiritually extended' 1st, 2nd and 3rd positions. Bringing the influence of this fourth position back into first position creates a sense that others are an "extension of" oneself. Taking it into second position creates the experience of being "one with" the other. Linking this fourth position to third position creates the realization that the interaction taking place between the first and second positions is "part of" a much vaster system. The experience of the fourth position sense of "we" has also been enhanced by the development of Somatic Syntax (Dilts and DeLozier, 1993, 1996). Stephen Gilligan's notion of the relational field, introduced into NLP through the series of workshops Love in the Face of Violence (conducted with Robert Dilts) has added further emphasis to the experience of "we." Other perspectives with respect to the NLP notion of fourth position include those suggested by Peter Wrycza and Jan Ardui (1994) who link it with a "witnessing awareness encompassing and behind all positions," and Robert McDonald (1998) who associates perceptual positions with different "levels of awareness," arguing that fourth position is not actually a "position" at all, but the emergent result of an interaction between the other positions. Of course, the crucial point, from the NLP perspective, is not merely the definition or description of fourth position or a "we-position" (the map is not the territory after all), but rather the process by which people can be lead to have the experience to which we are referring. For information on Robert Dilts products and services, please see Upcoming Seminars or Roberts Product Page or return to Home Page. If you have problems or comments concerning our WWW service, please send e-mail to the following address: [email protected]. This page, and all contents, are Copyright © 1998 by Robert Dilts., Santa Cruz, CA.
<urn:uuid:ef6c7192-46fa-41b9-ab67-6efa7e1ef538>
CC-MAIN-2021-43
http://www.nlpu.com/Articles/artic21.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00670.warc.gz
en
0.964138
2,155
2.984375
3
Communication is a process in which people verbally or non-verbally share information and ideas. Nonverbal communication can be best defined as a silent form of communicating with a person or party without using any form of speech to grab an audience attention or to exploit a message. Nonverbal communication is often used to make an expression of a thought or thoughts and make your message more appealing and interesting to whom you are speaking. Nonverbal communication has a great influence over our social environment and the whole communication process. There are many types and functions of nonverbal communication. Nonverbal communication regulates relationships and can support or even replace verbal communications in many situations. Different genders and cultures use nonverbal communication differently and these differences can impact the nature of interpersonal communication. Nonverbal communication can become a barrier or tear down barriers to effective communication. I conducted my own observation of nonverbal communication in a restaurant which is done on a daily basis. Nonverbal rules may differ according to the situation, and each situation determines its set of rules. The restaurant is located in Waynesboro, Ms, where I live. The patrons of the restaurant consisted of all types of cultures and class of families. The distinctive patterns of the customers were very noticeable. Different types of patrons had very different yet distinct sets of nonverbal communication behaviors. I observed three different groups, the older adults, the younger adults, and the children. I observed them differently to determine the differences that age and gender play a role in nonverbal behavior rules. Many different types of nonverbal communication were observed such as body language, hand movement, facial expressions, and eye contact. There are four important functions of nonverbal communication. These functions can complement, regulate, substitute for, or accent a verbal message. In addition to the functions, there are many types of nonverbal communication. Those different types include paralanguage, body movement, facial expressions, eye messages, attractiveness, clothing, body adornment, space and distance, touch, time, smell and manner. There are cultural and co-cultural variations in each case of what are acceptable and unacceptable practice (Hybels & Weaver, 2007). In describing the functions with complementing, one might use body language in an effort to support or add credibility to your words, and if that body language is seen as genuine then the overall message is strengthened (Hybels & Weaver, 2007). If the body language is perceived as fake or misleading, however, then it moves into the category of conflicting. In regulating, the body language serves the function of pacing and regulating communication (Hybels & Weaver, 2007). For instance, in a group of people, there are a number of non-verbal cues indicating when one person is finished speaking and it is another person’s turn. The function of substituting uses body language to replace verbal communication (Hybels & Weaver, 2007). For example, if you are caught in a conversation with someone who just keeps talking and talking, it is difficult to come out and tell that person you are tired of the conversation. Instead, you might substitute body language such as glancing away or stepping away. The last function of accenting is a type of body language that emphasizes, accentuates, softens, or otherwise enhances your verbal communication (Hybels & Weaver, 2007). You might point your finger to direct attention to the subject of your words, or you might reach out and touch the hand of a child whom you are correcting or disciplining. Paralanguage refers to the non-verbal elements of communication used to modify meaning and convey emotion. Paralanguage may be expressed consciously or unconsciously, and it includes the pitch, volume, rate, and the quality. Sometimes the definition is restricted to vocally produced sounds. The study of paralanguage is known as paralinguistic cues. Body movements or kinesics are referred to all forms of body movements are important part of non-verbal communication behavior. The transport of body movement has many specific meanings and the interpretations that may be a bound of culture. As many movements are carried out at an unawareness level, the body movements carry a risk of being misinterpreted in a different culture communications situation. Some related words for body movement may be emblems are substitute for words and phrases, illustrators accompany or reinforce verbal messages, display of feelings show emotion, regulators controls the flow and pace of communication, and adaptors release physical or emotional tension (Hybels & Weaver, 2007). Facial expressions can show happiness, sadness, fear, and anger that are easily identifiable across cultures. In addition, facial expressions play an important role in closeness. Eye messages are messages given only with the eyes. In the American culture, eye contact is a sign of honesty, credibility, warmth, and involvement. Other cultures require eye contact. Conversations without eye contact represent disinterest, inattention, rudeness, shyness, or deception. Eye messages show connection to others, attentiveness, involvement, immediacy but prolonged stares show negative and intimidating expressions. Eye messages have a delightful and wondrous aspect in the rolling of the eyes because it is known for flirting (Hybels & Weaver, 2007). The perception of nonverbal communication started during the first year of life, when we learned how to communicate without words as infants. Infants learned very early the difference between a scowl and a smile and they soon learn how to convey their own feelings through non-verbal communication. The way nonverbal cues are perceived and interpreted in relationships can make all the difference between a positive and a negative impression. Paralinguistic enforces the old adage; it is not what you say but how you say it. No matter the rate of speed, the faster the communicator speaks, the more competent they may appear. The speakers with a high and varied pitch come across as more competent; a constant low pitch voice is associated with strength and maturity, while a constant high pitch voice signals tenseness and nervousness. Those who speak loudly are generally seen as aggressive and domineering, and speakers with soft voices are perceived as timid and polite. How individuals perceive nonverbal communication is often based on how they see themselves. If an individual takes everything personally, they may take offense to some nonverbal cues that are being used, whether they are intentional or unintentional. To avoid miscommunication, it is essential that speakers become more aware of the nonverbal cues that are used (Hybels & Weaver, 2007). In the workplace, effective communication can be used to improve performance and to produce desired results. There are many non-verbal cues that are used everyday in the workplace, most of which are stronger that spoken language. Professionally speaking, a handshake can make a strong first impression, whether it is positive or negative. Men tend to have better handshaking skills and etiquette than women do; handshakes should be inviting, strong but not overpowering. Workplace touching is often discouraged due to sending out mixed messages, but handshakes are usually accepted and encouraged in most cases. Eye contact is yet another important non-verbal cue that can be used both positively and negatively in the workplace. In the United States, eye contact conveys honestly and sincerity; making eye contact is often an invitation to open communication, and signifies the need for feedback. In contrast, avoiding eye contact signals distrust, suspicion, or lack of interest; similarly, prolonged eye contact or a stare signifies aggression or flirting (Henman, 2009). In the workplace, dressing professionally is something most employers require, it shows confidence in oneself.Dressing professionally includes clothes that are worn, personal hygiene and not overpowering cologne and perfume. American businesses value being on time and being conscientious of this is crucial in business. Paying attention to all these non-verbal types of communication can prove successful in almost every business. Nonverbal communication has the ability to strengthen and develop existing relationships or it can destroy them. A relationship can be regulated by nonverbal communication because it can support or replace verbal communication. Some of the contributing factors are the sending and receiving ability and accuracy, perception of appropriate social roles, and cognitive desire for interpersonal involvement. If the communicators are unaware of the types of messages they are sending and how the receiver is interpreting the messages difficulties can arise from nonverbal communication. If the perception of the receiver is not of the social norms for the particular situation could cause problems also. All the people involved must want the interaction to occur for reciprocal communication to be successful. Facial expressions can compel one to communicate interaction with another. Facial expressions can cause negative feelings if the other is evoked by them. Introduction and management rely on nonverbal communication in interpersonal relationships. Through research, interpersonal relationships have been successful through nonverbal clues (Dunn, 1999). Nonverbal communication has an impact with gender and cultural differences. There are different views from society of males and females. Males are portrayed as aggressive, controlling, and having a take-charge attitude. Women are seen as sensitive, emotional, and passive. There is a difference how males and females communicate verbally and nonverbally. Women are more expressive when they use non-verbal communication, they tend to smile more than men and use their hands more. Men are less likely to make eye contact than women are. Men also come off as more relaxed, while women seem tenser. Men are more comfortable with close proximity to females, but women are more comfortable with close proximity with other females. In terms of interpreting non-verbal signals, women are better than men are (Coggins, 2006). Culturally, there is a world of differences in nonverbal communication. In comparing the United States with Latin America, we can see many differences. The hand gesture we use to tell someone to come here is the hand palm up with the index finger extending out three or four times is different in Latin America. In Latina America, this hand gesture means you are romantically interested in a person and it is considered solicitation. To tell someone to come here in Latin America the palm is extended down and move all four fingers in and out together three or four times. When traveling on buses in Latin America the elders will hold their hand sideways with all four fingers extended to let one know there is a pickpocket nearby. In the United States, when visitors come to our country, we usually do not greet them personally. Latin Americans give hugs and the men greet the women with “besitos” meaning they touch the cheeks and make a kissing noise with lips (Institute of Languages, 2011). Some barriers to nonverbal communication include cultural differences, deceptive gestures, inappropriate touching, negative nonverbal communication, and perceptual filters. The different cultural differences are ethnocentrism, stereotyping, prejudice, and discrimination along with the hand gestures, touching, and facial expression. Ethnocentrism shows that one culture fill their group is superior to all other cultures. Stereotypes show the distorted or oversimplified views of different races of cultures. When a culture is prejudice towards another culture or group, a negative attitude is shown based on little or no experience. To avoid or exclude oneself from another culture or group discrimination is shown (Hybels & Weaver, 2007). Different gestures often have vastly different meanings to people of different cultures. Nonverbal gestures can lead to misinterpretation. Touching can cause many problems in communicating if it is done incorrectly. A person may touch the other person during a conversation a lot and move close to them. Some people find touching as an invasion of their personal space. This is a barrier for all communication; people have a hard time communicating when they are uncomfortable. When a person displays negative nonverbal communication, it can also act as a barrier. For example, slouching, rolling of the eyes, moving quickly or slowly, or performing a variety of other negative physical behaviors, makes it difficult to communicate with them at all. This is because the person is creating a negative situation and when people feel uncomfortable they are unwilling to communicate. Facial expression can show frustration, anger, embarrassment, or uncertainty. They can contradict the verbal expression sending the real message that the speaker wants to send (Hybels & Weaver, 2007). It is very important to learn how to improve nonverbal communication now that we have discovered that a communicator’s nonverbal communication can influence another’s perception of a message and that of the communicator. One must first monitor our own nonverbal communication skills. We should pay close attention when we are engaged in everyday routine conversations. It will help us to stay attuned to what we are doing and what kind of impression we are giving others. We need to ask ourselves these questions. Do we allow enough personal space so others are comfortableDo we show our interest by making eye contact with othersIs our face expression appropriate for the conversation at hand Is the voice tone appropriate for the situationBy being aware of these things we can improve our nonverbal communication skills. In addition to those skills, we also must learn to be good discriminative listeners. It is relatively simple to hear a message, but we also need to be aware of nonverbal cues from others. We often get so preoccupied by what we are saying and what we are going to say as a response, that we are not sensitive to others needs. People often these express needs through their nonverbal communication, as opposed to what they are saying. Overcoming cultural barriers is another important step in communicating effectively. It is important to understand all aspects of communication (Hybels & Weaver, 2007). “Successful communication between people across cultures requires not only an understanding of language but also of the nonverbal aspects of communication that are part of any speech community” (Ha, 2008). It is more important to understand the non-verbal aspects of communication when people do not speak the same language verbally. In conclusion, communication is complex and multifaceted. Nonverbal communication is a strong factor in today’s society and is used in many cultures. It gives insight to others true emotions and feelings, as well as their truthfulness and sincerity. Nonverbal communication can come in many forms, it can add to, or replace verbal communication, establish relationships and boundaries, and reflect different cultural values. It is symbolic, can be intentional or unintentional and differs between genders and cultures. Effective nonverbal communication can benefit us in interpersonal relationships, our careers and across cultures. It is our responsibility as effective communicators to understand the dynamics of this form of communication, and learn to use it so it benefits everyone involved. By tearing down any personal barriers or biases, and recognize our strengths and weaknesses, we can ultimately communicate in ways that decrease the likelihood of misunderstanding and increase our nonverbal communication as wells as verbally proficiency. Coggins, S. (2006). Nonverbal Communication Between The Genders. Retrieved March 15, 2011 from http://www.shaicoggins.com/nonverbal-communication-between-the-genders/. Dunn, L. (1999). Nonverbal Communication: Information Conveyed Through The Use of Body Language. Department of Psychology. Retrieved March 14, 2011 from Ha, M. (2008). Lessons in Intercultural Communication. Retrieved March 15, 2011 from Henman, L. (2009). It’s Not Always What Say. Retrieved March 14, 2011 from Hybels, S. & Weaver, R. (2007). Communicating effectively (8th ed). New York: McGraw-Hill. Institute of Language (2011). Spanish and Nonverbal Communication, Latin America vs. United States. Retrieved March 15, 2011 from
<urn:uuid:3ad3df8d-943c-428f-a6c6-f50a57dd8fad>
CC-MAIN-2021-43
https://qualityessays.net/nonverbal-communication-an-overview/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585181.6/warc/CC-MAIN-20211017175237-20211017205237-00270.warc.gz
en
0.922486
3,189
3.96875
4
Horse racing is one of the UK’s favourite sports. According to Equine World UK, its history spans as far back as the 12th century, when knights from England brought Arab horses home when they returned from the Crusades. The Arab horses were bred with our nation’s horses to produce Thoroughbreds, the breed used in racing today. It was actually under Queen Anne’s reign (between 1702 and 1714) that horse racing as we know it began. Each race would involve numerous horses (they had previously raced only head-to-head), and would be watched by spectators who were able to bet for which animal they thought would pass the finish line first. Several famous racecourses in England were founded during this time, including Ascot which opened in 1711. With such a long and intriguing history, it is little wonder that so many equine enthusiasts are keen to be part of horse racing. While spectating is a thrill in itself, many owners want a bigger stake in the industry by participating in the events. Learning the lingo As with many other sports, horse racing can seem like it comes with its own dictionary. Whether you are simply spectating or participating in the race in some way, mastering the terminology will make it the best possible experience. Racehorses need special protection due to the higher risks they face during competition. Equesure boasts a team of equine insurance specialists who have more than 60 years of combined industry knowledge. It is our job to arrange horse insurance on your behalf, finding you a policy that suits both your horse and your budget. Benefits can include things like: - Vet’s fees cover for life saving surgery - Personal dental cover available on some policies - Additional 5% discount for insuring more than one horse - Tack and saddlery cover available - EU cover/usage available upon referral - Personal accident cover up to £20,000 - Public liability up to £2 million - Legal protection up to £10,000 available Common horse racing terms Below is a list of common horse racing terms and their meanings – master them and you’ll seem like a seasoned pro at your next horse event. A race that’s called off or racecourse that’s been closed, typically due to bad weather. Races that take place on an artificial racing surface, hence why they are all-weather. Britain has five all-weather tracks, explains Great British Racing, which are: Chelmsford, Lingfield, Southwell, Kempton and Wolverhampton. Fibresand, Tapeta and Polytrack are the three types of artificial surface used for such events. A jockey who isn’t classed as professional and doesn’t collect a fee for taking part in a racing event. Their racecard will contain a prefix such as Captain, Miss, Mrs or Mr, for instance. A trainee jockey for flat races who has links with the stable of a licensed trainer. Weight limits apply to apprentices when they take part in races against professional jockeys. They are able to compete for the Apprentice title, awarded to the person with the most wins under their belt come the end of the season. The common term used to describe the stable area. These are the accessories used to minimise a horse’s field of vision. They are meant to prevent the animal from swerving into other horses or objects located on its right or left side. Also known as ‘blinds’. When a horse race is so close at the end that you could (in theory) position a single blanket across the two horses. In the event of a blanket finish, the race judge will typically use a photo to decide which horse came first. When a horse is unable to get a clear run because other horses are too close to them during a race. A horse that becomes injured during a race. Remember that you need horse insurance that covers your equine for racing before entering them into any type of event of competition. Flat races which take place under jump rules. Prospective, young jumps horses take part before they move to fences or hurdles. This is officially known as the National Hunt flat race. When an extension is made on a racecourse in order to enable a straight run at the start of the race – the chute is typically added to the top of the home straight. The jackets (or ‘silks’) jockeys wear in order to identify the horse. A horse participates in a race in its owner’s colours which are displayed on racecards and registered with Weatherbys. An event that permits horses to have extra weight due to things such as age, sex or whether they have won a race previously. The people associated with a certain horse, including the trainer and owner. Two horses that finish a race at exactly the same time. A notification from a trainer to the racing body that they intend to run a horse in a certain race – this usually happens at the 48-hour or 24-hour stage before the event. The position a horse starts at on the flat in the stalls. Weatherbys draws the stall number for each horse at random. The only exception is in a number of top races where the connections of every horse, having been selected randomly, get to pick their stall. The phrase “well drawn” is used to describe a horse which ends up in a favourable stall. When odds for a certain horse get bigger just before a race is about to begin because of a lack of market support. The horse in questions may be described as being “on the drift”. When stewards review a race to assess a potential infraction of the rules. A course announcement will be made if it is thought that the enquiry will impact the race result. When a bet will result in equal winnings – so, a £20 stake at evens will win you £20, meaning a total return of £40. As the name suggests, these are races carried out on flat surfaces. The turf season is the main part of the flat racing season, which takes place from late March to early November. The introduction of all-weather courses have meant that flat racing can take place all year round. The race record of a horse. This will be marked by figures (as well as letters) by its name on the racecard (1 equals first, 2 equals second, etc.). The numbers are read from right to left, so a horse’s most recent run has the associated figure right next to its name. When a horse’s running style is to try to lead or get near to leading at the beginning of a race and remain there for as long as possible. Equivalent to one eighth of a mile or 220 yards. Racecourses contain numbered posts which denote the furlongs back from the winning post. The ground where trainers exercise the horses. The majority of trainers have their own, private gallops, though there are some major training centres in Britain including Lambourn (mainly jump), Newmarket and Malton (mainly flat). Used to describe the surface of the racecourse, which can range from heavy to firm. When horses are being taken to the start. The abbreviation for the 1,000 Guineas or the 2,000 Guineas – both classic and famous horse races. If a horse is deemed capable of entering either of these races then they may be referred to as a ‘Guineashorse’. Group 1 / Grade 1 The highest race category of all flat and jump races. Britain’s classic flats, like the Gold Cup at Royal Ascot, are Group 1, while key championship jump races like the Cheltenham Gold Cup are classed Grade 1. A race where every individual horse is permitted a different weight to carry, in line with official handicap ratings set out by the BHA Handicappers. In theory, this should ensure that every horse is able to run on a fair and equal standing – the ‘perfect’ handicap would see a scenario where all horses crossed the finish line in a dead-heat. Once a horse has run a few times, the BHA will give it an official handicap rating, which will then be used to decide its weight if it runs in a handicap. A horse that performs well will see its handicap go up, and it will go down if it performs badly. The official person who allocates handicap ratings is known as the handicapper. Events that happen during the course of a race. It’s possible to bet on the race outcome during the actual race (rather than before), which is known as in-running betting. When a jockey is replaced by another rider on a horse he typically rides, or for a certain event he’s booked to take part in. A style of tote betting when the person betting must correctly pick the winning horse of every listed race in order to win. A course that sees horses running anti-clockwise. The unit used to measure the distances between horses at the end of the race. Also the measurement of a horse from its head to its tail. A surcharge bookmakers pay, in line with their gross profits, which is put towards things like racecourse improvements and prize money. A horse that hasn’t yet won a race. The shortest distance a race can be – this is two miles over jumps or five furlongs on the flat. A horse that has been withdrawn from a race it was originally going to run in. Over the top When a horse is thought to be past its prime because of too much training and/or racing and needs to rest. Off the pace When a horse is a significant distance behind the horses at/near the front during a race. Prior to a race, horses usually line up in numerical order (i.e order of their racecard) and are taken to the front of grandstands for spectators to see them. When the end of a race is so close, the judge examines a photo taken by a camera positioned on the finishing line to determine the actual winner. The day’s racing programme, which displays the runners, riders and times of each race taking place. A measurement of a horse’s ability, starting from zero and going up to three figures. The best rated jumpers are usually in the 180s, while the best flat racers are in the 130s. The person who loads each horse into their designated stall. A stayer is a horse skilled in racing long distances on flat surfaces. If a horse has a strong finish in a race, this usually means they have good stamina and will be described as “staying on”. Many courses present a ‘best turned out’ award for the horse that officials believe is best presented while in the paddock. This phrase can also describe a horse taking a break from training/racing and is out in the fields. Turn of foot This is a horse’s ability to accelerate in the latter part of a race. A horse that has a good turn of foot means it has a decent speed at finish. A horse that’s not expected to win a race. The person who prepares the jockey equipment. Jockeys have to stand on official scales with their racing kit and saddle before and after each race. This allows officials to determine whether they are carrying the right weight allotted to the horse they are riding. Horse insurance from Equesure At Equesure, we understand the sheer passion horse owners have for their animals. While it is no doubt a huge responsibility, it is also incredibly rewarding and arguably one of life’s greatest pleasures. Our job is to help you protect your investment by arranging horse insurance to match your unique requirements. We can provide you with a competition horse policy that covers horses or ponies competing at affiliated or unaffiliated events. Cover is based on the activity itself, as certain events are classed higher risk than others. When you get a quote from Equesure, it’s important to give details of the level of activity you are participating in. That way, we can be sure that we match you with the right policy for you and your horse’s needs. So, whether you are keen to get involved in horse racing or other equine events, or simply want to make sure your animal is protected, get a quote from Equesure today. Policy benefits, features and discounts offered may very between insurance schemes or cover selected and are subject to underwriting criteria. Information contained within this article is accurate at the time of publishing but may be subject to change.
<urn:uuid:4c85fe58-7a58-4cbd-9ba2-0c9df7749185>
CC-MAIN-2021-43
https://www.equesure.co.uk/contact-us/news-events/horse-terminology-explained/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00550.warc.gz
en
0.961143
2,663
2.515625
3
Otelo Nuno Romão Saraiva de Carvalho died last month. As a young army major, Otelo planned and coordinated the military coup of 25 April 1974 against the Estado Novo dictatorship in Portugal, despite the fact that the army had previously been one of its main pillars of support. What Otelo could not foresee was that the masses would surge onto the stage of history through the breach that the 25 April coup created at the very core of the bourgeois state. This date therefore also marked the beginning of the Portuguese Revolution. Since then, a myth has been concocted that the Portuguese Revolution was solely down to the actions of a handful of benevolent military officers. This falsehood conveniently sidelines the key role of the masses, whose actions were decisive in determining the course of the revolution. Otelo and the MFA Otelo Saraiva de Carvalho was born in Portuguese Mozambique in 1936 to a lower-middle-class Luso-Goan family. He enrolled in the Military Academy in Lisbon aged nineteen and moved up the ranks of the army in the course of the colonial wars in Angola and Guinea-Bissau. It was in the course of these campaigns that a profound anti-war sentiment developed among not only the ordinary soldiers, but also the middle layers of the officer caste. These sentiments clearly affected Otelo. Whilst the wars were increasingly becoming a lost cause for the Portuguese military, the decaying Estado Novo regime was clinging desperately to the colonies that it occupied as a bulwark of its rule, in both an economic and geopolitical sense. Something had to give. The final straw came when the regime announced that university graduates installed as officers in the army could be fast-tracked for promotion. This was one kick in the teeth too many for the career military men from the Academy. Not only were they fighting an unwinnable war with an utterly demoralised, and often mutinous army, they now found their career paths in the army blocked by the government. The only way they could look was down, at the discontent brewing in the ranks beneath them. From here rose the Movimento das Forças Armadas (MFA), the Armed Forces Movement: a group of officers whose leadership developed around Vasco Lourenço, the communist-influenced Vasco Gonçalves, and the master-strategist, Otelo. It began preparing a military insurrection against the 48-year-old dictatorship. The coup and the revolution The coup intended to overthrow the dictatorship, and to somehow resolve the colonial war in Angola, Guinea-Bissau, and Mozambique, which included plans to renew the subjugation of the colonies by less direct means. One of its main protagonists – we might even call him a hero of that event – was Major Otelo Saraiva de Carvalho, who, alongside the many others who joined him, risked his career and even his life on 25 April. But the Portuguese workers did not remain passive during these events. Despite the instructions of the MFA to stay at home, millions of men and women took to the streets to take their destinies into their own hands. After the MFA fearfully handed power to António de Spinola and the other Generals of the Junta de Salvação Nacional (National Salvation Junta, which assumed effective political leadership of Portugal after the coup), the masses did not wait for the latter to decide their fate. Instead, they attacked the PIDE (secret police); freed political prisoners, and in the following days and weeks began vying for control of the factories, workplaces, and barracks. Among the figures of 25 April mythologised by the ruling class, we find sworn enemies of the revolution. It ought to come as no real surprise that the current António Costa government invited the Thermidorian General and former President António Ramalho Eanes to chair the commission charged with commemorating the 50th anniversary of 25 April. This is the man who crushed the left-wing of the MFA during their attempt to seize power on 25 November 1975. However, there were key actors in the MFA leadership who were genuinely drawn to the mass popular movement, precisely at the moment when the latter was seeking a way to realise its aspirations. Otelo was one such figure, whose sympathy for the revolution only grew as the pressure of the masses increased. The role these officers had played in ending the Estado Novo regime meant that the same MFA leaders found themselves holding the reins of power precisely when a movement of millions of exploited and impoverished people was out in the streets and in the fields. Although the coup leaders initially handed power over to their military superiors, wave after wave of the revolutionary movement pushed them to go far beyond their initial plans. They were pushed increasingly to the left. The absence of a revolutionary leadership among the main workers’ parties prepared to lead the workers, youth, and peasantry to the direct seizure of power only reinforced the sense of revolutionary authority thrust upon figures like Otelo. The fundamental factor driving events was the objective need for a social transformation to clear away the old order. This was above all expressed by the movement of the masses. For their part, the young military officers were ultimately balancing between the class forces in society. On the one hand, they filled the vacuum left by the old bourgeois regime, which had disintegrated after the slightest push. On the other hand, they were compelled to carry out measures that benefitted the struggling masses, not least to mitigate the economic crisis exacerbated by the counter-revolutionary measures of the big capitalists. But whilst the transitional governments were forced to cede repeatedly to the will of the masses during the revolutionary process, the lack of a clear, conscious revolutionary leadership meant this process could not be carried through to the end. In the course of a revolution that they simply did not understand, these young officers simply ended up “giving the gold to the bandit”, as they saw it. Otelo and COPCON Otelo and the soldiers around him played a contradictory role after 25 April. Following the coup, with the PSP [police] completely paralysed, and the GNR [national guard], hated and unable to intervene, the ‘COPCON’ was created. This was a centralised military command encompassing all the special units of the armed forces. Its aim was to maintain order – its commander was Otelo. COPCON was used on numerous occasions against the workers, in accordance with its stated aim. It is enough to remember the intervention against the strike of TAP workers in August 1974, in which troops commanded by Jaime Neves occupied the premises, with all the workers being placed under the jurisdiction of the Military Discipline Regulation (RDM). Under that RDM, 200 workers were dismissed, and seven were called on to testify before the military authorities. We could also recall the siege of Lisnave, when roads were blockaded in September 1974 to prevent Lisnave workers from marching to Lisbon. Or when COPCON was sent in to disperse the demonstration of construction workers that had surrounded the Constituent Assembly in November 1975. In general, however, the mass movement was too powerful for open repression to be conducted on a larger scale. ‘Order’ – as the officers conceived it – could not be established and maintained in the course of the revolution. Despite ostensibly playing the role of armed bodies of men for the protection of the capitalist order, the soldiers, who were in daily contact with their fellow workers in struggle, felt an irresistible sympathy and attraction to the latter and often refused to intervene. More often than not they ended up fraternising with the same workers. This atmosphere of class solidarity also had an effect on Otelo and others who had taken up key positions in the state. Otelo often took some action with the intention of limiting the movement of the class struggle in some way, but ended up riding an even greater wave of struggle that ensued. There were even instances – particularly in the land occupations of the Alentejo – when COPCON would be used to defend workers and peasants against strikes of capital. This was necessary in a sense to prevent wider damage to the Portuguese economy, but it also exemplified the manner in which the bonapartist MFA would occasionally substitute itself for both the armed, independent working-class movement, as well as for the now collapsed bourgeois state in the course of the revolution. Otelo and the revolution Otelo concentrated enormous political and military power in his hands. In addition to commanding COPCON, he was also part of a short-lived triumvirate composed of Generals Costa Gomes (president of the republic), Vasco Gonçalves (head of the government), and himself. This triumvirate was Portugal’s highest authority for a time. However, in the end he ended up using all the power that he had concentrated in his hands to lead COPCON in its actions against the workers, and to reinstate the Thermidorian Colonel Jaime Neves, who would later lead the crushing of left-wing regiments that attempted a rising on 25 November 1975. The tumult of the revolution pushed the officers who had led the coup into conflict with one another. The MFA was an amorphous body created for the specific purpose of conducting the 25 April coup. It had no single, organic social base within society, and under the pressure of the revolution, it began fracturing and splitting apart, roughly along class lines. Some shifted further to the right, even conspiring to conduct coups d’etat against the revolution. Others, such as Otelo, moved to the left, often demonstrating sympathy for the popular movement. For this reason, the right hates him. This is the same hypocritical right wing that, throughout the revolution, conspired to commit and actually committed terror attacks on the headquarters of leftist parties and trade unions; murdered leftist militants; organised armed militias of ex-PIDE [secret police] officers and far-right thugs, and that sought to convince the dying dictator of Spain, Franco, to intervene and drown the Portuguese Revolution in blood. However, in the absence of a revolutionary leadership and given the policies of the PS (Socialist Party) and PCP (Communist Party), even this mighty revolution was not enough to break the military hierarchy and the ties between officers, forged in Africa during the long commissions in the colonial war. On 25 November 1975 – the “Thermidor” of the Portuguese revolution, in which the right wing of the MFA moved against the left – Otelo abandoned his commanders, went home and surrendered in Belém to General Costa Gomes, president of the republic and former supreme head of the armed forces of the dictatorship, ending up in detention. Despite his sympathies with the mass movement, Otelo never stood fully and unambiguously on the side of the working class, and was ultimately defeated by the most reactionary wing of the MFA. However, many among the ruling class will never forgive Otelo for precipitating a revolutionary movement of millions that brought capitalism in Portugal to the brink of destruction. Correctly or incorrectly, this is what he continues to represent in the eyes of many on the left, and this is the part of his legacy we defend. So, at the time of his death, let us honor the brave officer who helped to bring down the dictatorship. But as we pay respects to the man, let us also bury the myth.
<urn:uuid:d35d3594-8700-417a-9eec-f98cd7141389>
CC-MAIN-2021-43
https://www.marxist.com/portugal-the-death-of-otelo-defend-the-revolutionary-legacy-bury-the-reactionary-myth.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00110.warc.gz
en
0.978732
2,376
2.671875
3
Ask them to close their eyes and mingle randomly in the area until you say “STOP.” Explain that everyone must keep their eyes closed until they are tagged on the shoulder. To start, you will tap one person at random who must then quickly open their eyes and attempt to name and tag another person in the group. This process of naming and tagging is repeated until everyone has been tagged. Encourage people who are tagged to step back out of the group to ensure they don’t get tagged again. Play several rounds, with ample time for discussion between attempts, to record the quickest time. Video Transcript for Speedy Name-Game presented by Mark Collard Here’s how it works. In a moment I’m going to ask you to simply mingle about the area, but as you do it, I’m going to ask you to have your eyes closed, just for five to ten seconds until I say stop. And you’ll mingle about, maybe suggesting you have your bumpers up. So you’ll be bumping in, mingling, basically mixing yourselves up. You’re going to be completely random position, just in the space here. Having said stop, I will then ask you to keep your eyes closed. I will come up and then randomly just simply tag the shoulder of one person, in this case it might have been Jack. As I do that the person whom I’ve tagged will immediately open their eyes. They will then need to find someone who has their eyes closed, obviously, and tag them. But before they tag them, they must call their name first. It’s a competitive exercise to see how quickly we can run through the ten names in this group as quickly as possible. Now I know because of the stress involved when you open your eyes and all you have to do is quickly say a name, everything falls apart and you can’t find a name that you know. So it will be a matter of just finding someone you do know. You may even need to move to the other side of the group to tag the person whom you still remember the name of. We keep going until all people have been tagged. Once you’ve been tagged you can open your eyes to tag somebody else. Step back out of the group so it’s quite clear those who are left are still involved in the exercise. So to repeat, in a moment I’m going to ask you to have your eyes closed, mingle up, keep them closed, I’ll tag someone. That person will start the time, they’ll open their eyes and immediately, quickly tag another person but having first call their name. So it’ll be like “SAM” and then I tag Sam. He will then open his eyes and then try the same process until we get to the very last person. Last person, they don’t have to do anything until just be tagged. Can I ask you bumpers up, and start mingling just in your little spaces here, moving about, around different people. Feel free to move about. Move to the other side. That’s it. Alright, and stop. Now you’re not going to be moving any further now except for when you’ve opened your eyes. You can now place your hands by your side with your eyes still closed. Okay, I’m about to tag the very first person. This will be the only person who can open their eyes. Don’t open your eyes until you’ve been tagged. Time starts now. John. (people tagging each other, calling names as part of Speedy Name-Game) Alright. Not bad. You had nowhere to go, Brent. There was no one left. That was fantastic. It’s great to be last one to be tagged. 21.9 seconds. Not bad. But I know all the other groups are going to see at halftime and go ‘So what did you get?’ And they’re going to feel a little bit competitive nature here. So clearly we get to do this a couple of times. So are you ready? Bumpers up. Start mingling. (people mingling about to start Speedy Name-Game) And stop. Hands down. Remember, same thing, I’m about to tag one person and then they will start. Everybody ready? Brent. Step out once you’ve been tagged. (people tagging each other, calling names with Speedy Name-Game) Alright. bunch on back in. (We totally beat our time.) We should just check, has everyone been named correctly? (When you’re not named correctly do you move or stay? What should you do, just stay and wait?) Yes, you could do that and that’s effectively what would happen or perhaps in my case I would suggest to you that got that one wrong, we either reset or try again. Okay, 18.1 seconds, new time record. How To Play Narrative This is an excellent challenge for a group of people who know each other well. Start by asking everyone to close their eyes and raise their Bumpers Up. When ready, ask them to mingle towards the centre of the area keeping the eyes closed at all times, so that they have mixed themselves as randomly as possible. After a short time of mingling, instruct your group to “STOP” and remain standing with their eyes closed (they may drop their bumpers now.) Explain that in a few moments, you will tap the shoulder of one person at random. This person will then quickly open their eyes and attempt to name and tag another person in the group as quickly as possible. This process of naming and tagging repeats itself over and over until everyone has been tagged. Announce that you will record the time it takes from the first person you tap to when the last person is named and tagged. To assist the newly-sighted person, ask every person who has been named and tagged to remove themselves from the area quickly, so as to not be confused with those who have not been tagged yet. Encourage your group to pause often and discuss strategies to improve their time. Play several rounds to record the fastest time. Practical Leadership Tips Naturally, your group needs a reasonable level of name-knowingness to be successful at this exercise. Do not introduce this to a just-met group of people. Watch for the annoying inclination of people tagging someone before they have named them. It is important that people are named and then tagged (it increases the pressure to perform considerably.) Note, it is often necessary to remind your group to step out of the play area as soon as they have been tagged. On occasions, you may want to check that everyone was named correctly. If not, then call that attempt as ‘unofficial’ and try again. Or, instruct your group to not open their eyes until they have been named correctly. Admittedly, this is difficult, because everyone’s inclination is to open their eyes as soon as they have been tagged, even when the wrong name has been called. In a situation where one person cannot correctly name any of those remaining with their eyes closed, stop the activity and ask the group to solve this ‘problem.’ It is possible, some embarrassment will ensue for the poor soul who got stuck, but encourage your group to focus on this being a group problem to solve, and to not view this person as the problem. Be sure to wait until your group has adequately mingled to mix themselves. Otherwise, you may end up with clumps of friends or people who know each other well standing close to each other. Wide Game: Once mingled, ask everyone to move away slowly from the centre of the area, so that the distance between each person increases. This also adds an aerobic element to the exercise. Sequence Tag: Instruct your group to name and tag everyone in a particular sequence, eg all the boys first, or those wearing a dark top, or those with first name starting with A to K, etc. Works best if this sequence is announced after everyone has closed their eyes. Rapid Fun: Take a look at Turbo Name-Game to play a similar exercise presented as a fun name-game. You Might Also Like... Simple communication exercise to foster creativity. Blindfold group initiative to sharpen listening skills. Imaginary Toss-A-Name Game Creative name-game that inspires fun & imagination. Useful Framing Ideas Okay, you may think you know everyone in this group, but under pressure, how quickly could you name every person? This simple problem-solving activity will determine how good your name-knowing skills really are… Have you ever suddenly been approached by someone you know, but just can’t think of their name? It happens to all of us, some more than others. Each of you will have an opportunity to hone this name-knowing skill, but together, this next exercise will challenge your group to seek a quick solution… Reflection Tips & Strategies Coupled with one or more reflection strategies, here are some sample questions you could use to process your group’s experience after playing this fast-paced group initiative: After the first attempt or two, what did you learn to help improve your group’s time? How many ideas were suggested, and did you trial them all? Why or why not? Do you think luck was a variable in your success, or otherwise? In what ways did you attempt to influence the result? What does this say about your group? The inspiration for Speedy Name-Game, and many more innovative team-building exercises, was sourced from Karl Rohnke, who first demonstrated this exercise to me.
<urn:uuid:156bab1c-ad38-4635-9f1d-bd49d7ee1934>
CC-MAIN-2021-43
https://www.playmeo.com/activities/team-building-problem-solving-activities/speedy-name-game/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00510.warc.gz
en
0.963522
2,086
3.03125
3
|Built by||Ahirs, Malik Raja Faruqi| |Stone, Lime and Lead| |Govt. of India| |Occupants||Ahirs, Faruqis, Holkars, British| |Events||Battle of Thalner (1818)| Thalner (Marathi language: थाळनेर), the first capital of the Faruqi kings, stands on the Tapi river, in Shirpur tehsil about 46.67 km. (28 miles) north-east of Dhule in the Maharashtra state of India. It was fortified by a strong fort which played a very significant role in the history of Khandesh. Situated on the banks of the Tapi and the foot of the fort is an old stone built temple dedicated to Thaleshwar. The name Thalner probably derived from this old temple of Thaleshwar. In the heyday of the Gavali or Ahir kings, Thalner was at the height of its prosperity and was an important commercial centre on the Surat-Burhanpur road. Today it is just a small village which lost its glory to history. The fort is described as with one side rising out of the Tapi and the three other sides surrounded by a hollow way, varying in width from 91.44 to 137.16 metres (100 to 150 yards). The walls rise to the height of about 18.28 metres (60 ft.) above this hollow and the interior had the same elevation. The only entrance was on the eastern side and secured by five successive gates communicating by intricate traverses, whose enclosure gradually rose to the height of the main wall. A winding ramp interspersed in some places with steps, ascending through the gate in to the terreplein of the rampart. Great ingenuity had been exercised to make this part as strong as possible apparently under the idea that the profile of the rest rendered it secure, notwithstanding the absence of a ditch. Today only a small portion of the walls that were on the river side is standing, the others having collapsed for the most part. Even of this wall one of the bastions was ruined by the great floods of the Tapi which took place in 1876, and a tunnel opened in which a small, well executed idol of Vishnu was found. Situated on the banks of the Tapi and the foot of the fort is an old stone built temple dedicated to Thaleshwar. Its 1.828 X 1.828 metre vestibule contains a small ling symbol. It is crowned by a 7.62 metre (25 ft.) high shikhar According to a local grant, in the beginning of the twelfth century (1128), while the country for 32.18 km. (20 miles) round was ' without a light', and twenty-seven of its forts were deserted, Thalner prospered under Javaji and Govaji of the Tale sub-division of Gavalis or Ahirs. At that time, Daulatrao, son of Bajirao of Daulatabad came to the people of Khandesh, and finding Thalner flourishing established Javaji's family as headmen of the town. Late in the fourteenth century (1370) when Firozshah Tughluq (1351–1388) granted Malik Raja Faruqi an estate on the south border of Gujarat, Malik chose Thalner as his headquarters. In the following year (1371), defeated by the Gujarat king, Malik was forced to take refuge in Thalner fort. On his death in 1399 Malik left Thalner to his second son Iftikar Khan. But in 1417 with the aid of the Sultan of Malwa, Nasir Khan, the elder son, wrested it from his brother. In 1498 Thalner was invaded by Mahmud Begada, king of Gujarat, whose army laid waste the district and would not retire till arrears of tribute were paid. In 1511 Mahmud Begada granted Thalner with about one-half of Khandesh to Malik Hissamuddin a noble of his court. But in the next year, Hissamuddin was murdered and Thalner restored to Khandesh. In 1566 it was the scene of the- defeat of the Khandesh king Miran Muhammad Shah II by Changiz Khan of Gujarat. In 1600, when it passed to the Emperor Akbar, Thalner is noticed as being of great strength though in a plain. In 1660 Tavernier mentions it as one of the places of trade on the Surat and Burhanpur line. In 1750 it was a strong fort, the centre of thirty-two little governments. Shortly after it passed to the Peshwa, and was by him made over to Holkar, who about 1800, pledged it to the Nimbalkars. It was recovered in the following year and kept by the Holkar family till in 1818 under the terms of the Mandesar treaty, it was handed over to the British. Battle of Thalner (1818) Sindva, was a place with much greater name for strength in Khandesh region, but it surrendered to the British at once, hence no resistance was expected at Thalner. But its capture proved one of the bloodiest incidents in the conquest of Khandesh. Blacker gave the following detailed account of the conquest . When in 1818 Sir Thomas Hislop, the British general, came to take possession, the garrison began hostilities by firing matchlocks at the palanquin of a sick officer, and at the same time opened fire with a gun on the head of the baggage, then entering the plain. A summons was sent to the commandant, and a close reconnaissance of the place was made. The party descended into the ravines surrounding the fort, and from there ascended into the town driving out a small party of the enemy. As it was ascertained that the enemy had no guns on the western face, where there was water and comparatively clear ground on the river bank, General Hislop resolved to encamp there, and attack the place from the north-east angle. With this object two five and a half inch howitzers with ten six pounders, the only guns in the camp, were moved down the beds of the ravines. They were then carried to positions in the town, where the houses gave tolerable cover to batteries which opened within 273.403 and 328.083 metres (250 and 300 yards) of the north-east angle of the fort. In a few hours, during which, by the well aimed fire of matchlocks from the walls, several casualties had occurred, the enemy guns were nearly silenced, but no progress had been made in reducing the garrison, who it was thought, would surrender as soon as any serious demonstration was made against them. Further examination showed that the outer gate was in a ruinous state, and promised cover in traverses, while a commanding position immediately opposite to it overlooked the nearest defences. For these reasons it was determined to attack the gates. Two guns were opened on the traverses, with considerable effect, while two others were, by a detour, brought to a position whence, with the view of blowing it open, they might easily be run up to the gate. At the same time a storming party, was brought down to the same place. Indifferent as the enemy had hitherto been, the preparations against the gate did not fail to alarm them and they sent out to demand terms of capitulation. In reply they were told that unconditional surrender would alone be accepted; and they were invited to avail themselves of this offer before the assault on the gates should begin. The evening was now advanced and the enemy probably trusted to the approaching darkness for an opportunity of abandoning the place. To prevent this the guns and storming party were ordered to advance to the gate. This was done without loss. It was found that in consequence of its ruinous state there was a passage for single files between the wall and the gate frame; and no opposition being offered from within, the storming party, followed by the pioneers, entered, though tediously, without difficulty. After the passage of the storming party endeavours were used to blow open the outer gate that the guns might be advanced to the remainder. But before that was effected the storming party had passed through the second gate without opposition. At the third it was met by the commandant, with a number of artificers whom he had on the previous evening forced in. Lieut. Colonels Conway and Murray, with several others, had entered with the storming party, and it was still doubtful whether resistance would ultimately be made, for at this time there was none. They accordingly passed through the fourth gate, which, as well as the second, appeared so much out of repair as to be incapable of being shut; but at the fifth or last gate they were stopped though the wicket was opened. A hurried conversation about the terms of surrender now took place. It was probably little intelligible under the circumstances of noise and apprehension which attended it. Colonel Murray, in this state of uncertainty, concluding that there was an urgent necessity for establishing a footing such as would secure eventual success of the attack, should the enemy hold out, entered by the wicket with Major Gordon and their grenadiers; but refrained from drawing his sword, to show that he had no intention of breaking the parley. He expected to be followed by as many men as should be able to maintain themselves in a confined situation; but four or five persons only had got in, when the enemy, apprehending the consequences, attacked most furiously, and in a moment laid them all dead, except Colonel Murrav, who, covered with wounds, fell towards the wicket. They then attempted to close the wicket, but their efforts were rendered ineffectual by a grenadier who thrust his musket into the aperture, While Lieut. Colonel Mackintosh and Captain Mac Craith forced it open. In this state it was held while, the Captain with one hand was dragging Colonel Murray through it, and warding off blows with his sword in the other. A fire was now poured in through the wicket, which cleared the gateway sufficiently for the head of the storming party, under Major MacGregor of the Royals, to enter; and the place was carried without further difficulty, but at the expense of that officer's life.[ Two tombs, erected to the memory of the officers killed, bear the following inscriptions; No. I " Here lie entombed the remains of Major R. Mac Gregor. of H. M's Royal Scots, who fell in the assault and storming of this fort on the 27th Feby. 1818." No. II "Here lie entombed the remains of Major.1. Gordon, of H.M.'s Royal Scots, who fell in the assault and storming of this fort on the 27th February 1818"..] As soon as the supporting detachment could open the gate, many troops poured in, the garrison was shortly put to the sword, and the commandant was hanged on the same evening to a tree on the flagstaff tower. The enemy lost about 250 men killed, the British loss was twenty-five. According to a local story some of the garrison escaped by leaping into the river from the battlements, with bundles of ivari stalks in their arms. A somewhat different account, severely blaming Sir T. Hislop for hanging the commandant, is given in the summary of The Maratha and Pendhari Campaign (1820) The fort of Thalner is in a dilapidated condition. Besides the tombs of Major MacGregor and Captain Gordon, the chief objects of interest are ten Muhammedan domed tombs of common country black stone and two of burnt brick. Of the whole number, one is eight cornered and the rest are square. They vary in size from eleven feet by eleven to three and a half feet square. Though more or less damaged outwardly and with the inside part of their domes partly destroyed, they are in good order. The eight-cornered tomb has some Arabic writing, but so worn as to be unreadable. According to the local story they were built by a saint. But there seems little reason to doubt that they are the tombs of the Faruqi kings, of whom four; Malik Raja (1396), Malik Nasir (1437), Miran Adil Khan (1441) and Miran Mubarak Khan (1457), were buried in Thalner. Inside there are also a few wells which once supplied water to the garrison, but now they are dry. Much of the earth from inside the fort has been utilised by the villagers in building houses. In Thalner there are two temples,one is Lord Mahadeva's and Second one is Lord Khandoba's Temple. Lord Mahadeva's temple is located at tapi riverside, and Khandoba temple is located near to Thalner Bus Stand. Khandoba, (Marathi: खंडोबा,Khaṇḍobā) also known as Khanderao, Khanderaya, Malhari Martand and Mallu Khan is a regional Hindu deity, worshipped as Mārtanda Bhairava, a form of Shiva, mainly in the Deccan plateau of India. He is the most popular family deity in Maharashtra. He is also the patron deity of warrior, farming, herding as well as some Brahmin (priest) castes, the hunters and gatherers of the hills and forests. The cult of Khandoba has linkages with Vaishnava and Jain traditions, and also assimilates all communities irrespective of caste, including Muslims. Khandoba is sometimes identified with Mallanna of Andhra Pradesh and Mailara of Karnataka. The worship of Khandoba developed during the 9th and 10th centuries from a folk deity into a composite god possessing the attributes of Shiva, Bhairava, Surya and Karttikeya (Skanda). He is depicted either in the form of a Lingam, or as an image riding on a bull or a horse. The foremost centre of Khandoba worship is Jejuri in Maharashtra. The legends of Khandoba, found in the text Malhari Mahatmya and also narrated in folk songs, revolve around his victory over demons Mani-malla and his marriages There is one festival in Hinduism call Champa Shashti which comes exactly after one month of Diwali Festival. Deshasth Brahmans and Marathas observe the Champasashthi festival every year in honour of Khandoba. The festival begins on the bright half of the Hindu month of Margshirsha. The images of Khandoba and Malla are cleaned and worshipped. For six days a fast is observed. On the seventh day the worshippers break their fast by a feast known as the Champasashtliiche parne. An invitation to this feast is regarded as an invitation from the god Khandoba himself and is harder to refuse. An important part of the Khandoba-cult is navas, a vow to perform service to the god in return for a boon of good harvest, male child, financial success etc. On fulfilment of the navas, Khandoba was offered children or some devotees would afflict pain by hook-swinging or fire-walking. This type of worship using navas is called Sakama Bhakti - worship done with an expectation of return and is considered "to be of a lower esteem".But the most faithful bhaktas (devotees) are considered to be greedy only for the company of their Lord, Khandoba is also called bhukela - hungry for such true bhaktas in Martanda Vijaya. Boys called Vāghyā (or Waghya, literally "tigers") and girls called Muraḹi were formerly dedicated to Khandoba, but now the practice of marrying girls to Khandoba is illegal. The Vaghyas act as the bards of Khandoba and identify themselves with the dogs of Khandoba, while Muralis act as his courtesans (devanganas - nymphs or devadasis). The Vaghyas and their female counterparts Muralis sing and dance in honour of Khandoba and narrate his stories on jagarans - all night song-festivals, which are sometimes held after navas fulfilment. Another custom was ritual-suicide by Viras (heroes) in the cult. According to legend, an "untouchable" Mang (Matanga) sacrificed himself for the foundation of the temple at Jejuri to persuade Khandoba to stay at Jejuri forever. Other practices in the cult include the belief that Khandoba possesses the body of a Vaghya or devrsi (shaman). Another ritual in the cult is an act of chain-breaking in fulfilment of a vow or an annual family rite; the chain is identified with the snake around Shiva's neck, which was cut by the demons in the fight. Another rite associated with the family duties to please Khandoba is the tali bharne, which is to be performed every full moon day. A tali (dish) is filled with coconuts, fruits, betel nuts, saffron, turmeric (Bhandar) and Bel leaves. Then, a coconut is placed on a pot filled with water and the pot is worshipped as an embodiment of Khandoba. Then, five persons lift the tali, place it repeatedly on the pot thrice, saying "Elkot" or "Khande rayacha Elkot". Then the coconut in the tali is broken and mixed with sugar or jaggery and given to friends and relatives. A gondhal is performed along with the tali bharne.A gondhal is a ritualistic folk art in which the performer Gondhalis invoke the deities. Friends you will get the Khandoba festival images soon in same link Lata Mangeshkar's mother affectionately called 'Mai' was from Thalner. She was the daughter of Seth Haridas Ramdas Lad - a prosperous businessman of the town of Thalner. - List of forts in Maharashtra - "Dhulia". The Gazetteers Department of Maharashtra. http://www.maharashtra.gov.in/english/gazetteer/DHULIA/places_Thalner.html. |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:84efc166-7a05-44a1-8692-37b05d5aba6d>
CC-MAIN-2021-43
https://military.wikia.org/wiki/Thalner
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587719.64/warc/CC-MAIN-20211025154225-20211025184225-00070.warc.gz
en
0.974373
3,906
2.59375
3
In today’s world, we are constantly bombarded with messages both good and bad. No matter where you live, where you work or go to school, or what kinds of media you use, you are probably exposed to hundreds. if not thousands, of advertising messages every day. Researcher Norman W. Edmund estimates that by 2020 the amount of knowledge in the world will double every seventy-three days.Edmund, N. W. (2005). End the biggest educational and intellectual blunder in history: A $100,000 challenge to our top educational leaders. Ft. Lauderdale, FL: Scientific Method Publishing Co. Because we live in a world where we are overwhelmed with content, communicating information in a way that is accessible to others is more important today than ever before. To help us further understand why public speaking is important, we will first examine public speaking in everyday life. We will then discuss how public speaking can benefit you personally. Every single day people across the United States and around the world stand up in front of some kind of audience and speak. In fact, there’s even a monthly publication that reproduces some of the top speeches from around the United States called Vital Speeches of the Day (http://www.vsotd.com). Although public speeches are of various types, they can generally be grouped into three categories based on their intended purpose: informative, persuasive, and entertaining. One of the most common types of public speaking is informative speakingSpeaking with the purpose of sharing knowledge or information with an audience.. The primary purpose of informative presentations is to share one’s knowledge of a subject with an audience. Reasons for making an informative speech vary widely. For example, you might be asked to instruct a group of coworkers on how to use new computer software or to report to a group of managers how your latest project is coming along. A local community group might wish to hear about your volunteer activities in New Orleans during spring break, or your classmates may want you to share your expertise on Mediterranean cooking. What all these examples have in common is the goal of imparting information to an audience. Informative speaking is integrated into many different occupations. Physicians often lecture about their areas of expertise to medical students, other physicians, and patients. Teachers find themselves presenting to parents as well as to their students. Firefighters give demonstrations about how to effectively control a fire in the house. Informative speaking is a common part of numerous jobs and other everyday activities. As a result, learning how to speak effectively has become an essential skill in today’s world. A second common reason for speaking to an audience is to persuadeThe intentional attempt to get another person or persons to change or reinforce specific beliefs, values, and/or behaviors. others. In our everyday lives, we are often called on to convince, motivate, or otherwise persuade others to change their beliefs, take an action, or reconsider a decision. Advocating for music education in your local school district, convincing clients to purchase your company’s products, or inspiring high school students to attend college all involve influencing other people through public speaking. For some people, such as elected officials, giving persuasive speeches is a crucial part of attaining and continuing career success. Other people make careers out of speaking to groups of people who pay to listen to them. Motivational authors and speakers, such as Les Brown (http://www.lesbrown.com), make millions of dollars each year from people who want to be motivated to do better in their lives. Brian Tracy, another professional speaker and author, specializes in helping business leaders become more productive and effective in the workplace (http://www.briantracy.com). Whether public speaking is something you do every day or just a few times a year, persuading others is a challenging task. If you develop the skill to persuade effectively, it can be personally and professionally rewarding. Entertaining speakingSpeech designed to captivate an audience’s attention and regale or amuse them while delivering a clear message. involves an array of speaking occasions ranging from introductions to wedding toasts, to presenting and accepting awards, to delivering eulogies at funerals and memorial services in addition to after-dinner speeches and motivational speeches. Entertaining speaking has been important since the time of the ancient Greeks, when Aristotle identified epideictic speaking (speaking in a ceremonial context) as an important type of address. As with persuasive and informative speaking, there are professionals, from religious leaders to comedians, who make a living simply from delivering entertaining speeches. As anyone who has watched an awards show on television or has seen an incoherent best man deliver a wedding toast can attest, speaking to entertain is a task that requires preparation and practice to be effective. Oral communication skills were the number one skill that college graduates found useful in the business world, according to a study by sociologist Andrew Zekeri.Zekeri, A. A. (2004). College curriculum competencies and skills former students found essential to their careers. College Student Journal, 38, 412–422. That fact alone makes learning about public speaking worthwhile. However, there are many other benefits of communicating effectively for the hundreds of thousands of college students every year who take public speaking courses. Let’s take a look at some of the personal benefits you’ll get both from a course in public speaking and from giving public speeches. In addition to learning the process of creating and delivering an effective speech, students of public speaking leave the class with a number of other benefits as well. Some of these benefits include One of the very first benefits you will gain from your public speaking course is an increased ability to think critically. Problem solving is one of many critical thinking skills you will engage in during this course. For example, when preparing a persuasive speech, you’ll have to think through real problems affecting your campus, community, or the world and provide possible solutions to those problems. You’ll also have to think about the positive and negative consequences of your solutions and then communicate your ideas to others. At first, it may seem easy to come up with solutions for a campus problem such as a shortage of parking spaces: just build more spaces. But after thinking and researching further you may find out that building costs, environmental impact from loss of green space, maintenance needs, or limited locations for additional spaces make this solution impractical. Being able to think through problems and analyze the potential costs and benefits of solutions is an essential part of critical thinking and of public speaking aimed at persuading others. These skills will help you not only in public speaking contexts but throughout your life as well. As we stated earlier, college graduates in Zekeri’s study rated oral communication skills as the most useful for success in the business world. The second most valuable skill they reported was problem-solving ability, so your public speaking course is doubly valuable! Another benefit to public speaking is that it will enhance your ability to conduct and analyze research. Public speakers must provide credible evidence within their speeches if they are going to persuade various audiences. So your public speaking course will further refine your ability to find and utilize a range of sources. A second benefit of taking a public speaking course is that it will help you fine-tune your verbal and nonverbal communication skills. Whether you competed in public speaking in high school or this is your first time speaking in front of an audience, having the opportunity to actively practice communication skills and receive professional feedback will help you become a better overall communicator. Often, people don’t even realize that they twirl their hair or repeatedly mispronounce words while speaking in public settings until they receive feedback from a teacher during a public speaking course. People around the United States will often pay speech coaches over one hundred dollars per hour to help them enhance their speaking skills. You have a built-in speech coach right in your classroom, so it is to your advantage to use the opportunity to improve your verbal and nonverbal communication skills. An additional benefit of taking a public speaking class is that it will help reduce your fear of public speaking. Whether they’ve spoken in public a lot or are just getting started, most people experience some anxiety when engaging in public speaking. Heidi Rose and Andrew Rancer evaluated students’ levels of public speaking anxiety during both the first and last weeks of their public speaking class and found that those levels decreased over the course of the semester.Rose, H. M., & Rancer, A. S. (1993). The impact of basic courses in oral interpretation and public speaking on communication apprehension. Communication Reports, 6, 54–60. One explanation is that people often have little exposure to public speaking. By taking a course in public speaking, students become better acquainted with the public speaking process, making them more confident and less apprehensive. In addition, you will learn specific strategies for overcoming the challenges of speech anxiety. We will discuss this topic in greater detail in Chapter 3 "Speaking Confidently". Once you’ve learned the basic skills associated with public speaking, you’ll find that being able to effectively speak in public has profound benefits, including If you don’t like something about your local government, then speak out about your issue! One of the best ways to get our society to change is through the power of speech. Common citizens in the United States and around the world, like you, are influencing the world in real ways through the power of speech. Just type the words “citizens speak out” in a search engine and you’ll find numerous examples of how common citizens use the power of speech to make real changes in the world—for example, by speaking out against “fracking” for natural gas (a process in which chemicals are injected into rocks in an attempt to open them up for fast flow of natural gas or oil) or in favor of retaining a popular local sheriff. One of the amazing parts of being a citizen in a democracy is the right to stand up and speak out, which is a luxury many people in the world do not have. So if you don’t like something, be the force of change you’re looking for through the power of speech. Have you ever thought about climbing the corporate ladder and eventually finding yourself in a management or other leadership position? If so, then public speaking skills are very important. Hackman and Johnson assert that effective public speaking skills are a necessity for all leaders.Hackman, M. Z., & Johnson, C. E. (2004). Leadership: A communication perspective (4th ed.). Long Grove, IL: Waveland. If you want people to follow you, you have to communicate effectively and clearly what followers should do. According to Bender, “Powerful leadership comes from knowing what matters to you. Powerful presentations come from expressing this effectively. It’s important to develop both.”Bender, P. U. (1998). Stand, deliver and lead. Ivey Business Journal, 62(3), 46–47. One of the most important skills for leaders to develop is their public speaking skills, which is why executives spend millions of dollars every year going to public speaking workshops; hiring public speaking coaches; and buying public speaking books, CDs, and DVDs. Even if you are not in an official leadership position, effective public speaking can help you become a “thought leaderAn individual who contributes new ideas that help various aspects of society..” Joel Kurtzman, editor of Strategy & Business, coined this term to call attention to individuals who contribute new ideas to the world of business. According to business consultant Ken Lizotte, “when your colleagues, prospects, and customers view you as one very smart guy or gal to know, then you’re a thought leader.”Lizotte, K. (2008). The expert’s edge: Become the go-to authority people turn to every time [Kindle 2 version]. New York, NY: McGraw-Hill. Retrieved from Amazon.com (locations 72–78) Typically, thought leaders engage in a range of behaviors, including enacting and conducting research on business practices. To achieve thought leader status, individuals must communicate their ideas to others through both writing and public speaking. Lizotte demonstrates how becoming a thought leader can be personally and financially rewarding at the same time: when others look to you as a thought leader, you will be more desired and make more money as a result. Business gurus often refer to “intellectual capital,” or the combination of your knowledge and ability to communicate that knowledge to others.Lizotte, K. (2008). The expert’s edge: Become the go-to authority people turn to every time [Kindle 2 version]. New York, NY: McGraw-Hill. Retrieved from Amazon.com Whether standing before a group of executives discussing the next great trend in business or delivering a webinar (a seminar over the web), thought leaders use public speaking every day to create the future that the rest of us live in.
<urn:uuid:fe32ee7d-4893-4b64-8b82-e515dd26e949>
CC-MAIN-2021-43
https://saylordotorg.github.io/text_stand-up-speak-out-the-practice-and-ethics-of-public-speaking/s04-01-why-is-public-speaking-importa.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00350.warc.gz
en
0.951422
2,678
3.390625
3
4 steps to a good espresso Setting up the coffee grinder Setting up the espresso coffee machine Which button to use How to make an Espresso what is a Ristretto What is an Espresso Mahciato How to make an Americano Difference between Caffe Latte and Cappuccino How to make a Caffe Latte How to make a cappuccino How to make a Hot Chocolate How to make a Caffe Mocha How to make a Frappe or iced Cappuccino A few more things Why is my coffee bitter? A coffee bean is the seed of a cherry. These cherries grow on coffee trees. There are many different types of coffee trees such as Coffea Arabica and Coffea Robusta. The coffee tree grows between the tropic of Cancer and the tropic of Capricorn in countries such as Brasil, Colombia, Costa Rica, El Salvador, Honduras, Ethiopia, Kenya, India, Vietnam, Indonesia and many more. The cherries that grow on the coffee tree need to be picked at the right time. The cherries are mainly picked by hand and we need to pick about 21 cherries to make 1 espresso. There are many factors that determine the flavour of the coffee, some of these factors are: type of tree, amount of rain, soil, temperatures, elevation, harvesting methods, processing methods etc. The seeds, called green beans, are then shipped to the roastery. The roaster sometimes blends different beans together to acquire a specific flavour profile. The roaster then heats the beans in a roaster for a certain amount of time to develop all the different flavours. Coffee roasting is a very complex process and the best roasters have many years of experience which is required to develop their expertise. 4 Steps to a good espresso Making good coffee is not rocket science but it does require some basic knowledge. A clean coffee machine, high quality coffee beans, clean and fresh water, good pressure and consistent brewing temperate are all important. However, we believe it comes down to 4 important things whilst working behind the machine: Fresh coffee (the fresher the better) Dosage (7 grams for a single espresso, 14 grams for a double) Fineness (correct fineness results in an extraction time of 25 seconds) Amount of water (40 ml for a single espresso, 80 ml for a double espresso) 1) Fresh coffee is really important. Coffee is a food product and loses its flavours over time. Denby Dale Coffee therefore roasts coffee weekly. Make sure that your ground coffee is not older than 2 hours. 2) Dosage is extremely important. Always make sure that the compartment in the coffee grinder is full and dispenses a full dosage. It’s really important that you use the same amount of coffee each time. Be consistent with the dosage. 3) Fineness will control the speed of the extraction. The fineness will determine the flavours that will be extracted from the coffee. 4) It’s important not too extract too much water through ground coffee. There is only so much flavour to extract. The suggested maximum amount of water for a single espresso (7 grams of ground coffee) is 40 ml. A double espresso (14 grams of ground coffee) can extract 80 ml. Automatic espresso machines can be pre-set. Setting up the coffee grinder The coffee grinder has two burrs that grind the coffee beans into ground coffee. The coffee grinder can be adjusted to grind the ground coffee finer or coarser. The fineness of the ground coffee will control the speed of the extraction. A kg of coffee beans will make 140 single espressos. Keep this in mind when filling up the grinder with whole beans. We recommend checking the setting of the grinder every morning and throughout the day. Temperate changes can affect the way the coffee grinder grinds the coffee. Most grinders are pretty consistent and do not require adjusting very often, but it’s still a good practice to check the settings as often as possible. The speed of extraction or extraction time is very important. This can be compared to a tea. Imagine a tea that has been brewed for 30 seconds and a tea that has been brewed for 3 minutes. Both teas will taste completely different. It works the same with coffee. Finer ground coffee will result in a slower extraction than coarser ground coffee. In other words, the finer the ground coffee, the slower the extraction. The extraction should be around 25 seconds, give or take a few seconds. Count the extraction time from the moment you press the button on the espresso coffee machine. Make the ground coffee finer if the extraction time is below 20 seconds and make the ground coffee coarser if the extraction time is longer than 30 seconds. Most coffee grinders have a rotating disc just below the hopper. This disc can be turned clockwise or anti-clockwise. Turning this disc will make the coffee finer or coarser. Only change the setting one step at a time. Take out the double group handle and clean it Grind enough ground coffee for a double shot – two full compartments in the coffee chamber Tamp the coffee – be consistent and use the same amount of pressure each time Brew two single espresso’s – 2 x 40ml (use a shot glass if necessary) Count the extraction time from the moment you press the button – it should be 25 seconds (give or take a few seconds) Adjust the grinder by making the ground coffee finer or coarser if necessary – only with 1 or 2 clicks at a time Grind some ground coffee for a few seconds to dispose of old coffee Repeat the process until you have reached a correct extraction time Setting up the espresso coffee machine The coffee supplier should set up your coffee machine to the correct settings. However, we often find espresso coffee machines that are set up incorrectly. Most espresso coffee machines have buttons which are set to a certain amount of water. As you have read earlier, the amount of water is very important. Too much water will not give you a good espresso. A single espresso should be 40ml and a double espresso 80ml. We recommend using a shot glass with a line for setting up the espresso coffee machine. What is the best thing to do here? We recommend to check the water levels of your espresso coffee machine. If it has been setup incorrectly then please contact us and we will advice you on how to set it up correctly. Every espresso coffee machine works different and we do not want to give you any wrong information. Please contact us if you think that your espresso coffee machine might have been set up incorrectly. Which button to use? Very important and often not well explained: which button should you use? The buttons for an automatic espresso coffee machines are set to a certain amount of water. This is important because the amount of water that goes through the coffee needs to be correct. Most automatic espresso machines have 5 buttons. The last button on the right is usually for manual flow. The buttons with 1 cup are usually set to 40 ml and the buttons with 2 cups are set to 80 ml. On the picture above this means that button 1 and 2 are set to 40 ml and button 3 and 4 are set to 80 ml. Button 1 and 2 should be used for a single group handle (a handle with one spout). Button 3 and 4 are for a double group handle (a handle with 2 spouts). How to make an espresso? A good single espresso is a 40 ml coffee made with approximately 7 grams of fresh ground coffee. The extraction time should be 25 seconds (give or take a few seconds). A double espresso is 80 ml made with 14 grams extracted in 25 seconds (same time as a single espresso). A good espresso depends on a few factors: Quality coffee beans Freshness of the coffee Correct fineness (20-25 seconds extraction time) Dosage (approximate 7 grams) Water (40 ml) Tamping (compressing the ground coffee) Fresh coffee, correct fineness, dosage, amount of water and tamping procedures are very important for the barista. Follow these steps when making an espresso: Grind fresh coffee Grind enough coffee to fill the compartment of the grinder giving you a full dosage – 1 compartment for a single espresso, 2 compartments for a double espresso Take out the group handle and clean it with a dry towel Fill the group handle with the correct amount of coffee Tamp the coffee using the same pressure every time Use a warm cup or pre-heat the cup Use 40 ml for a single espresso and 80 ml for a double espresso Check the extraction time (should be around 20-25 seconds) The espresso should have a constant flow looking like warm honey. The crema on top of the espresso should be brown like hazelnut. The crema should also be consistent and stay on top for a good minute or two. High quality 100% Arabica coffees may lose their crema more quickly than Robusta coffees, which is quite normal. We believe a blend of both Arabica and Robusta coffee beans deliver the finest quality espressos. What is a ristretto? A Ristretto is a short espresso, approx. 20ml. A Ristretto can be made by making the ground coffee finer and still using 7 grams of ground coffee, extracting 20ml in 20 seconds. What is an espresso macchiato? An espresso macchiato is an espresso topped with a dollop of foam. How to make an americano? An americano is an espresso diluted with water. We recommend pouring the espresso on top of the hot water. Try not to pour hot water on top of the espresso as you might burn away flavours from the crema. Milk steams best when it’s fresh and has not been steamed before. Milk also foams better when you start with cold milk; the best foam comes from milk with a temperature below 15 °C. Steam the milk to a maximum of 72 °C. The steam wand of the espresso coffee machine heats the milk and forces air into the milk. The longer you steam the hotter the milk. The position of the tip of the steam wand is really important. Never put the steam tip too deep into the milk. The steam needs to be able to move around through the milk and therefore works best when it’s right under the surface of the milk. - Add fresh cold milk to the jug and fill it to a maximum of half full. - Purge the steam wand before steaming to clear out condensation and to heat the steam wand. - Place the tip of the steam wand between the side of the jug and the centre of the jug, just an inch into the milk. This will allow the steam to create a whirlpool in the jug. The better the whirlpool the smoother the milk. The milk should be spinning inside the jug at all times. - The better the spinning the smoother the milk. The milk will not spin properly when the steam tip is too deep into the milk. The milk will not spin either when the steam is not turned on to full power. Always make sure that the steam has enough power to move the milk around. - Moving the steam tip right on the surface of the milk will create foam. You will hear a high chirping noise when doing this. Always create the foam in the beginning when the milk is cold. The colder the milk, the better the foam. The milk will rise whilst creating foam. Keep the steam tip on the surface of the milk to create the foam, keep listening to the high chirping noise. The longer you do this, the more foam you will create. Be really precise here and you will create really smooth foam without any bubbles. - Move the steam tip an inch deeper into the milk once you have created enough foam. The milk should still spin around but there should be no more high chirping noise. It’s really important that the milk is now spinning around. The spinning will mix the foam with milk making it very smooth. The longer you spin the milk around the smoother the foam. - Turn the foam off once you have reached approx. 65-70 °C. (visual shows 65) - Once finished steaming, clean the steam wand right away. - Gently tap the jug on the counter to burst any bubbles in the milk - Always spin the jug around before pouring to give the milk a shiny glossy look This technique should give you very smooth foam, called micro foam. Keep remembering to spin the milk whilst steaming and be very precise with lowering the jug. The more precise you lower the jug the smoother the foam will be. What is the difference between a Latte and a Cappuccino? We don’t believe in set rules for coffee, it all depends on what you are looking for. However, this is a guideline for the difference between a caffe latte and a cappuccino. A caffe latte is usually milder than a cappuccino and often served in a taller cup or glass. A cappuccino is usually served in a cup of about 9oz. A caffe latte is usually served in a glass or mug of about 12oz. A cappuccino should have more foam than a caffe latte. The cappuccino should be a mixture of espresso, milk and foam with every sip. The caffe latte is more espresso and milk with maybe a dash of foam. How to make a caffe latte? A caffe latte is an espresso diluted with hot steamed milk topped with a dash of foam. The caffe latte is usually poured in a glass but can also be poured in a cup of mug. A caffe latte can be poured with latte art or can be poured as a layered latte. Steam the milk and pour into a glass and let this stand whilst you prepare the espresso. Now pour an espresso very slowly on top and the espresso, milk and foam should create 3 different layers. Pouring the espresso on top of the milk creates a so called latte macchiato. How to make a cappuccino? A cappuccino is an espresso topped with hot milk and foam. A cappuccino is usually served in a cup. The foam should be shiny without big bubbles, looking like melted ice cream. You should have enough foam so that every sip contains espresso, milk and foam; all the way through the drink. Most people top the cappuccino with a dusting of chocolate. Do not use cocoa as it is quite bitter. We recommend using a belly jug for cappuccinos. Spin the jug before pouring the milk; this will make the foam wet and shiny. Now hold the cup and jug at an angle so you bring the jug as close to the espresso as possible. Slowly wiggle the jug from side to side to force the foam out of the jug. Do it slowly and close to the espresso so the foam floats on top. Keep doing this until you have enough foam on top. Once you have enough foam pour the milk by pouring from a little higher to let the milk through. You should now have a beautiful mixture between milk, espresso and foam. Latte art is the pouring of milk in a certain way to create various shapes such as rosetta’s and hearts. Start pouring the milk into the centre of the cup containing the espresso then practice making your shapes. Gently shaking the froth from side to side when the cup is 2/3 full can create a leaf effect. How to make a hot chocolate? Mix hot chocolate powder with a small amount of hot milk and stir this until it becomes a great mixture. Now top up the mixture with steamed foamy milk. How to make a caffe mocha? Most people make a caffe mocha the same as a hot chocolate and simply add a shot of espresso. Mix some hot chocolate powder with espresso and milk. Then top this up with steamed foamy milk. How to make a frappé or Iced Cappuccino? Great drinks for the summer! A frappe is a thick iced drink, can also be called a milkshake or thick shake. All you need is a blender, some ice, some milk and frappe mix like ZUMA. - Fill a take out cup with ice and add this to blender. - Add 1 or 2 table spoons of ZUMA frappe mix. - add 1 or 2 oz of milk Blend for 30 seconds until the drink is smooth enough to drink and thick enough to eat from a spoon. Simply add a shot of espresso before blending to create an Iced Cappuccino. You can also add flavoured syrups such as caramel and strawberry to create flavoured frappes. The cleaner the equipment is, the cleaner the taste. Always clean the group handles and the filters at the end of each day. Take the filter out the group handle and thoroughly clean it. Now place a blank filter in the group handle and back-flush the group head. Place the group handle with the blank filter in the group head and flush the water through for 10 seconds. Stop the flow after 10 seconds and repeat this process for 5 times. We recommend using a group head back-flushing powder at least every 2nd day. This will give the group head a thorough clean. Make sure that you clean the group head with water after using a cleaning product to make sure that there is no cleaning product left in the group head. A few more things Always leave the group handles in the coffee machine, they should be warm. Always use warm cups as it feels nice to hold and it doesn’t cool down the coffee. Work quick, never let an espresso go cold. Brew the espresso as soon as you insert the group handle. The group head is very hot and will start burning the coffee otherwise. Always brew as soon as possible. Do not place your thermometers in a dishwasher. Work like a professional. Know what you are doing and work tidy. This will make a good impression on your customers. Keep your machine clean. Always back flush the machine once or twice a day and use a cleaning powder every so often. Measure the correct amounts of milk. Milk is best when it’s fresh, reheating will reduce the flavour. Never heat the milk more than 72 °C, everything has its limits. Always dose the correct amount. Make sure that the compartment in the coffee grinder is filled enough. Don’t forget to smile when you serve a coffee. An espresso should be served with a spoon and a glass of water. Big bubbles and professional barista’s do not go well together.
<urn:uuid:496d7835-ca05-49f7-a7a6-a81dc6ad54b5>
CC-MAIN-2021-43
https://www.denbydalecoffee.co.uk/barista-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00670.warc.gz
en
0.920414
3,966
2.546875
3
The majority of anterior segment eye surgery has historically been performed using various types of metal or diamond blades. Many surgeons predict that very soon most, if not all, ocular surgery will be performed with lasers. Why is this transition occurring now? Lasers that cause thermal photodisruption, such as Argon and Nd:YAG, have established their benefit in most forms of retinal and glaucoma surgery. However, the most common ophthalmic procedures currently performed, cataract and refractive surgeries, until recently still used blades. The new kid on the block is the femtosecond (fs) laser. Having conquered LASIK surgery, the fs laser now sets its sights on the most popular ocular procedure-cataract surgery. Femtosecond lasers depend on the effects of cavitation created by the rapid expansion and implosion of plasma, which results in the vaporization of surrounding tissue. The primary advantage of modern fs lasers revolves around the quick pulses that allow very low energy levels to create the plasma that excites the electrons to allow tissue vaporization while limiting the heat and surrounding shock waves that could lead to unwanted collateral damage. The extremely short pulse duration (10-15 seconds) and small pulse size (1-5 mµ) of fs lasers allow us to move away from photodisruption (Nd:YAG) and photoablation (excimer) toward level of precision of the photodisection process. The first commercial application of fs lasers began in 2001 with the approval of the Intralase laser for LASIK flap creation. Over the past decade, five generations of improvements have resulted in lasers that can produce LASIK flaps at a level of safety and precision that far exceed the conventional bladed microkeratome. Table 1 lists some of the many advantages of fs LASIK flaps that have resulted in greater than 82% of the U.S. market share that continues to grow every year.1 There are fewer flap-related complications with the fs method compared with a mechanical metal blade microkeratome.2 Additionally, fs lasers have virtually eliminated common sight-threatening complications seen with mechanical metal blade microkeratomes.3 Femtosecond flaps result in less loss of BCVA and more gain in BCVA.4. Thinner, more predictable femtosecond flaps are biomechanically stronger and more stable than mechanical metal blade microkeratome flaps, possibly reducing the risk of post-LASIK ectasia.5 Femtosecond flaps are more precise, uniform in thickness (planar), and smoother-resulting in better quality of vision as seen in low-contrast visual acuity and contrast sensitivity studies due to fewer induced higher-order aberration.6-9 Naval studies show fs flaps provide LASIK patients with faster visual recovery.10 Patients who have fs laser flaps also report fewer subjective side effects, including night vision disturbances-glare and halo-and dry eye complaints.9,11,12 While it has taken several years, fs LASIK flap creation has become the standard of care. Femtosecond lasers have also revolutionized corneal transplantation. Fs laser-enabled keratoplasty (FLEK) shows better long-term outcomes with less residual astigmatism and faster visual recovery compared with mechanical trephine corneal transplants in patients with keratoconus.13 Fewer complications, such as wound leaks with less sutures and faster suture removal, result in higher rates of patient satisfaction and quality of life after corneal transplantation. Fs lasers provide a way to create Intacs intra-stromal corneal tunnels safely and more precisely than previous manual dissection with overall complication rates below 6%.14 While not all patients appreciate increases in UCVA, FAI may delay the need for corneal transplantation and in addition to corneal collagen cross-linking may stabilize the progressive changes associated with keratoconus. Undoubtedly the most exciting new application of fs lasers is in the cataract surgery arena. The first generation of fs cataract surgery began with the approval of Alcon’s LenSx in August 2009. At least four fs lasers are currently approved in the U.S. for performing three significant parts of cataract surgery including corneal incisions, anterior capsulotomy, and lens fragmentation (see Table 2). The primary benefit of the fs laser portion of cataract surgery is to improve the safety profile by reducing or eliminating the use of phacoemulsification ultrasound energy often associated with many of the sight-threatening complications in modern cataract surgery.15 Other benefits may allow better UCVA after cataract surgery due to more precise IOL power selection because of less variable effective IOL position due to as a result of more precise anterior capsulotomy and incisional residual astigmatism correction compared with manual procedures.16 Future fs laser considerations in ophthalmic surgery include intra-stromal pockets for corneal inlays such as Kamra by Acufocus, and intra-stromal presbyopia correction such as Bausch + Lomb’s Supracor and Intracor procedures. Improvements in OCT structural imaging and patient interfaces will result in faster and safer procedures. Femtosecond lasers have offered the ophthalmic surgeon an unparalleled level of precision, safety, and control over cataract and refractive surgery procedures. Femtosecond lasers have reinvigorated LASIK surgery, reinvented corneal transplantation, simplified corneal Intacs, and brought a level of precision to cataract surgery previously unimagined. Femtosecond lasers have reduced the learning curve of new surgical residents, thereby reducing the variability of surgical outcomes due to individual surgeon skill and performance. Future improvements in fs technology only promise to enhance our patients’ outcomes in most forms of cataract and refractive ophthalmic surgery.ODT 2012 U.S. Refractive Market Quarterly Update. Market Scope LLC .August 2012 Kezirian GM, Stonecipher KG. Comparison of the IntraLase femtosecond laser and mechanical keratome for laser in situ keratomileusis. J Cataract Refractive Surg. 2004 Apr;30(4):804-811 Will B, Kurtz RM. IntraLase is best. In: Probst LE, ed. LASIK: Advances, Controversies, and Custom. Thorofare, NJ: SLACK; 2004:397-402 Stonecipher K, Ignacio TS, Stonecipher M. Advances in refractive surgery: microkeratome and femtosecond laser flap creation in relation to safety, efficacy, predictability, and biomechanical stability. Curr Opin Ophthalmol. 2006 Aug;17(4):368-372 Knorz MC, Vossmerbaeumer U. Comparison of flap adhesion strength using Amadeus microkeratome and the IntraLase iFS femtosecond laser in rabbits. J Refract Surg. 2008 Nov ;24(9):875-878. Talamo JH, Meltzer J, Gardner J. Reproducibility of flap thickness with IntraLase FS and Moria LSK-1 and M2 microkeratomes. J Refract Surg. 2006 Jum;22(6):556-561. Sarayba MA, Ignacio TS, Tran DB, Binder PS. A 60kHz Intralase femtosecond laser creates a smoother LASIK stromal bed surface compared to Zyoptix XP mechanical microkeratome in human donor eyes. J Refract Surg. 2007 Apr;23(4):331-337 Medeiros FW, Stapleton WM, Hammel J, et al. Wavefront analysis comparison of LASIK outcomes with the femtosecond laser and mechanical microkeratomes. J Refract Surg. 2007 Nov;23(9):880-887 Durrie DS, Kezirian, GM: Femtosecond Laser vs. Mechanical Keratome Flaps in Wavefront-guided LASIK: A Prospective Contralateral Eye Study. J Cataract Refract Surg. 2005;31(1):120-126 Tanzer DJ, Schallhorn S, Brown MC, et al. Comparison of Femtosecond vs. Mechanical Keratome in Wavefront Guided LASIK. Data presented at: American Society of Cataract and Refractive Surgery Symposium; April 15-20, 2005; Washington, DC. Durrie D. A randomized, prospective clinical study of LASIK performed with the IntraLase FS laser vs. mechanical microkeratome. Data presented at: American Academy of Ophthalmology; October 23-26, 2004; New Orleans, LA Salomão M; Ambrósio Jr R; Wilson SE., Dry eye associated with laser in situ keratomileusis: Mechanical microkeratome vs. femtosecond laser. J Cataract Refract Surg 2009 Oct;35(10):1756-1760 Gaster RN, Dumitrascu O, Rabinowitz YS: Penetrating keratoplasty using femtosecond laser-enabled keratoplasty with zig-zag incisions vs. a mechanical trephine in patients with keratoconus. Br J Ophthalmol. 2012 Sep;96(9):1195-9. doi: 10.1136/bjophthalmol-2012-301662. Epub 2012 Jul 11. Coskunseven E, Kymionis GD, Tsiklis NS, et al. Complications of intrastromal corneal ring segment implantation using a femtosecond laser for channel creation: a survey of 850 eyes with keratoconus. Acta Ophthalmol. 2011 Feb;89(1):54-57 Conrad-Hengerer I, Hengerer FH, Schultz T, et al. Effect of femtosecond laser fragmentation on effective phacoemulsification time in cataract surgery. J Refract Surg. 2012 Dec;28(12):879-883 Rückl T, Dexl AK, Bachernegg A, et al. Femtosecond laser-assisted intrastromal arcuate keratotomy to reduce corneal astigmatism. J Cataract Refract Surg. 2013 Feb 6. pii: S0886-3350(12)01657-4. doi: 10.1016/j.jcrs.2012.10.043. [Epub ahead of print]
<urn:uuid:a5801ca1-f2b9-4b5f-9353-22f25f937333>
CC-MAIN-2021-43
https://www.optometrytimes.com/view/it-time-say-bye-bye-blade
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00070.warc.gz
en
0.828916
2,266
3.09375
3
|Volvo’s seven renewable fuel trucks and a summary chart of the fuel evaluation. More evaluation detail below. Click to enlarge.| The Volvo Group showed seven of its diesel trucks modified to run on 100% renewable fuels: biodiesel, biogas, biogas combined with biodiesel, ethanol/methanol, dimethyl ether (DME), synthetic diesel and hydrogen gas combined with biogas. The company also published the results of its own assessment of the potential and viability of these different fuels. The seven Volvo FM trucks were equipped with Volvo’s own 9-liter engines that have been specially modified to illustrate the possibilities of what Volvo calls “carbon-dioxide-free transport.” Since all the fuels chosen originated from renewable materials—such as the gasification of biomass for DME and the synthetic Fischer-Tropsch diesel—the combustion of the fuels contributes no net carbon dioxide to the atmosphere. Production of the fuels, however, does generate CO2 in amounts varying with the specific pathway—which is one of the criteria Volvo used in its assessment. Volvo calculates that cargo transport will account for about 4-5% of total global carbon-dioxide emissions, based on European conditions and statistics in which passenger cars represent 60% of carbon-dioxide emissions and cargo transport for the remaining 40%. The Volvo Group is the first vehicle manufacturer to produce seven demonstration trucks that can all be driven without emitting any environmentally harmful carbon dioxide. These trucks were exhibited for the first time today in Stockholm and are equipped with diesel engines that have been modified to operate on seven different types of renewable liquid and gaseous fuels. Volvo is part of the climate problem, but today we have shown that carbon-dioxide free transports are a possibility and that we as a vehicle manufacturer both can and will be part for the solution to the climate issue.—Leif Johansson, CEO of the Volvo Group Volvo carried out its own analyses of the renewable fuels that are most suitable based on seven criteria: Impact on the climate; energy efficiency; land use efficiency; fuel potential; vehicle adaptation; fuel costs; and fuel infrastructure. We know that in the foreseeable future there will be insufficient biomass or renewable fuels to fully replace fossil fuels. That is why it is important that decisions on the production of future fuels are preceded by such comprehensive assessments—otherwise there is the risk that we focus on too many and quite simply unsuitable alternatives, which will delay the introduction of carbon-dioxide-free transport.—Jan-Eric Sundgren, member of Volvo Group Management and Senior Vice President, Public and Environmental Affairs Volvo is particularly optimistic about the prospects for second-generation renewable fuels produced via the gasification of biomass. While different fuels have different strengths and weaknesses, dimethyl ether produced via biomass gasification comes out as a leading alternative in these assessments. A summary of the results follow. |Indexed results for climate impact. 100 is the baseline (conventional diesel), and a lower score is better. Click to enlarge.| Impact on the climate. Volvo used a five-degree scale showing the percentage the reduction of carbon dioxide emissions compared with conventional diesel fuel: 0-25% reduction; 26 - 50% reduction; 51 - 75% reduction; 76 - 90% reduction; and 91 – 100% reduction. Non-fossil CO2 emissions were not included since they do not lead to a net increase of carbon dioxide in the atmosphere. Five of the alternatives—synthetic diesel, dimethyl ether, methanol, biogas and hydrogen plus biogas—reduce the impact on the climate by more than 90%. In the case of methanol, gasification of black liquor is required in order to get the highest rating. For biogas and hydrogen gas+biogas, gasification of biomass is required in order to receive the highest rating. A lower rating applies if the biogas is produced through anaerobic digestion of household waste. Results for ethanol vary between 0 and 75 percent reduction depending on the production method. Biodiesel had the lowest ranking after ethanol. |WTW energy efficiency expressed in percentage of energy reaching the wheels. Click to enlarge.| Energy efficiency. Energy efficiency is rated on a falling scale and is expressed in percent indicating the amount of energy that reaches the vehicle’s driven wheels. Current fossil diesel fuel achieves approximately a 35 percent total level of efficiency. Results may vary for the same fuel, depending on the production process used. DME and methanol receives the highest rating, on the condition that they are produced from black liquor from the wood pulp industry. The highest rating for synthetic diesel also requires the gasification of black liquor. The rating for biogas, biogas+biodiesel and hydrogen gas+biogas apply to production with gasification and anaerobic digestion. Production of biogas via gasification of black liquor is not included in the summary. The low rating for ethanol is due to the high energy consumption for cultivation and fuel production. |Efficiency of land use expressed in km/hectare/year. Click to enlarge.| Land use efficiency. The yield per hectare for each crop has been calculated using information about average yields from good quality land. The rating scale indicates how far a heavy truck can travel per year and hectare. Growing conditions apply to Swedish conditions. Cultivation in other places leads to different results but the relationships are more or less the same, according to Volvo. Volvo reduced the amount of fuel produced by the amount of fuel/energy required for harvesting, production, transport, etc. The results may vary for the same fuel, depending on the production process used. DME and methanol, combined with black liquor gasification get the highest rating. These fuels have high harvest yields, require little use of fossil fuels, and have high energy efficiency. Synthetic diesel has high harvest yields, requires little use of fossil fuels, but has lower energy efficiency and limited selectivity in production. Ethanol gets a low rating due to limited energy efficiency and in certain cases the need for a great deal of fossil energy. Biodiesel gets the lowest rating due to low average harvest yields and the use of a great deal of fossil energy. Biogas production via gasification of black liquor is not included in the summary. |Fuel potential in TWh. Click to enlarge.| Fuel potential. Volvo expressed fuel potential in TWh (Terawatt hours). According to a study conducted by EUCAR/CONCAWE/JRC, the potential availability of waste wood, farmed wood, and straw in the EU in 2012 is approximately 700 TWh per year while the potential for sunflower oil and rapeseed oil is estimated at approximately 80 TWh per year. 350 to 420 TWh—the highest ranking Volvo used for the fuels—are equivalent to approximately 10-12% of the expected demand for petrol and diesel in the EU in 2015. DME, methanol, biogas, biogas+biodiesel and hydrogen gas+biogas get the highest fuel potential rating. Synthetic diesel, DME, methanol, and biogas can all be produced from entire crops, wood feedstocks, or other biological material. However, synthetic diesel has a lower level of efficiency and provides a lower proportion of fuel that can be used in vehicles. With respect to biogas, waste material and sewage can be used in production. Ethanol can be produced from a number of feedstocks, including waste wood or other biological materials that contain cellulose, although the level of efficiency is relatively low. Biodiesel, which has received the lowest rating, is produced from vegetable oils such as rapeseed oil and sunflower oil. Availability is limited since rapeseed can only be grown on the same land every fourth year or every sixth year. Furthermore, only the oil in the seeds can be utilized for fuel. Vehicle adaptation. Volvo tried to provide a collective assessment of technical complexity, including adjustments to compensate for maximal engine performance, weight increase, range between refuelling, increased space for the fuel and the need for new and more expensive components. It also encompasses the need for technology to meet future emissions requirements. Biodiesel and synthetic diesel get the highest rating, as vehicles that are run on these fuels are essentially comparable to conventional diesel vehicles. The lower energy content in DME results in a 50% reduction in range but it is still possible to use the fuel for long-haul transport. DME requires a unique and advanced fuel system, but also offers savings in terms of costs and weight with regard to exhaust noise damping and treatment of exhaust gases. Ethanol’s lower energy content results in a 30% shorter range per tank of fuel. Biogas+biodiesel offers maximal engine performance, but range is reduced by half if the gas is in liquid form. This also requires two separate fuel systems. Biogas and hydrogen gas+biogas require an Otto engine, which limits power output. The compressed gas has a low energy density, which limits range to approximately 20 percent. A complex tank system results in higher costs and increased weight. |Fuel costs relative to fossil diesel. Click to enlarge.| Fuel costs. Volvo’s assessment—expressed as a percentage of the cost of conventional diesel, exclusive of taxes, at a raw oil price of US$70/barrel—includes the costs of raw materials, fixed and variable costs in the production plants, and costs for transport, infrastructure, and energy consumption in the chain of distribution. The comparison was made per liter of diesel equivalent. The results may vary for the same fuel, depending on the feedstock. DME and methanol get the highest rating. When produced from black liquor, they are already competitive today in terms of costs. Production via gasification of forest products or farmed wood is more expensive. The cost of biodiesel is some 60% higher than for conventional diesel. Biogas based on waste materials leads to the most favorable results, primarily due to low feedstock costs. For biogas+biodiesel, biogas in liquid form is approximately 25% more expensive than compressed biogas. Biogas production through gasification of black liquor is not included in the summary. Synthetic diesel is the most expensive fuel because of high investment costs and the relatively low energy efficiency in production. Ethanol is generally expensive to produce. Production from forest products is the most expensive process. Fuel infrastructure. Synthetic diesel gets the highest rating. Biodiesel requires certain measures due to its lower storage stability. Methanol and ethanol require corrosion-resistant material, increased fire protection measures, and a separate infrastructure if they are used as pure fuel. Methanol needs to be handled in completely closed systems due to a high health risk. The infrastructure for DME is similar to the one that has been established for Liquefied Petroleum Gas (LPG). DME is heavier than air and can accumulate in the event of leakage, resulting in a fire hazard. Biogas is handled at high pressure (200 bar) and requires the same infrastructure as the current system for natural gas. The infrastructure for hydrogen gas is the most expensive and complicated one. Volvo Group Renewable Fuels
<urn:uuid:95748703-8224-4ec6-98af-25ae044a313b>
CC-MAIN-2021-43
https://www.greencarcongress.com/2007/08/volvo-demonstra.html?cid=81151169
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00150.warc.gz
en
0.935779
2,341
2.640625
3
“Strategy is the art of making use of time and space. I am less concerned about the later than the former. Space we can recover, lost time never.” Speed has become the catchword for concept developers over the past couple of years. Speed has focused on how fast a unit can move from one physical location to another. This paradigm for speed needs to be re-thought. How quickly a force can achieve national endstates is the speed that is vital to our nation’s elements of national power. This speed may mean slower operational and tactical speed in terms of unit movement and deployment timelines. What is vital is how quickly a force can serve the needs of the nation. The Levels of Speed Speed is defined as “Swiftness of action as measured in units of time. The Speed at which information can be gathered and transmitted, decisions made, and material forces delivered are decisive elements contributing to victory[i].” As the Joint force looks at speed, the critical piece missing is how speed affects each level of war. There are three types of speed in modern warfare, tactical speed, operational speed, and strategic speed. Tactical speed is where the military executes plans and operations. Tactical speed occurs at lower echelon units and often is enabled by advancements in technology. Our current force posture and current demands of policy makers tend to focus on how to improve tactical speed. While this speed is relevant, achieving this speed will not be a guarantee of success . Operational Speed is the middle ground. Operational speed is characterized by the speed of deployments and the speed associated with military objectives. As the Army moves towards the mid and far term, operational speed will increase, albeit at moderate advances. Operational speed is dependent upon the Joint Force, as only the Navy and Air Force have the capability to move large Army formations across the globe in the form of strategic lift. Operational speed will always be influenced by the constants of physical distance and [ii]physical space available aboard platforms that move icons on the battlefield. Strategic Speed is the speed at which the military and other elements of national power (Diplomatic, Economic, and Informational) achieve its desired end states and war termination criteria. Strategic Speed is the speed that the Army, as a part of the joint force must achieve. How fast the Army can Win, and achieve war termination criteria is dependent upon many conditions, to include mass, the synergy with the joint force, and simultaneity of action factors that influence Strategic Speed. The Environment and Why Speed is Necessary The speed of human events, defined at which how fast events happen across the globe as the world has flattened has increased in pace over the years and is not forecasted to slow down its rate of acceleration. Innovations such as the internet, social networking, and networked and leaderless organizations have increased the speed at which the United States and its elements of national power can react. The speed and methods with which people and organizations can collect and convey information to the public makes it possible for the world populace to quickly become aware of an incident[iii]. As the pace of human interaction increases, the risk becomes that the speed of events will outpace how fast policy can be formulated and implemented. The speed of environment is related to the speed understanding. This is impacted by individuals and organizations being able to share information which may yield an uprising or an event that requires a response in a relatively short amount of time. All this requires the US to be able to collect intelligence faster, pass info to higher faster, to enable decision makers to make decisions early enough to make an impact. As fast as events unfold in the modern world, the day remains fixed at 24 hours. Military commanders and national level decision makers alike must process all the information and intelligence they receive to make the right decision. On today’s battlefield, there is more information, more intelligence to digest, but time remains a constant. Understanding the constant of time allows you to grasp what speed is essential. How fast information and intelligence can be processed, and how fast plans, operations, and strategies can be implemented is dependent upon intellectual and conceptual speed. This speed is influenced by a variety of factors to include education, and the effective communication of leaders to their subordinates. An effective response at the lowest level of execution relies on intellectual and conceptual speed. You cannot achieve Strategic Speed, reaching your required termination criteria if you cannot effectively communicate what that criterion is. Increasingly, our policy makers and national decision makers will feel the pressure to act quickly. As the speed of events unfolds, and crisis plays out on television, social media, and the internet, the pressure on policy makers’ national level decision makers to act quickly is intensified. When it comes to the adversarial two party system in America, the opposition party will always claim that the party in power is acting too slow, this will in turn put the pressure on the military to provide any type of response, as long as the response is fast. Translated to what we do, the Army must be able to respond quickly, but properly. Getting there fast is not an end in itself. We must have the correct options available, and when they are not, ensure policy makers understand the time it takes to put the proper plan into action. The military must ensure that we cure the illness vice the symptom; we must avoid mitigations and find the solution. We must focus on Strategic Speed. Current Joint doctrine focuses speed at the tactical and operational levels, specifically in how we relate speed to the principles of war and principles of joint operations. Within the nine principles of war, the word speed only appears in how we influence the principle of surprise. Speed in decision making is one of the factors that enable surprise.[iv] Speed must not be limited to tactical and operational maneuvers on the battlefield, or limited to how fast a unit can move from one location to another. Speed must move beyond tactical thinking and into the realm of strategy. Description and Examples of Each type of Speed Tactical speed is the least influential form of speed, yet retains important aspects that enable the Joint Force to successfully conduct a mission. Tactical speed is enabled by advances in technology and tactical level TTPs. An example of technology enabling the Joint Force would be direct energy weapons. A direct energy ADA system would reduce the lift required for Patriot Missiles, the boots on the ground and sustainment required for an Ordnance unit to store the missiles. Faster moving tactical units may be able to reach their objectives on the ground quicker and may reduce the casualties incurred on the battlefield. Quick tactical victories with few casualties could assist in maintaining support of the American people for the conflict. On the Western Front in the Second World War, Operational Speed was on displayed during the Battle of the Bulge. German forces staged a surprise counteroffensive in the Ardennes region against unsuspecting American forces. The 101st Airborne Division, rushed in to stabilize the American lines, was quickly enveloped at Bastogne by the German Army. The American Third Army, under Lieutenant General George Patton, showed exceptional Operational Speed by quickly moving from south of Luxembourg City to relieve the besieged 101st Airborne Division and begin to cut of the German salient. This operational speed, although critical to solving the problems in the Battle of the Buldge, was not influential on the overall timing or termination of the Second World War. Nazi Germany was well on its way to defeat in 1945, their last ditch effort hastened their demise, but not in the strategic realm. In 2003, the Unites States Military made an unprecedented two-hundred mile march from Kuwait to Baghdad in a mere six weeks time. The joint force was able to overwhelm the Iraqi military and occupy an entire nation. In this case, the Operational Speed also achieved the strategic objective of bringing about the fall of Saddam Hussein’s government, although it could not achieve the larger policy goal of a stable, democratic Iraq. Arguments persist to this day if better strategic patience, containing Hussein and preparing for his eventual downfall would have been the better strategic decision and have achieved our policy goals faster. Operational speed, while important, is still not the paramount speed that the Joint Force should seek to achieve. Much like tactical speed, operational speed can ensure that the full support of the American people is maintained. Proper operational speed can lead to successful strategic speed as in the case of raids and surgical strike type missions. Again, World War Two provides examples of Strategic Speed. Many American military planners pressed for the invasion of the France as early as possible. President Roosevelt understood that getting to the continent fast was less important than the ability to bring sufficient forces to the fight. Roosevelt deliberately delayed the invasion of France, instead engaging in the peripheral on Axis territory in Africa and Italy while building the necessary combat power to achieve victory over the German Army in France and northern Europe[v]. In 2010, a major earthquake hit the small island country of Haiti. The international response was to favor tactical speed over operational and strategic speed. Many NGOs quickly descended upon the island with good intentions; however their tactical speed led to confusion and an uncoordinated response effort. Airfields were packed with supplies that could not be delivered to the needing populace. Speed of response was valued over speed of achieving objectives and endstates causing more human suffering on the Island. Had the speed of response been sacrificed for strategic speed, knowing and understanding what was required, the delivery of assistance to the populace would have been attuned to what they needed. The kicker behind strategic speed is that tactical and operational speed may be sacrificed to achieve strategic speed. Massing and providing an overwhelming force to decisively defeat an enemy force can achieve termination criteria faster than a smaller force that gets into theater quickly and is not prepared to operate seamlessly with the joint force. When policy makers, military, and interagency planners come together, understanding culture becomes paramount to effective speed. Each culture will have its own perspective on speed. The United States and other Western Nations have a different vantage point of speed than Middle Eastern or Far Eastern nations. Speed may also be measure by where an operation takes place. 12 years of fighting may seem like a long time to the American public, but to a citizen of Iraq it is a just a fraction of their lives. Strategic speed does not always involve the deployment and employment of a force. Understanding the factors of the human domain, and influencing the decision calculus of adversaries can achieve desired national objectives. When the president has the option of sending in large scale ground forces that can remove a hostile regime, our adversaries know and understand that challenging U.S. interests is not in their best interests. The President and national decision makers must be informed of all options on how quickly the force can achieve termination criteria, not just how fast it can respond to events. If the response to an event is not decisive, what is the point? As the Joint Force looks to meet National Objectives, paving the way to meet those objectives will require a fundamental shift in where the military makes investments. Strategic speed is not accomplished with faster tanks, more precise munitions, or larger aircraft. Strategic speed is accomplished with leaders who can think through problems and develop solutions to meet national endstates. With the impending cuts in the size of our force, America’s military will have to think through the wicked problems it faces. Gaining speed as an Army requires investment in people. The Army, and the Joint Force must avoid the trap of focusing on just “doing things faster,” resulting in short term tactical gains but in the end will not achieve the desired end states of our elected leaders. Achieving strategic speed will require the long term investment in people. As warfare remains a conflict between people, how well our military invests in leaders who understand strategy along with tactics and operations will define our success in world affairs. This article represents the author’s views and not necessarily the views of the U.S. Army or Department of Defense. [i] Keane, Michael. Dictionary of Modern Strategy and Tactics. (187) Naval Institute Press 2005 [ii] The U.S. Army Capstone Concept 19 December 2012 [iii] Joint Publication 3-0. 11 August 2011, III-17. [iv] Joint Publication 3-0. 11 August 2011, A-3.
<urn:uuid:4136c555-57db-4555-9386-3e7f0519950f>
CC-MAIN-2021-43
https://old.smallwarsjournal.com/comment/40454
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00311.warc.gz
en
0.948956
2,520
2.953125
3
|Part of the Lebanese Civil War| |Date||January 20, 1976 (cc)| |Perpetrators||Palestine Liberation Organization, Lebanese National Movement| |Motive||Retaliation for Karantina massacre| The Damour massacre took place on January 20, 1976, during the 1975–1990 Lebanese Civil War. Damour, a Christian town on the main highway south of Beirut, was attacked by the Palestine Liberation Organisation units. Part of its population died in battle or in the massacre that followed, and the remainder were forced to flee. The Phalangist militia based in Damour and Dayr al Nama had been blocking the coastal road. The Damour massacre was a response to the Karantina massacre of January 18, 1976, in which Phalangists killed from 300 up to 1,500 people. It occurred as part of a series of events during the Lebanese Civil War, in which Palestinians joined the Muslim forces, in the context of the Christian-Muslim divide, and soon Beirut was divided along the Green Line, with Christian enclaves to the east and Muslims to the west. Twenty Phalangist militiamen were executed, and then civilians were lined up against a wall and sprayed with machine-gun fire. None of the remaining inhabitants survived. An estimated 582 civilians died. Among the killed were family members of Elie Hobeika and his fiancé. Following the Battle of Tel al-Zaatar later the same year, the PLO resettled Palestinian refugees in Damour. After the Israeli invasion of Lebanon in 1982, the Zaatar refugees were expelled from Damour, and the original inhabitants brought back. According to Thomas L. Friedman, the Phalangist Damouri Brigade, which carried out the Sabra and Shatila massacre during the 1982 Lebanon War sought revenge not only for the assassination of Bashir Gemayel, but also for what he describes as past tribal killings of their own people by Palestinians, including those at Damour. According to an eyewitness, the attack took place from the mountain behind the town. "It was an apocalypse," said Father Mansour Labaky, a Christian Maronite priest who survived the massacre. "They were coming, thousands and thousands, shouting 'Allahu Akbar! (God is great!) Let us attack them for the Arabs, let us offer a holocaust to Mohammad!', and they were slaughtering everyone in their path, men, women and children." According to journalist and author Robert Fisk, the attack was led by Colonel Abu Musa, a senior commander of the PLO and Fatah, and later leader of the anti-Arafat Fatah Uprising faction. Cedarland.org names Zuheir Mohsen, leader of as-Sa'iqa, a Damascus-based Palestinian faction operating directly on Syrian orders, and claims that he was known in Lebanon as the "Butcher from Damour". The bulk of the attacking forces seems to have been composed of brigades from the Palestinian Liberation Army and as-Sa'iqa, as well as other militias, including Fatah. Some sources also mention the Popular Front for the Liberation of Palestine (PFLP), the Democratic Front for the Liberation of Palestine (DFLP), and the Muslim Lebanese al-Murabitun militia among the attackers. There are reports that PLO forces were additionally joined by militiamen from Syria, Jordan, Libya, Iran, Pakistan and Afghanistan, and possibly even Japanese Red Army terrorists who were then undergoing training by the Popular Front for the Liberation of Palestine in Lebanon. - List of massacres in Lebanon - Persecution of Christians - Karantina massacre - South Lebanese Army - Saad Haddad - Hirst, David (2010). Beware of small states. Nation Books. p. 111. ISBN 978-0-571-23741-8. "With Palestinian help, the Muslim/lefitsts then overran Damour, in their domain, on the coastal road a few kilometres south of the capital, sacked it, killed some 150 inhabitants, and drove out the rest." - Nisan, 2003 - Armies in Lebanon, 1985, Osprey Publishing - Yezid Sayigh (1999) Armed Struggle and the Search for State: The Palestinian National Movement, 1949–1993 Oxford University Press, ISBN 0-19-829643-6 p 368 - William W. Harris (January 2006). The New Face of Lebanon: History's Revenge. Markus Wiener Publishers. p. 162. ISBN 978-1-55876-392-0. http://books.google.com/books?id=e5R7Ci2btbIC&pg=PA162. Retrieved July 27, 2013. "the massacre of 1,500 Palestinians, Shi'is, and others in Karantina and Maslakh, and the revenge killings of hundreds of Christians in Damour" - Noam Chomsky, Edward W. Said (1999) Fateful Triangle: The United States, Israel, and the Palestinians South End Press, ISBN 0-89608-601-1 pp 184–185 - Samuel M. Katz (1985). Armies in Lebanon. Osprey Publishing. p. 5. ISBN 978-0-85045-602-8. http://books.google.com/books?id=0W5-jZY_T2IC&pg=PA5. Retrieved July 27, 2013. - Frank Brenchley (1989). Britain and the Middle East: Economic History, 1945-87. I.B.Tauris. p. 221. ISBN 978-1-870915-07-6. http://books.google.com/books?id=QtRojsvBm8wC&pg=PA221. Retrieved July 27, 2013. - Terry John Carter; Lara Dunston; Amelia Thomas (2008). Syria & Lebanon. Ediz. Inglese. Lonely Planet. p. 35. ISBN 978-1-74104-609-0. http://books.google.com/books?id=_R-I_Gx5OgQC&pg=PA35. Retrieved July 27, 2013. - Fisk, 2001, pp. 99–100. - "Elie Hobeika". moreorless : heroes & killers of the 20th century. www.moreorless.au.com. http://www.moreorless.au.com/killers/hobeika.html. Retrieved 8 July 2012. - Helena Cobban (8). "Back to Shatila, part 2". Just World News. Just World News. http://justworldnews.org/archives/000976.html. Retrieved 8 July 2012. - Friedman, 1998, p. 161. - Friedman, New York Times, Sep 20, 21, 26, 27, 1982. - Israel undercover: secret warfare and hidden diplomacy in the Middle East By Steve Posner, ISBN 0-8156-0220-0, ISBN 978-0-8156-0220-0, p. 2 - J. Becker: The PLO: The Rise and Fall of the Palestine Liberation Organization, Weidenfeld and Nicolson, 1984, p. 124 qtd in - "Articles > PLO Policy towards the Christian Community during the Civil War in Lebanon". ICT. http://www.ict.org.il/Articles/tabid/66/Articlsid/291/currentpage/4/Default.aspx. Retrieved 2012-07-05. - The PLO: The Rise and Fall of the Palestine Liberation Organization, Weidenfeld and Nicolson, 1984, p. 124 qtd in - Some sources name the PLA's Ayn Jalout brigade armed by Egypt and the Qadisiyah brigade from Iraq. This page also mentions the Yarmouk brigade, set up by Syria. - Brian Lee Davis (January 1, 1990). Qaddafi, Terrorism, and the Origins of the U.S. Attack on Libya. ABC-CLIO. p. 11. ISBN 978-0-275-93302-9. http://books.google.com/books?id=YQzJHVNUkt4C&pg=PA11. Retrieved July 27, 2013. - Nisan, 2003, p. 41. - Abraham, A. J. (1996). The Lebanon War. Praeger/Greenwood. ISBN 0-275-95389-0 - Fisk, Robert. (2001). Pity the Nation: Lebanon at War. Oxford: Oxford University Press. ISBN 0-19-280130-9 - Friedman, Thomas. (1998) From Beirut To Jerusalem. 2nd Edition. London: HarperCollins. ISBN 0-00-653070-2 - Nisan, M. (2003). The Conscience of Lebanon: A Political Biography of Etienne Sakr (Abu-Arz). London: Routledge. ISBN 0-7146-5392-6. - Becker, Jillian. (1985). The PLO: The Rise and Fall of the Palestine Liberation Organization . New York: St. Martin's Press ISBN 0-312-59379-1 - Lebanese Civil War 1975 – 1976 Includes pictures of the Syrian-formed and -sponsored groups (Yarmouk and Sai'qa) attacking Damour city (January 1976). - Phalangist website – contains account and includes a graphic photograph of mutilated children - Damour Massacre (1976) - Damour Massacre pictures - Country profile: Lebanon - Photographs from a page sympathetic to the Lebanese Forces - Country profile: Lebanon - Arafat's Massacre of Damour |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:ab519104-d503-44c6-a176-ee0ba09500d3>
CC-MAIN-2021-43
https://military.wikia.org/wiki/Damour_massacre
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587770.37/warc/CC-MAIN-20211025220214-20211026010214-00630.warc.gz
en
0.855182
2,065
2.96875
3
When one speaks of an Achilles tendon tear or rupture , one means a complete severing of the Achilles tendon. This connects the calf muscle with the heel bone. The most common Achilles tendon tears occur during exercise, when the foot is jerked around or is otherwise heavily used. Severe pain and a loud, whip-like bang then indicate a ruptured Achilles tendon. What is an Achilles tendon tear? When one speaks of an Achilles tendon tear or rupture, one means a complete severing of the Achilles tendon. The Achilles tendon connects the heel bone with the calf muscles. As the strongest tendon in the human body, it is essential for walking and running. It ensures that the heel can lift off the ground. If it is completely or partially severed, it is referred to as an Achilles tendon tear or rupture. This occurs suddenly and only rarely announces itself in advance through pain. In most patients it is covered, that is, without any external injuries. A rupture of the Achilles tendon caused by external influences such as the action of glass or sharp-edged objects is possible, but less well known in practice. The Achilles tendon tear is a typical sports injury . Constant sporting and other stresses lead to signs of wear and tear, which then exceed the mechanical load-bearing capacity of the tendon tissue in the event of sudden tension or a kick. Sports with a very rapid change of direction (for example handball or soccer) promote the frequency of the injury. Pre-existing illnesses such as diabetes mellitus also reduce stress tolerance. Men are more often affected by this injury than women. The Achilles tendon tear is clearly audible and is accompanied by a bang (crack of a whip). This is followed by severe pain in the heel area. A dent is clearly palpable above the heel. If the Achilles tendon ruptures, the patient can no longer walk on tiptoe. Symptoms, ailments & signs An Achilles tendon tear is primarily associated with very severe pain. These usually occur directly on the tendon on the foot and can also radiate into the neighboring regions. This leads to very severe [foot pain | pain in the entire foot]] and usually also on the leg of the person concerned. Furthermore, the patients suffer from bleeding in the affected region and associated severe swelling. The pain also occurs at night due to the Achilles tendon rupture, so that most patients also suffer from sleep problems or from depression and irritability . The quality of life is honestly restricted. There are restrictions in movement and thus also severe restrictions in the everyday life of the person concerned. Ordinary movements are no longer possible for the person concerned. Due to the Achilles tendon tear, the entire load capacity of the foot decreases, so that even strenuous activities can no longer be carried out without further ado. It usually takes a few months for the foot to regain its resilience. This crack can also cause a loss of strength. Due to the severe restrictions in everyday life, some people affected by the crack also suffer from psychological complaints or depression . Diagnosis & course Various methods are used for diagnosis. Usually the doctor will perform the Thompson calf compression test at the beginning. Furthermore, imaging methods such as ultrasound and x-rays are used. The prognosis in the event of a ruptured Achilles tendon for complete restoration of the load-bearing capacity of the foot depends to a large extent on the treatment measures and the patient’s athletic demands. A torn Achilles tendon that is not treated usually results in a loss of strength. A regenerated tendon forms within two to four months, but it is not a full replacement for the Achilles tendon. On the other hand, professional therapy and consistent follow-up treatment almost always lead to the restoration of the load-bearing capacity of the Achilles tendon. For competitive athletes, however, the prognosis can be far more negative and lead to the end of their careers. A rupture of the Achilles tendon can be prevented by avoiding rapid, abrupt and extreme loads. If an Achilles tendon rupture is operated on, structures nearby can be injured. Bruising, bleeding, secondary bleeding and circulatory disorders can occur. If nerves are injured, sensory disturbances and symptoms of paralysis can occur. In addition, the anesthesia also carries a certain risk. In addition, wound healing disorders, wound infections, excessive scarring and infections can occur. The tendon can shorten or lengthen. If a blood congestion cuff is used, pressure damage, for example paralysis, can be caused. Swelling that lasts for a long time may occur after the operation. The swelling can cause problems during subsequent therapy – for example when adjusting the shoes. Sensitivity disorders can occur in the area of the surgical scar. A bandage is usually applied when the Achilles tendon ruptures. The pressure in the bandage can damage blood vessels and nerves. The restricted movement can weaken muscles and bones. It can also be a so-called Sudeck syndrome come. The bone is severely broken down and a painful inflammation results. Blood clots can also form. In addition, allergic reactions with varying degrees of severity can occur. A torn Achilles tendon increases the risk of leg vein thrombosis. In addition, a new crack, a so-called re-repture, can occur. Overall, the function of the Achilles tendon can be restricted after a tear. When should you go to the doctor? A ruptured Achilles tendon should receive medical attention as soon as possible. A visit to the doctor is recommended even if a serious injury to the Achilles tendon is suspected. Anyone who suddenly feels severe pain in the tendon area while exercising, which may be associated with a whip-like noise, should see a doctor immediately. This is particularly advisable if the symptoms persist or intensify quickly after exercise. If the foot can no longer be unrolled as before, there may be a tear in the Achilles tendon that needs to be treated. Restrictions in the movement of the toes (the foot can no longer be “bent down”) also indicate an injury that requires treatment. In general, complaints in the area of the calves or heels that persist after the usual regeneration phase must be medically clarified and, if necessary, treated. In the case of acute pain, first aid measures in the form of cooling compresses and rest should be taken. In the event of severe pain or paralysis in the foot, an ambulance service should be called in. Treatment & Therapy First of all, it is important to take the right immediate measures in the event of a ruptured Achilles tendon. The foot must be relieved, cooled, bandaged and raised. Depending on the patient’s personal factors, the doctor can then decide between conservative and surgical therapy. Even if you decide to have an operation in most cases, you will resort to the non-surgical method of treatment if certain conditions are met. Age, smoking , possible arterial circulatory disorders or the use of certain medications are particularly risk factors . A firm bandage (bandage, plaster of paris, orthosis) initially immobilizes the injured foot in the tip foot position for about a week. This is followed by a special shoe with a removable heel raised for a period of about 6 weeks. During an operation, the two ends of the Achilles tendon are put back together. The suture can be reinforced by the muscular skin of neighboring muscles. The operation is followed by physiotherapeutic measures to restore mobility as quickly as possible. Here, too, a special shoe is used to gradually increase the load on the Achilles tendon. Longer immobilization of the lower leg is not recommended in the event of a ruptured Achilles tendon. Outlook & forecast In most cases, a ruptured Achilles tendon can be treated surgically. Depending on the time of the intervention and the patient’s constitution, the tendon can usually be restored to its original range of motion. However, as a result of an operation, redness and itching, as well as thickened areas and scars, can remain, which can lead to movement disorders. In spite of successful therapy, some patients complain of swelling, pain or a reduced load-bearing capacity of the affected leg. Rarely, infections , circulatory disorders or a shortening of the tendon can also occur. In the case of newly healed tears, there is a risk that the tendon will tear again and must be treated again. In general, several months of follow-up treatment is necessary for a ruptured Achilles tendon. After three to four months, the injury should be healed and the person affected can be active again. Competitive training should not be restarted until at least six months after a tendon rupture. Otherwise, it can lead to another crack and the development of chronic complaints. Older patients who have already torn their Achilles tendon are at risk of further injuries and chronic pain. If there is another disease of the tendons, joints or muscles , this can also affect the prognosis. A torn Achilles tendon is treated surgically in order to restore the functionality of the calf muscles and thus the normal way of walking. Follow-up care by the patient and doctor is important in order to optimize regeneration. Physiotherapists are also involved in the aftercare process. Essentially, it is about allowing the sutured Achilles tendon to heal completely so that it can function properly again. For this it is important that the tissue is not overused for a period specified by the doctor. Athletes in particular, who understandably would like to start training again, must not strain the Achilles tendon too early and too intensively. Light doses at the beginning of training are just as important as breaks to regenerate between units. Consistent pre-stretching is just as important as post-stretching after exercise. Both should be done gently and should not cause pain. Special focus should be placed on the calf muscles, which exert direct tension on the Achilles tendon and must therefore not be shortened. The footwear is an essential factor in the follow-up care for a ruptured Achilles tendon. Because high heels promote cramping of the muscles of the calf and thus indirectly put a lot of strain on the Achilles tendon. Flat shoes are much cheaper in this context, as is walking barefoot. You can do that yourself As with most acute sports injuries, if you tear your Achilles tendon, there are good ways to help yourself. Doctors recommend the PECH rule to patients, which is also used in first aid . Even sprains and fractures can be optimally cared for on your own. The individual letters of the acronym stand for pause, ice, compression and elevation. In detail, this means: Put up the injured part of the body, protect it and, in the best case, no longer move it. Furthermore, the affected area must be cooled . You can do this with either an ice pack or a piece of cloth soaked in cold water. Behind the point Compression is the instruction to connect the injury. The reason for this is not only to stabilize the affected area, but also to prevent too much blood or secretion from leaking into the surrounding tissue. In principle, however, the associationmust not be placed too tightly, otherwise there is a risk of aggravation. The last important step is elevation. The injured limb should be propped up on a pillow or chair – as a rule of thumb, medical professionals advise that it should be higher than the heart. However, it is important that a doctor classifies the injury in order to rule out serious injuries before the patient begins his own measures.
<urn:uuid:3c8dccc3-f579-4cfb-89d9-074b737d5dc6>
CC-MAIN-2021-43
https://www.theinternetfaqs.com/achilles-tendon-tear-basics/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585181.6/warc/CC-MAIN-20211017175237-20211017205237-00270.warc.gz
en
0.938381
2,366
3.390625
3
Practical understanding of let’s say Newton’s Physics is of the type which is offered by the text books. Students understand the statements of laws along with mathematical depiction thereof and become able to solve numerical or exercise questions. After completing the study in this way, they may become good engineers or professors of physics. But those who become scientists, they seek understanding of a different kind that may be regarded as intellectual understanding. They not only pursue to understand book contents within the context of daily real life observations, more importantly they also try to investigate the history and logic behind theories of science that they read in text books. Rather than trying to solve text books exercise questions, their efforts are usually focused at finding how the theory in question was actually derived or discovered by the original scientist. The practical understanding makes one able to apply theory in practice whereas the intellectual understanding would make one able to not only improve or refine the existing theories but to propose or formulate new theories as well. Father of Physics is Aristotle. He made physics a separate discipline. Modern Physics developed only out of critical inquiry of the Aristotelian ideas. It is pointless to say that Aristotle was wrong and Galileo was right. Galileo received all his raw materials for the critical inquiry from Aristotle. Aristotle’s ideas were wrong. But in case there were no ideas on Physics at all then there would have been no Galileo or Newton as well. It is supposed that dark matter is the source of extra gravity which cannot be traced to detectable sources. Fact is however that there is no extra gravity at all. Scientists applied irrelevant Newton’s Theorem XXXI to the galactic rotations and observed that actual effect of gravity was greater than what could be calculated using Theorem XXXI. Theorem XXXI was applicable to systems like solar system or planet moon systems. For the galactic settings, Newton had another Theorem XXXIII and scientists terribly missed to apply the actually relevant Theorem. In case Theorem XXXIII is applied, then calculated gravity would reasonably tally with observed gravity and there will be no need of dark matter. And it is to be noted that Theorems XXXI and XXXIII are different variations of Shell Theorem. [i] General Relativity was an achievement. But Universe itself is greater, deeper, stranger and different from this achievement. Our best theories … including GR do not correctly ‘predict’ the actual universe. Any such claim is false. Universe also does not laugh on such claims. We ourselves should review our claims whether they are realistic or not. Before the observation based discovery or confirmation of the existence of galaxies in year 1924, there were three solutions to GR equations available. First by Einstein himself and second by de-Sitter (both: 1917). Both could not reach to the concept of disk shaped island universes. Then in 1922, Friedmann also presented a scheme of various types of universe models. He also failed to reach the concept of disk shaped island universes. In his 1917 paper, after discussing limitations or problems of Newton’s theory then Einstein proceeds to describe his own theory in section 3. Title of section 3 is following: 3. The Spatially Finite Universe with a Uniform Distribution of Matter The first paragraph of this section clearly shows that Einstein totally missed the existence of galaxies at large astronomical scales. Following is the first para: According to the general theory of relativity the metrical character (curvature) of the four-dimensional space-time con- tinuum is defined at every point by the matter at that point and the state of that matter. Therefore, on account of the lack of uniformity in the distribution of matter, the metrical structure of this continuum must necessarily be extremely complicated. But if we are concerned with the structure only on a large scale, we may represent matter to ourselves as being uniformly distributed over enormous spaces, so that its density of distribution is a variable function which varies So density varies extremely slowly…. means that Einstein (or GR) completely missed the concept of island universe having concentrated density and huge voids in-between. Following is link to English Translation Einstein (1917) paper. However – Newton did reach to the concept of Galaxies In a letter to Isaac Newton, David Gregory declared in 1694: “A continual miracle is needed to prevent the Sun and the fixed stars from rushing together through gravity.” Newton pondered the issue over the years starting around 1685 and concluded: fixed stars being… at such vast distances from one another, can neither attract each other perceptibly, nor be attracted by our Sun.” I. Newton, Principia (1728) Newton reasoned that: “if the matter of our sun and planets and all the matter in the universe were evenly scattered throughout all the heavens, and every particle had an innate gravity toward all the rest, and the whole space throughout which this matter was scattered was but finite; the matter on the outside of the space would, by its gravity, tend toward all the matter on the inside, and by consequence, fall down into the middle of the whole space and there compose one great spherical mass. But if the matter was evenly disposed throughout an infinite space, it could never convene into one mass; but some of it would convene into one mass and some into another, so as to make an infinite number of great masses, scattered at great distances from one to another throughout all that infinite space. I. Newton, letter to theologian Richard Bentley (1692) Thus we see that Newton had accurately reached to the idea of the existence of Galaxies and that existence of galaxies actually indicate infinite vastness of space. On the other hand Einstein and his GR had terribly failed in reaching to the concept of galaxies even though observational indications were available at that time and even discussion based on observations regarding existence or non-existence of galaxies was also available. Scientists expected that star velocities of galaxy must follow Kepler’s 3rd law which required that galaxy should rotate slowly from edges than from center. However, Kepler’s 3rd law was a specific law that was applicable to solar system or planet-moon systems where greater mass is concentrated at the center. But galaxy is a different system where mass is spread out across whole of the galaxy. Basically Kepler’s 3rd law, being specific law, was not applicable to galactic rotations. Scientists also had general theories like Newton’s Theory and General Relativity (GR). The question before me when I started writing book “Philosophy Unscrambles Dark Matter” was that why did Physicists get same result from a particular law i.e. Kepler’s 3rd law and a ‘General’ Theory (GR) about faster than expected rotation pattern of galaxies? The obvious answer to this question was that general theories should have given different result. But somehow scientists actually received results from applying general theories which were consistent with Kepler’s 3rd law. The galactic rotation computed by using general theories was consistent with the results of Kepler’s 3rd law. So what was the fault with the general theories? Which General Theory was wrong? GR or Newton’s? It turned out that according to the relativistic Birkhoff’s theorem (relativity) – Wikipedia, GR reduces to Newtonian Theory within Newtonian limits. Galactic Rotation was within Newtonian limits and thus Newton’s Theory was applicable to the galactic rotation problem. If any general theory was wrong, that was not GR. That had to be Newton’s Theory. So was Newton’s Theory really wrong? Why were Newton’s (general) Theory’s results about galactic rotation found out to be consistent with the results of a solar system specific law i.e. Kepler’s 3rd law? Eventually I also reached to the correct answer to this question. I found the answer to the question as to why scientists so comfortably accepted the results of galactic rotation obtained from applying general theory of Newton such that a specific law i.e. Kepler’s 3rd law was also giving the same result. For example please consider following point from “Galaxy Rotation Curves” section from Wikipedia’s article about Dark matter – Wikipedia. If luminous mass were all the matter, then we can model the galaxy as a point mass in the centre and test masses orbiting around it, similar to the Solar System.[d] In the above given quote, there is footnote [d] at the end which reads as “This is a consequence of the shell theorem and the observation that spiral galaxies are spherically symmetric to a large extent (in 2D).” Actually it was the catching point. I already had reached to the (wrong) conclusion that scientists had actually missed to apply shell theorem that’s why they expected Keplerian drop-off in the galactic rotation problem. Not only I, actually few other people were also thinking like that. For example, Nikolay Sones asked following question on 14–04–2019: At that time my (wrong) answer was that scientists really missed to apply shell theorem to the galactic rotation problem perhaps because galaxy is disc and not sphere etc. The actual thing that surfaced later on was that scientists did apply shell theorem but in a wrong way. What we (I and Nikolay Sones) were thinking in April-2019 was that scientists missed to realize that stars rotate within galactic disk and shell theorem as applicable within sphere (like within earth) was applicable which was missed by scientists. We were right in this thinking! However it turned out that scientists did not miss to apply shell theorem. However they wrongfully applied shell theorem as it was applicable to solar system and they terribly missed to apply shell theorem as it was applicable within disc of galaxy. Actually in Newton’s Principia, there are more than dozen Theorems that all deal with gravitational effects of spherical bodies under different situations. These are different Theorems but some of them are collectively known as ‘Shell Theorem’. Having said that, now I again refer to above quoted wikipedia portion – I quote it again: If luminous mass were all the matter, then we can model the galaxy as a point mass in the centre and test masses orbiting around it, similar to the Solar System.[d] —- [d]> “This is a consequence of the shell theorem and the observation that spiral galaxies are spherically symmetric to a large extent (in 2D).” Now the situation gets cleared. Scientists applied shell theorem as it was applicable to the solar system. In terms of Newton’s Theorem XXXI (i.e. Shell Theorem as applicable to Solar System), they modeled gravity of galaxy as point mass located at central point and test masses orbiting around the center as per following diagram: And – following is the screenshot of Newton’s Theorem XXXI i.e. Shell Theorem as applicable to Solar System: Since scientists had applied shell theorem as applicable to solar system for galactic rotation – so they were expecting Keplerian drop-off in galactic rotations. And that’s why general theory and specific law were giving the same result for galactic rotations. Actual observations were showing flat rotation curves and mass (over and above luminous mass) was seeming to linearly increase with increase in distance from galactic center (Vera Rubin:1970). Actually scientists had missed to apply exact relevant Newton’s Theorem XXXIII (Shell Theorem as applicable to galaxy) which was applicable to test masses located within sphere (or disc) of uniform density. Following is the screenshot of Theorem XXXIII: Following diagram shows how this Theorem XXXIII functions: Orbits in the setup that fall under Theorem XXXIII are NOT subject to Keplerian Drop-off. Therefore Theorem XXXIII (i.e. a special case of Shell Theorem) naturally gives flat rotation curves for galaxies. With Theorem XXXIII, there is no need of dark matter. First thing is that within this setup, gravity is not subject to inverse square distance law. Here gravity is subject to inverse distance (linear) law. Secondly, at any depth within the disc, the outer layers have no gravitational effect. Its meaning is that from center to edges, mass will seem to linearly increase though actually the total mass remains the same. Scientists are fully aware of the implications of Theorem XXXIII and they know that gravity drops linearly inside earth and reaches to zero at the center. By noting that Theorem XXXIII was applicable to galaxy and that by applying this Theorem, we naturally get flat rotation curves for galaxies – dark matter is actually resolved. MOND is not the proper alternative interpretation. It would be viable if scientists had not actually committed the mistake of applying solar system specific theorem to the problem of galaxy. But what if scientists did actually commit this mistake? Then MOND is not viable even if it works. Note: after reading the blog post about Theorem XXXIII, a PhD Physics person had pointed out that even after applying Theorem XXXIII, the discrepancy remains. To this I replied that blog post is brief. The remaining discrepancy has been acknowledged and also solved by the book. For this reason, I also need to share free sections II.II.IV and II.II.VI from book.
<urn:uuid:c6103b19-3c9e-4802-b489-ffdb8cbe1948>
CC-MAIN-2021-43
https://bbtrejected.wordpress.com/category/home/newton/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584913.24/warc/CC-MAIN-20211016170013-20211016200013-00030.warc.gz
en
0.969087
2,803
3.4375
3