text
stringlengths 188
632k
|
---|
Frequently Asked Questions About Cervical Cancer
What is cervical cancer?
Cervical cancer is cancer that starts in a woman's cervix. The cervix is the lower, thin opening of the uterus that connects the vagina (or birth canal) to the uterus. Cervical cancer grows slowly over time and usually starts with abnormal changes to the cells on the cervix, known as dysplasia. For more information about the cervix and cervical cancer, visit http://www.cdc.gov/cancer/cervical
Who gets cervical cancer?
Any woman can get cervical cancer. It occurs most often in women over 30 years old. Women who are not screened or have not been screened in a long time could have cervical cancer and not know it. Cervical cancer is most often found in women who have not had a Pap test in more than five years or have never had a Pap test. The Pap test is the main screening test for cervical cancer; Pap tests can identify cells on the cervix that may become cancerous.
What causes cervical cancer?
Nearly all cervical cancer is caused the human papillomavirus (HPV). HPV is one of the most common sexually transmitted infections in the United States; it is estimated that more than half of adults will get HPV. There are 120 different types of HPV, over 30 of which can infect the genitals. Genital types of HPV are either low-risk or high-risk based on how likely it is that they may cause cervical or other gynecological cancers; HPV types 16 and 18 cause 70% of cervical cancer cases.
Most often HPV will go away on its own, but if it does not, it could cause cervical cancer. Many women will have an HPV infection at some point in their lives, but few will get cervical cancer. In addition to HPV infection, there are other factors that can increase the chances of getting cervical cancer. These include:
- Not having regular Pap tests
- Not following up with your health care provider if you have had a Pap test result that is not normal
- Having HIV, the virus that causes AIDS, or another condition that makes it hard for your body to fight off health problems
For more information about HPV and the HPV vaccine visit http://www.health.ny.gov/prevention/immunization/human_papillomavirus/
What are the symptoms of cervical cancer?
Early on, there are usually no symptoms. The longer a person has cervical cancer without treatment, the more likely they will have symptoms. Some of the symptoms of advanced cervical cancer can include:
- Abnormal vaginal bleeding
- Unusually heavy vaginal discharge
- Painful intercourse
- Painful urination
- Bleeding after intercourse, between periods or after a pelvic exam
If you have any of these symptoms, you should talk to your health care provider. These symptoms may be caused by something else; the only way to know for sure is to see your health care provider.
Why should I be screened for cervical cancer?
Screening tests can prevent cervical cancer or find it early, when it is easily treated. In the United States, the Pap test has reduced cervical cancer rates by more than 70%.
What screening tests are done for cervical cancer?
There are two tests that screen for cervical cancer:
- Papanicolaou test (known as a Pap test or Pap Smear)
A Pap test looks at cells on the cervix and is often done during a routine pelvic exam. It looks for changes on the cervix that could become cervical cancer if not treated. If your Pap test results show cells that are not normal and may become cancer, your health care provider will contact you for follow-up. There are many reasons why Pap test results might not be normal. It usually does not mean you have cancer.
- HPV test
The HPV test looks for the types of the virus that cause most cases of cervical cancer, the high-risk types. The HPV test can be done at the same time as the Pap test using either the same sample of cells or a second sample taken right after the Pap test. A positive result for high-risk HPV means that you should be followed closely to make sure that abnormal cells do not develop.
How often should a woman be screened for cervical cancer?
Women should start getting screened for cervical cancer at age 21. Talk with your health care provider about how often you should be screened for cervical cancer. Women who may no longer be having sex or who may feel too old to have a child should still have regular Pap tests. Cervical cancer is most often found in women who have not been screened with the Pap test in more than five years or have never been screened at all. Women who are not screened or have not been screened in a long time could have cervical cancer and not know it.
What can I do to prevent cervical cancer?
- Get the HPV vaccine. The vaccine protects against the types of HPV that most often cause cervical cancer. For more information about the HPV vaccine, visit: http://www.health.ny.gov/prevention/immunization/human_papillomavirus/ or http://www.cdc.gov/vaccines/vpd-vac/hpv/vac-faqs.htm
- See your health care provider regularly for a Pap test.
- Follow-up with your health care provider if your Pap test results are not normal.
- Limit your number of sexual partners.
- Use condoms. For more information about condoms, visit: http://www.health.ny.gov/diseases/aids/facts/condoms/
- Don't smoke or, if you do, quit. For more information about how to quit, visit the New York State Department of Health Tobacco Control Program Quitline at http://www.nysmokefree.com/
Where can I go for a FREE cervical cancer screening?
Free cervical cancer screening is available for eligible, uninsured and underinsured New York residents through New York State Cancer Services Program. To get more information or to be connected to a Cancer Services Program near you, please call 1-866-442-CANCER or visit the Cancer Services Program website.
Information adapted from CDC Cervical Cancer Fact Sheet (2009) Centers for Disease Control and Prevention Publication #99-9123 available online http://www.cdc.gov/cancer/cervical/pdf/cervical_facts.pdf |
Gross motor skills
Gross motor skills are the abilities required in order to control the large muscles of the body for walking, running, sitting, crawling , and other activities.
Motor skills are actions that involve the movement of muscles in the body. They are divided into two groups: gross motor skills, which are the larger movements of arms, legs, feet, or the entire body (crawling, running, and jumping); and fine motor skills , which are smaller actions, such as grasping an object between the thumb and a finger or using the lips and tongue to taste objects. Motor skills usually develop together since many activities depend on the coordination of gross and fine motor skills. Gross motor skills develop over a relatively short period of time. Most development occurs during childhood. However, soldiers, some athletes, and others who engage in activities requiring high degrees of endurance may spend years improving their level of muscle and body coordination and gross motor skills.
Gross motor skills development is governed by two principles that also control physical growth. Head to toe development refers to the way the upper parts of the body develop, beginning with the head, before the lower ones. The second principle of development is trunk to extremities. Head control is gained first, followed by the shoulders, upper arms, and hands. Upper body control is developed next, followed by the hips, pelvis, and legs.
Encouraging gross motor skills requires a safe, open play space, peers to interact with, and some adult supervision. Promoting the development of gross motor abilities is considerably less complicated than developing fine motor skills. Helping a child succeed in gross motor tasks requires patience and opportunities for a child to practice desired skills. Parents and other persons must understand the child's level of development before helping him or her master gross motor skills. Children reach developmental milestones at different rates. Pushing a child to perform a task that is impossible due to development status promotes frustration and disappointment. Children should be allowed to acquire motor skills at their own paces.
There are a number of activities parents can have children do to help develop gross motor skills. These include:
- playing hopscotch and jumping rope; activities that help children learn balance
- hitting, catching, kicking, or throwing a ball, such as a baseball, football, or soccer ball; activities that help develop hand-eye or foot-eye coordination
- kangaroo hop, in which children hold something, such as a small ball or orange, between their knees and then jump with their feet together frontward, backwards, and sideways
- playing wheelbarrow, in which someone holds the children's legs while they walk on their hands along a specific route
- walking on a narrow bar or curb, while holding a bulky object in one hand, then the other hand, and then repeating the activity walking backwards and sideways
- toss and catch, in which children toss an object, such as a baseball, in the air and then catch it, while sitting or lying down and also while using alternate hands
The first gross motor skill infants learn usually is to lift their heads and shoulders before they can sit up, which, in turn, precedes standing and walking. Lifting the head is usually followed by head control. Although they are born with virtually no head or neck control, most infants can lift their heads to a 45-degree angle by the age of four to six weeks, and they can lift both their head and chest at an average age of eight weeks. Most infants can turn their heads to both sides within 16 to 20 weeks and lift their heads while lying on their backs within 24 to 28 weeks. By about nine to 10 months, most infants can sit up unassisted for substantial periods of time with both hands free for playing.
One of the major tasks in gross motor development is locomotion, the ability to move from one place to another. Infants progress gradually from rolling (eight to 10 weeks) to creeping on their stomachs and dragging their legs behind them (six to nine months) to actual crawling (seven to 12 months). While infants are learning these temporary means of locomotion, they are gradually becoming able to support increasing amounts of weight while in a standing position. In the second half-year of life, babies begin pulling themselves up on furniture and other stationary objects. By the ages of 28 to 54 weeks, on average, they begin navigating a room in an upright position by holding on to the furniture to keep their balance. Eventually, they are able to walk while holding on to an adult with both hands and then with only one. They usually take their first uncertain steps alone between the ages of 36 and 64 weeks and are competent walkers by the ages of 12 to 18 months.
Toddlers are usually very active physically. By the age of two years, children have begun to develop a variety of gross motor skills. They can run fairly well and negotiate stairs holding on to a banister with one hand and putting both feet on each step before going on to the next one. Most infants this age climb (some very actively) and have a rudimentary ability to kick and throw a ball. By the age of three, children walk with good posture and without watching their feet. They can also walk backwards and run with enough control for sudden stops or changes of direction. They can hop, stand on one foot, and negotiate the rungs of a jungle gym. They can walk up stairs alternating feet but usually still walk down putting both feet on each step. Other achievements include riding a tricycle and throwing a ball, although they have trouble catching it because they hold their arms out in front of their bodies no matter what direction the ball comes from.
Four-year-olds can typically balance or hop on one foot, jump forward and backward over objects, and climb and descend stairs alternating feet. They can bounce and catch balls and throw accurately. Some four-year-olds can also skip. Children this age have gained an increased degree of self-consciousness about their motor activities that leads to increased feelings of pride and success when they master a new skill. However, it can also create feelings of inadequacy when they think they have failed. This concern with success can also lead them to try daring activities beyond their abilities, so they need to be monitored especially carefully.
School-age children, who are not going through the rapid, unsettling growth spurts of early childhood or adolescence , are quite skilled at controlling their bodies and are generally good at a wide variety of physical activities, although the ability varies according to the level of maturation and the physique of a child. Motor skills are mostly equal in boys and girls at this stage, except that boys have more forearm strength and girls have greater flexibility. Five-year-olds can skip, jump rope, catch a bounced ball, walk on their tiptoes, balance on one foot for over eight seconds, and engage in beginning acrobatics. Many can even ride a small two-wheel bicycle. Eight- and nine-year-olds typically can ride a bicycle, swim, roller skate, ice skate, jump rope, scale fences, use a saw, hammer, and garden tools, and play a variety of sports . However, many of the sports prized by adults, often scaled down for play by children, require higher levels of distance judgment and hand-eye coordination , as well as quicker reaction times, than are reasonable for middle childhood. Games that are well suited to the motor skills of elementary school-age children include kick ball, dodge ball, and team relay races.
In adolescence, children develop increasing coordination and motor ability. They also gain greater physical strength and prolonged endurance. Adolescents are able to develop better distance judgment and hand-eye coordination than their younger counterparts. With practice, they can master the skills necessary for adult sports.
There are a range of diseases and disorders that affect gross motor skill development and skills. Among young persons, developmental problems such as genetic disorders, muscular dystrophy , cerebral palsy , and some neurological conditions adversely impact gross motor skill development.
Gross motor skills can become impaired in a variety of ways, including injury, illness, stroke , and congenital deformities. Developmental coordination disorder affects motor skills. A person with this disorder has a hard time with skills such as riding a bike, holding a
|SOURCE : Miller-Keane Encyclopedia and Dictionary of Medicine, Nursing, and Allied Health, 5th ed. and Child Development Institute, http://www.childdevelopmentinfo.com.|
|One month||May hold up head momentarily.|
|Two months||Lifts head when placed on stomach. Holds up head briefly when held in a seated or standing position.|
|Three months||Holds head and shoulders up when placed on stomach. Puts weight on forearms.|
|Four months||Holds head up well in sitting position. Can lift head to a 90-degree angle when placed stomach. May start to roll over.|
|Five months||Has full head control. When pulled by hands to a sitting position, the head stays in line with body.|
|Six months||Rolls over (front to back first). Bears a large. percentage of body weight when held in a standing position.|
|Seven months||Can stand with support. May sit without support for short periods. Pushes upper part of body up while on stomach.|
|Eight months||Stands while holding onto furniture. Sits well unsupported. Gets up on hands and knees; may start to crawl backwards.|
|Nine months||Crawls first by pulling body forward with hands. May move around a room by rolling.|
|Ten months||Pulls up to standing. Is very steady while sitting; moves from sitting to crawling position and back. Crawls well.|
|Eleven months||"Cruises," walking while hanging onto furniture. Walks with two hands held.|
|Twelve months||Walks with one hand held. May walk with hands and feet. Stands unsupported for longer periods of time.|
|Fifteen months||Walks without help. Crawls up stairs. Gets into a standing position without support.|
|Eighteen months||Seldom falls while walking. Can walk and pull toy. Runs. Climbs stairs holding railing. May walk backward.|
|Two years||Kicks a ball. Walks up and down stairs, two feet per step.|
|Two and a half years||Jumps with both feet. Jumps off step. Can walk on tiptoe.|
|Three years||Goes upstairs one foot per step. Stands on one foot briefly. Rides tricycle. Runs well.|
|Four years||Skips on one foot. Throws ball well overhand. Jumps a short distance from standing position.|
|Five years||Hops and skips. Good balance. Can skate or ride scooter.|
pencil, and throwing a ball. People with this disorder are often called clumsy. Their movements are slow and awkward. People with developmental coordination disorder may also have a hard time completing tasks that involve movement of muscle groups in sequence. For example, such a person might be unable to do the following in order: open a closet door, get out a jacket, and put it on. It is thought that up to 6 percent of children may have developmental coordination disorder, according to the 2002 issue of the annual journal Clinical Reference Systems . The symptoms usually go unnoticed until the early years of elementary school; the disorder is usually diagnosed in children who are between five and 11 years old.
Children with any one or combination of developmental coordination disorder symptoms should be seen by a pediatrician who specializes in motor skills development delays. There are many ways to address gross motor skills impairment, such as physical therapy. This type of therapy can include treating the underlying cause, strengthening muscles, and teaching ways to compensate for impaired movements.
Parents, teachers, and primary caregivers need to have a clear understanding of how young children develop gross motor skills and the timetable for development of the skills. The Lincoln-Oseretsky Motor Development Scale is an individually administered test that assesses the development of motor skills in children and adults. Areas covered include fine and gross motor skills, finger dexterity and speed, and hand-eye coordination. The test consists of 36 tasks arranged in order of increasing difficulty. These include walking backwards, standing on one foot, touching one's nose, jumping over a rope, throwing and catching a ball, putting coins in a box, jumping and clapping, balancing on tiptoe while opening and closing one's hands, and balancing a rod vertically. Norms have been established for each part of the test for children aged six to 14.
When to call the doctor
Parents, who suspect that their child has a delay in developments should follow their instincts in having that child evaluated. The earliest intervention possible offers the highest response and success rate among children with special needs. Parents should call the doctor any time they have a concern about their child's motor skill development. Parents should keep in mind that children develop at different rates and try to focus on the skills their children have mastered instead of those they may have yet to master. Still, there are certain signs that may point to a problem, and these should be discussed with a pediatrician or physician. These signs include not walking by 15 months of age, not walking maturely (heel to toe) after walking for several months, walking only on the toes, and not being able to push a toy on wheels by age two. Toddlers may begin to prefer one hand to the other, the first sign of right- or left-handedness, or to use both hands equally. This preference should be allowed to develop naturally. Parents should call a doctor if the child does not seem to use one hand at all or has a strong hand preference before he or she is one year old.
Cerebral palsy —A nonprogressive movement disability caused by abnormal development of or damage to motor control centers of the brain.
Congenital malformation —A deformity present at birth.
Developmental coordination disorder —A disorder of motor skills.
Fine motor skill —The abilities required to control the smaller muscles of the body for writing, playing an instrument, artistic expression and craft work. The muscles required to perform fine motor skills are generally found in the hands, feet and head.
Lincoln-Oseretsky Motor Development Scale —A test that assesses the development of motor skills.
Locomotion —The ability to move from one place to another.
Muscular dystrophy —A group of inherited diseases characterized by progressive wasting of the muscles.
See also Fine motor skills .
Bly, Lois. Motor Skills Acquisition Checklist. San Antonio, TX: Therapy Skill Builders, 2003.
Kurtz, Lisa A. How to Help a Clumsy Child: Strategies for Young Children with Developmental Motor Concerns. London: Jessica Kingsley Publishing, 2003.
Liddle, Tara Losquadro, and Laura Yorke. Why Motor Skills Matter: Improving Your Child's Physical Development to Enhance Learning and Self-Esteem. New York: McGraw-Hill, 2003.
Smith, Jodene Lynn. Activities for Gross Motor Skills Development. Westminster, CA: Teacher Created Materials, 2003.
Horsch, Karen. "Clumsy Kids." Parenting (October 1, 2003): 246.
Jeansonne, Jennifer J. "Motor Skill Learning Research Looks Beyond Outcomes—Understanding the Components Needed for Skilled Performance Helps Develop Instructions and Training Methods." Biomechanics (June 1, 2004): 69.
Rink, Judith E. "It's Okay to Be a Beginner: Teach a Motor Skill, and the Skill May Be Learned. Teach How to Learn a Motor Skill, and Many Skills Can Be Learned—Even After a Student Leaves School." The Journal of Physical Education, Recreation & Dance 75 (August 2004): 31–4.
"Should the Main Objective of Adapted Physical Education be the Development of Motor Skills or the Development of Self-Esteem?" The Journal of Physical Education, Recreation & Dance (November-December 2003): 10–2.
Vickers, Marcia. "Why Can't We Let Boys Be Boys?" Business Week (May 26, 2003): 84.
American Academy of Pediatrics. 141 Northwest Point Blvd., Elk Grove Village, IL 60007. Web site: http://www.aao.org.
Developmental Research for the Effective Advancement of Memory and Motor Skills. 273 Ringwood Road, Freeville, NY 13068. Web site: http://www.dreamms.org.
"Motor Skills Disorder." eMedicine , January 3, 2003. Available online at http://www.emedicine.com/ped/topic2640.htm (accessed November 19, 2004).
Ken R. Wells |
There are many species of moth all over the world, that sometimes fill different ecological niches. Three of the most important are herbivore, pollinator, and food for predators. Some are considered pests because their larva (caterpillars) eat desired crops, or even clothing! But this is part of their role in any ecosytem: controlling the plant population and forcing plants to adapt to their feeding. Some caterpillars are even carnivorous, so they similarly affect small animal species. Humans even use moth larva sometimes as a biological control, introducing them to an area with an invasive plant species so that they will eat it. Of course, biological control isn’t always the best idea, because it involves introducing another invasive species, but it sometimes works.
Some plants actually owe their existence to moths, since moths pollinate a lot of plant species, often ones that open at night. They visit flowers for nectar, since consuming it can extend their short adult life, and pick up pollen from the male organs of the flower that is then deposted on the female organs of the next flower they find. In this way, both the moth and the plant keep each other alive. Other night pollinators include certain types of bats, and a recently discovered species of cricket.
Bats, ironically, are also one of the main predators of moths. Certain birds, frogs, and other animals use moths as a big part of their diet, so a loss of moths would cause a reduction in those groups as well.
Click here to cancel reply.
Sorry,At this time user registration is disabled. We will open registration soon!
Don't have an account? Click Here to Signup
© Copyright GreenAnswers.com LLC |
1KFG is pleased to announce the public release of the Pleomassaria siparia genome http://genome.jgi.doe.gov/Plesi1/Plesi1.home.html. Pleomassaria siparia (Pleomassariaceae) is a saprotrophic ascomycete in birch woodland and scrub in Europe and East Asia. Plant pathologists now monitor the presence of this species in periods of drought or following windbreaks more closely. Pleomassaria siparia seems to extend its range to the North where new disease agents of forest trees are registered increasingly. It has been suggested that the anamorph (Prosthemium betulinum) can endure lower temperatures and is used for hibernation. This fungus grows on broken twigs and branches of birch trees, but its role as a potential pathogen is not studied.
It was contributed to the 1KFG project by Manfred Binder and Pedro Crous of Centraalbureau voor Schimmelcultures KNAW, Netherlands, and represents the first genome sequenced for the order Pleomassariaceae. As always, please contact the lead contact and PIs associated with unpublished 1KFG genomes for permission prior to the use of any data in publications. |
A pill described as a “new era” for cancer treatments can extend the lives of patients with advanced kidney cancer by more than two years, it has been revealed.
Sunitinib was made available on the NHS this year after it was found to be more effective than traditional treatment in a typical clinical setting.
Interferon-alpha (IFN alpha) was previously used to treat metastatic, or spreading, kidney cancer, but injecting the drug affects the immune system and can result in serious side-effects, including fatigue, nausea and increased numbers of infections.
A phase III study, published in the Journal of Clinical Oncology, looked at the life expectancy of patients taking sunitinib compared with those on interferon-alpha.
The research, including trials on patients from South Wales Cancer Institute in Swansea, showed that survival for sunitinib patients given no further treatment after they stopped taking the drug was 28.1 months, compared with 14.1 months for those on interferon-alpha (IFN alpha).
Professor John Wagstaff, from the institute, said: “These data herald a new era in the treatment of metastatic kidney cancer in this country and throughout the world.”
Kidney cancer is diagnosed in more than 7,000 people in the UK each year and can be hard to treat. The disease causes about 3,600 deaths per year.
Copyright Press Association 2009 |
|Statement by Ms. LIU Lingxiao, Adviser of the Chinese Delegation, at the Third Committee of the 64th Session of the General Assembly the Rights of the Child (Item 65)|
(14 October 2009, New York)
Children are the future of mankind. To promote and protect the rights of the child is the consensus forged by the international community. This year marks the twentieth anniversary of the Convention on the Rights of the Child. Over the years, the international community, governments and civil society have made considerable efforts to create “a world fit for children” and achieved steady progress in promoting and protecting the rights of the child. The Chinese delegation would like to express its appreciation to the UN agencies, governments and the civil society for their efforts dedicated to children.
At the same time, we are fully aware of the numerous challenges in the area of protecting the rights of the child. The world faces not only myriad of problems of poverty, hunger, disease, disaster, illegal employment of child labor, drugs, and sexual exploitation, which violate the rights of the child, but also grave challenges posed by emerging unfavorable environment, such as the financial crisis. The international community should enhance cooperation and take effective measures to eliminate the root causes for the violation of the rights of the child. The Chinese government calls on the developed countries to provide financial and technical assistance to the developing countries so as to mitigate the negative impact of the financial crisis on children, and work together with them to create a harmonious and favorable environment for the healthy development of the children all over the world.
The child population in China makes up one-fifth of the world’s total. The Chinese government takes the healthy development of its hundreds of millions of children as a matter of the fundamental national interest. At present, China has set up a quite comprehensive system of laws and regulations for protecting the rights of the child; and the central and local governments at various levels have established special agencies on children, thus providing effective legal and institutional guarantee for promoting the rights of the child. The Guidelines of the Eleventh Five-Year Plan for National Economic and Social Development, set out for implementation since 2006, made the commitment to adhere to the principle of putting children first, safeguard in accordance with the law the rights of the child to life, development, protection and participation, improve the environment for the growth of children and promote the healthy physical and mental development of children. China’s National Human Rights Action Plan (2009-2010) issued in last April has set out specific provisions to safeguard the rights of the child. According to the Action Plan, China will strive to safeguard the rights of the child to life, development and participation based on the “best interests” of children.
The Chinese government is continuing its efforts to improve its legal and regulatory system for minors so as to strengthen their protection in judicial proceedings. To prevent and combat trafficking in children, an effective assistance mechanism has been established and specific measures have been taken to protect the rights of children in vulnerable situation, especially girls. Efforts have also been made to create conditions and opportunities for children at different physical and mental development levels to participate in families, schools, communities and social life.
The Chinese government consistently fulfils in good faith its treaty obligations. China has submitted two reports on the implementation of the Convention on the Rights of the Child and its initial report on the implementation of the Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution and Child Pornography. The reports submitted by China have been highly evaluated by the Committee on the Rights of the Child. Since last February, the Chinese government has started the preparation of its third and fourth combined periodic report on the implementation of the Convention of the Rights of the Child and actively encouraged the participation of the civil society in the process of preparing the report.
The Chinese government has long carried out effective cooperation with UNICEF and achieved positive results in project implementation in priority areas, such as health and nutrition, education, child protection and community service, prevention of natural disasters, the development of children in poverty-stricken areas, advocacy and communication and dissemination of knowledge.
As a developing country with a population of 367 million under the age of 18, China faces a multitude of challenges in its work concerning children. The Chinese government will continue to work with the international community to build a better future for the children.
Thank you, Mr. Chairman. |
Green Stone & Tile Recommendations
rLike all building materials, stone and tile products have both beneficial and negative environmental aspects. One of the strongest positives is that stone, tile, and grout (once it has cured) release few, if any, VOCs or other problematic air emissions. People with serious allergies or other chronic respiratory ailments often tolerate these materials better than other finish materials. In addition, stone and tile can be thoroughly cleaned and sealed, reducing the potential for build-up of molds, dust mites, and other allergy-causing agents.
It should be noted, however, that all earth-based products (stone, tile, masonry, concrete, gypsum wallboard, etc.) contain traces of radon, a radioactive gas that occurs naturally in soil and rock throughout the U.S. and elsewhere. There is currently some discussion within industry circles as to whether the levels of this off-gassing in stone products, such as granite, are problematic. The EPA's most recent view (August 2008) is that the amount of radon emitted by earth-based building materials is generally very small compared to typical background levels of radon present indoors and outdoors. A few stone products emit more significant levels of radon—it depends on the quarry—but they are rare. If you are concerned about a particular product, have it tested.
Another important consideration is the relative durability of a product, and here stone and tile are superior to other finish materials. The durability of stone and tile varies according to type and depends upon each material's hardness and resistance to wear by abrasive substances, water, and physical impacts. With proper maintenance (periodic grout repair and surface sealants where recommended by the manufacturer), these materials last a very long time, from 50 to hundreds of years. This durability can reduce long-term maintenance and replacement costs to such a degree that life cycle costs may actually be less than those associated with relatively inexpensive products, especially in areas of high wear where periodic replacement (averaging about every seven years) is the norm. The environmental benefits from this durability include a reduction in the local impacts of resource extraction and a savings in the energy consumed over time for manufacturing, reinstallation, and disposal.
However, stone and tile products, because of their weight, require more energy for transportation than other finish materials for floors and walls, producing greater contributions to global warming. For that reason, from an environmental standpoint it is definitely preferable to buy products that are quarried and manufactured relatively close to the building site. The extraction of raw materials does have an environmental impact, but quarrying operations are typically smaller in scale and the impacts are more contained than, for example, large coal or metallic ore mining operations.
Stone varieties most commonly used for construction include granite, marble, quartzite, limestone, slate, shale, sandstone, soapstone, and travertine. Materials that have low water absorption rates (most granites, marbles, quartzites, and slates, and some limestones) can better resist freeze-thaw cycles in climates where that is an issue. Marble surfaces degrade when exposed to acids, so this material is not a good choice for countertops or building exteriors in smoggy environments. From a design standpoint, stone, with its natural appearance and richness of color and texture, can become a strong focus within a design that has a naturalistic aesthetic.
Terrazzo consists of small colored chips (stone, masonry, concrete, tile, glass, etc.) bound together by an adhesive matrix that is either concrete or epoxy-based. Installers can incorporate recycled materials such as glass into the matrix, improving the product's environmental profile. Epoxy-resin binders are not completely free of emissions during the cure period, but most people tolerate the cured product well. Because of the wide range of materials and colors available for both the matrix and binder, terrazzo lends itself to diverse aesthetic effects. It can be designed as a subtly textured background surface, as a major focal point, or as anything in between.
Like stone, ceramic tile is extremely durable. Porcelain tile, originally named for the porcelain clays that it was manufactured from, is now defined as any ceramic tile with a low water absorption factor (under .5). Ceramic tile is more energy-intensive to produce than stone or other flooring alternatives (wood and bamboo, for instance), so it is not inherently a green product from an energy standpoint, but this is offset to some extent by the greater longevity of the product. There are few specifically green ceramic tile products, although most manufacturers recycle their production clay wastes. Ceramic tile is available in a wide range of colors, textures, and patterns, glazed or unglazed, so the design possibilities are endless.
Even though glass tiles have been around since before the Roman era, many new products incorporating pre- or post-consumer recycled glass have recently become available. Some of these tiles have the appearance (and durability) of ceramic tile while others look (and wear) more like traditional glass tiles, where abrasions tend to become apparent more quickly. Recycled glass tiles are more energy-efficient to manufacture than ceramic tile, utilizing about one-half as much energy, whereas cast-glass tiles require about twice as much energy to produce as ceramic tiles. Although glass tile does not have as wide a range of colors, textures, and patterns as ceramic tile, it often has an appealing translucency and softness of color and texture that cannot be found in ceramic tile.
Environmental considerations should be addressed during the installation phase of a project in order to protect the health of construction workers and the health of the building's occupants. Toxic air emissions (from uncured adhesives, grout, and terrazzo resins) and airborne irritants such as construction dust should be reduced as much as possible or avoided altogether, thereby reducing the potential for absorption into porous building materials (such as gypboard, wood, carpets, and fabrics) that could later be re-released into the enclosed living spaces.
First, select adhesives and sealants that are not only appropriate for the intended purpose but that also contain minimal VOCs or other toxic emissions. Secondly, specify that your contractor do their cutting and grinding of tile and stone outdoors as much as is reasonably possible. Also, note that grout may stain or trap dirt and mold spores if not properly sealed.
John Bridge Ceramic Tile offers an advice forum for people with tile installation questions.
The National Training Center for Stone and Masonry Trades has a substantial list of publications with information about installation and care of various stones, although the website does not address environmental issues.
The Marble Institute has a section with many resources for consumers on stone materials, installation methods, care and maintenance, and environmental considerations.
The Tile Council of North America has a list of publications on ceramic tile installation and maintenance. |
Classification and Assessment of Psychiatric Disorders in Adults with Intellectual Disabilities
There are several types of classifications and assessments that may be useful when working with people with intellectual disabilities.
Sally-Ann Cooper (UK)
There are several types of classifications and assessments that may be useful when working with people with intellectual disabilities. These may address the following areas:
- the level of a person's ability
- a person's skills, functioning and community participation
- the cause of a person's intellectual disabilities
- the range of mental disorders experienced by people with intellectual disabilities.
Mental disorders are commonly experienced by people with intellectual disabilities - the point prevalence has been measured as 40% (Cooper and Bailey, 2001). A person with intellectual disabilities is therefore considerably more likely to have an additional mental disorder than the average person from the general population. This is not surprising when one considers the likely causes of mental disorders. As well as having all the risk factors that are relevant for the whole population, people with intellectual disabilities may have extra risk factors. These can be considered using a biological-psychological-social-developmental framework (see Figure 1: Possible risk factors for mental disorders).
The integration and interpretation of information collected during a thorough psychiatric assessment typically comprises three stages:
- measurement of psychopathology
- classification of psychopathology into diagnostic groups
- determining the likely aetiology.
Methods - the methods of assessment used with the general population are also relevant when working with people with intellectual disabilities, supplemented by some additional special considerations. This includes spending time with the person to hear their concerns and experiences and to conduct an examination; taking a collateral history from a close relative or other close person; reviewing previous medical case notes; and speaking to professionals from other disciplines, such as community nurses, psychologists and social workers, who are involved in supporting the person. The information gathered should cover the usual psychiatric headings of full history, mental state examination, physical examination and special investigations. The findings can then be integrated and interpreted into the three-stage framework to summarize the relevant psychopathology (positive and negative findings), classify and describe likely aetiology. It is important to conduct a thorough, detailed assessment so that the treatment/intervention/support plan can be devised in such a way as to optimize the chance of best possible outcome for each individual in his or her particular set of circumstances.
Special assessment considerations
Psychiatric assessment of a person with intellectual disabilities has much in common with assessments undertaken with people of average ability, but there are a number of additional special considerations (see Figure 2: Psychiatric assessment of a person with an intellectual disability).
Capacity to consent: a person's intellectual disabilities and/or additional mental disorder may influence his or her capacity to consent to an intervention. Assessment should therefore include:
- the person's understanding of a proposed intervention and what it involves
- the reason for the proposed intervention
- the potential benefits of the intervention
- the potential risks of the intervention
- the potential consequences of declining the intervention
- the range of alternative interventions, including their potential benefits and risks.
A person may have capacity to consent to or refuse some interventions (e.g. a blood test to screen for hypothyroidism) but not have capacity to consent to or refuse more complex interventions (e.g. cardiac surgery or electroconvulsive therapy). When a person does not have capacity to consent to a particular intervention, it is good practice to offer as much information and explanation as possible in as accessible a format as possible, to enable the person to partially consent/decline as far as they have capacity to do so. It is then important to include the person's next-of-kin, advocate, legal representative/guardian, professionals from other disciplines involved in the person's care and key support workers in decision-making. The exact process will depend on the area of jurisdiction; for example, in Scotland the legal framework provided by the Adults With Incapacity (Scotland) Act 2000 should be followed (see also Keywood and Flynn 2003: pp.59-62). In some circumstances, implementation of mental health legislation may be appropriate.
Communication: a number of factors can influence a person's ability to understand and to express opinions and information. The extent and type of a person's intellectual disabilities influences communication ability and needs, as can a range of additional factors, such as:
- neurological factors
- mental disorders
- drug side-effects
- life experiences that have shaped personality development (e.g. leading to social phobias or lack of confidence)
- social circumstances
- the setting in which the communication is taking place
- the communication style of the other person(s)
It is important to consider all these factors in order to enhance communication. (see Figure 3: Communicating with a person with an intellectual disability).
Clinicians should remain aware of possible communication limitations; even the most able person with intellectual disabilities may have difficulties remembering and communicating the temporal sequence of past events or symptoms. Acquiescence and suggestibility may also remain a limitation to the assessment of information. It should be remembered that a person with limited or no verbal communication skills may use other methods of communicating their feelings. This may include a change in their usual behaviour, or even aggression if this is the only or easiest way to communicate pain, distress or fear (see also Joyce 2003: pp.17-20).
Collateral history: taking a history from an informant is an integral part of psychiatric assessment. Sometimes several informants are necessary. The more severe the person's intellectual disabilities, the greater the reliance on carers for information; for people with profound intellectual disabilities and no verbal communication skills, most of the assessment information will be provided by carers.
Information from parents - parents are usually able to provide detailed information from the past. This helps to provide an understanding of how the person developed through their childhood, the adverse experiences they encountered, their achievements and relationships that shaped the person they have become as an adult. This information is also important to distinguish the usual behaviour and traits of the person from behaviours that are new (i.e. symptoms) and may be part of mental ill-health. Important background information may also include:
- past psychiatric or medical information
- past drug and other treatments, and their effectiveness
- family history of psychiatric and medical problems
- details of the person's skills and abilities, against which current function may be compared (regression of skills is often a feature of mental ill-health, but its detection requires knowledge of previous level of skills).
Information from others - if the person no longer lives with their parents, the parents will not be able to provide detailed information on daily aspects of life. The level of detail and accuracy of information from support workers may depend on various factors, such as:
- how much individual time the support worker spends with the person and how well they know her/him
- how many other people the worker also supports
- how well information is shared between members of the support teams
- how well organized care is (e.g. 'key-worker' system, identified responsibilities)
- how well the employing organization supports and develops its support workers.
If a person's support package has only recently been established, the support workers may be able to provide limited information only. Understandably, support workers may volunteer information on needs that present the greatest challenge to care (e.g. aggression) and omit symptoms such as social withdrawal or loss of energy. It is important, therefore, that a thorough assessment is always conducted of all possible psychopathology, using a semi-structured approach, after the person and their support worker have given the history in their own words.
Where necessary, additional potential informants, such as employers, day centre officers or support workers from previous placements, should be approached, and limitations and gaps in the gathered information should be recognized.
Pathoplastic effect of developmental level on psychopathology: psychopathology is modified by developmental level. This pathoplastic effect is greater the more severe the person's intellectual disabilities. Understanding of intellectually complex concepts such as guilt requires a developmental age of about 7 years. An adult with profound intellectual disabilities will learn throughout her/his life, will develop skills, and will have adult biological drives and motivations and therefore is not the same as a 0-3-year-old (the equivalent mental age to profound intellectual disabilities), but she/he will not acquire the mental capacity to understand abstract concepts requiring a higher developmental age. Similarly, psychopathology such as hopelessness, worthlessness, suicidal ideation, delusional perception, and distorted body image do not present at more severe levels of intellectual disabilities. Additionally, some psychopathology (e.g. psychotic symptoms) requires good verbal communication skills to describe its presence, hence it may not be elicited in people with profound intellectual disabilities.
Some symptoms that occur during mental ill-health in adults with intellectual disabilities are rare in adults of average ability. Examples include loss of skills, impairment of communication, and onset of or exacerbation of pre-existing problem behaviours. Irritability is often the core mood symptom presenting in depressive episodes. Developmental level can also have an impact on the content of abnormal phenomena. For example, delusions may have a 'childlike' content, reflecting the intellectual capacity and life experiences of the person.
Suggestibility can influence the characteristics of psychopathology. Regarding misery, for example, the assessor may be able to cheer up the person to the point of smiling or laughing during the interview. Characteristically, the person is unable to sustain the cheerful mood state, and returns to misery when not being talked out of it. Delusions may not be 'unshakeable' - i.e. the assessor may be able to gain the person's acquiescence that they are not really true; however, the person returns to the delusional belief once not being actively persuaded otherwise.
Developmental history: assessment of development serves several functions.
- Measurement of developmental level enables appropriate interpretation of psychopathology (in the context of the pathoplastic effect of intellectual disabilities on psychopathology).
- Determining the usual pattern of behaviours and skills for the person is essential to distinguish symptoms of mental ill-health from long-standing traits (e.g. sleep disturbance may be a long-standing trait, or one of several symptoms of depressive episode, requiring treatment).
- Diagnosis of autistic spectrum disorders (ASD) and attention deficit hyperactivity disorder (ADHD) requires knowledge of developmental history (in addition to present information) (see also Howlin 2003; pp. 24-8).
- A good understanding of development reduces the likelihood of 'diagnostic overshadowing' (the tendency to attribute all problems to the person's intellectual disabilities - e.g. failing to identify, and therefore treat, a person's superimposed depressive episode or anxiety disorder). This is particularly relevant for people who in addition to intellectual disabilities have ASD or ADHD; depression and anxiety are thought to occur commonly in people with ASD.
- For some individuals, developmental models may be relevant in understanding the aetiology of problem behaviours: e.g. head-banging is a developmental phase at about 18 months of age; oppositional behaviour is common at about 2 years. For an adult with a similar level of mental capacity, developmental models may help explain aetiology, with behaviour development arrested at certain stages such that it is a problem for the person.
- Plans of treatment/interventions/supports need to be devised in a way that is developmentally appropriate.
- Determining the underlying cause of a person's intellectual disabilities identifies genetic causes. An awareness of the associated health factors allows for early detection and/or prevention. For example, hypothyroidism is common in Down's syndrome, as are sensory impairments and cardiac anomalies, all of which can be screened for.
Behavioural phenotypes: many genetic causes of intellectual disabilities have specific behavioural phenotypes. This area is covered in O'Brien 2003: pp.33-38.
Epilepsy is common, occurring in about 25% of adults with intellectual disabilities (see also Bernal 2003: pp.69-73). Compared with epilepsy among the general population, people with intellectual disabilities often have mixed seizure types and seizure frequency that is difficult to control. This is of direct relevance to psychiatric assessment, and often requires differential diagnosis between seizures (particularly complex partial seizures), mental ill-health (such as panic attacks, problem behaviours and depressive episodes) and drug side-effects (e.g. side-effects of anti-epileptic drugs can mimic depressive episodes or problem behaviours). As mental disorders and epilepsy are both common in this population, they often co-exist. People who have epilepsy may also have a higher rate of mental disorders than those who do not. They may have psychological sequelae of the epilepsy itself, and a proportion additionally experience pseudo-seizures. Psychiatric assessment should include an assessment of epilepsy in order to address these issues, and therefore requires a knowledge of epilepsy, its associations and treatments, in addition to its interface with psychiatric disorders.
Assessment of epilepsy is also required to inform the development of treatment plans in view of the effects of psychotropic drugs on seizure threshold, and drug interactions between anti-epileptic drugs and other psychotropic drugs.
Physical health: for many reasons, physical disabilities and disorders are common in people with intellectual disabilities, who are also more likely to be prescribed medication. There may be psychiatric sequelae to some of these physical health needs, and side-effects of drugs and drug combinations. Assessment of physical health and drug histories therefore assumes a more important component of psychiatric assessment than it might for a person of average ability.
Classification of mental disorders is undertaken for a variety of reasons. In the mid-20th century it was recognized that there was considerable international variation in psychiatric practice, and the introduction of operationalized diagnostic criteria focused attention on improved, more standardized psychiatric assessments and diagnostic procedures. It could be contended that while such issues are no longer contemporary in general psychiatry, they remain relevant for psychiatric practice with people with intellectual disabilities. Classification can therefore improve clinical practice and so benefit individuals. Classification systems also provide a tool to use in the description of whole population needs and in service planning. Classification also has an essential role in research. Inclusion criteria must be clearly described in order to:
- allow comparison of findings between different studies
- replicate studies
- evaluate effectiveness of treatment in one group compared with another
- study the epidemiology of mental disorders in the population
- identify potentially modifiable vulnerability and protective factors for mental disorders.
All of the above requires the use of operationalized diagnostic criteria as described in a classificatory system.
The development of DC-LD
Classification of mental disorders among the general population typically draws on the diagnostic criteria within ICD-10 or DSM-IV. However, while these systems may be appropriate for people with mild learning [intellectual] disabilities, they lack validity and utility for people with more severe learning [intellectual] disabilities or with ASD or ADHD in addition to mild learning [intellectual] disabilities. DC-LD (Diagnostic Criteria for Psychiatric Disorders for Use with Adults with Learning Disabilities; Royal College of Psychiatrists, 2001) provides more appropriate operationalized diagnostic criteria within a classification system specifically designed for use with adults with learning [intellectual] disabilities, and is complementary to ICD-10 (see Figure 4: Diagnostic Criteria for Psychiatric Disorders for Use with Adults with Learning [Intellectual] Disabilities [DC-LD]).
The development of DC-LD addressed the following issues:
- the pathoplastic effect of increasing severity of learning [intellectual] disabilities on psychopathology
- limitations in eliciting psychopathology from informant histories (and hence the increased likelihood of inaccuracy introduced by the extensive sub-classifications within ICD-10 main categories)
- inconsistencies within ICD-10 and DSM-IV regarding classification of problem behaviours, features that are recognized as part of a behavioural phenotype, and use or otherwise of the 'organic' categories
- the need to distinguish between features due to level of learning [intellectual] disabilities, cause of learning [intellectual] disabilities, developmental disorders, mental illness, personality disorders and problem behaviours.
DC-LD introduces a hierarchical approach to improve clinical practice and reduce the risks of diagnostic overshadowing. It provides further information on assessment and classification of mental disorders in adults with learning [intellectual] disabilities.
| PRACTICE POINTS|
FIGURE 1: Possible risk factors for mental disorders
|FIGURE 2: Psychiatric assessment of a person with an intellectual disability|
Throughout the assessment, operate across four dimensions
Conduct a full psychiatric assessment, including all the usual component parts
Additionally, special considerations are required during assessment
Integrate and interpret the information from the assessment
Devise plans of treatment/interventions/support based on the integrated information from the assessment
|FIGURE 3: Communicating with a person with a learning disability|
|FIGURE 4: Diagnostic Criteria for Psychiatric Disorders for Use with Adults with Learning [Intellectual] Disabilities (DC-LD)|
The DC-LD classificatory system (designed specifically for people with learning disabilities, and to complement ICD-10) describes a person's mental health on axes and levels:
The appendices provide additional information on:
The figures provide:
The text of DC-LD provides additional information on psychiatric assessment of adults with learning [intellectual] disabilities
Bernal J, Epilepsy in People with Learning Disabilities. Psychiatry 2003; 2:9; 69-73.
Cooper S-A, Bailey N M. Psychiatric disorders amongst adults with learning disabilities - prevalence and relationship to ability level. Ir J Psychol Med 2001; 18: 45-53.
Howlin P, Autistic Spectrum Disorders. Psychiatry 2003; 2:8: 24-28.
Keywood K, Flynn M, Healthcare Decision-making by Adults with Learning Disabilities: Some Levers to Changing Practice. Psychiatry 2003; 2:9: 59-62.
Joyce T, Functional Analysis and Challenging Behaviour. Psychiatry 2003; 2:8: 17-20.
O'Brien G, Behavioural Phenotypes in Adulthood. Psychiatry 2003; 2:8: 33-38.
Books Beyond Words series. London: Gaskell.
(A series of purpose-designed publications presenting pictorial information to facilitate work with people with intellectual disabilities. They cover a range of topics and are published by Gaskell.)
Royal College of Psychiatrists. DC-LD (Diagnostic Criteria for Psychiatric Disorders for Use with Adults with Learning Disabilities/Mental Retardation). London: Gaskell, 2001.
(A new classificatory system designed specifically for use with adults with intellectual disabilities; it is complementary to ICD-10. As well as presenting operationalized diagnostic criteria, the text discusses issues relevant to psychiatric assessment with this population.)
|The pictures in this article are taken from 'Feeling Blue' and 'Getting on with Epilepsy'. See www.rcpsych.ac.uk/publications/bbw.|
|This article was first published in Psychiatry; Volume 2:8, August 2003 and reprinted with the kind permission of the Medicine Publishing Company.| |
|Area||14,000,000 km² (5,405,430 mi²) (280,000 km² (108,108 mi²) ice-free, 13,720,000 km² (5,297,321 mi²) ice-covered)|
|Population||~1000 (none permanent)|
|governed by the Antarctic Treaty Secretariat
|Partial Territorial claims (subject to the Antarctic Treaty System)|| Argentina
|Reserved the right to make claims|| Russia
Antarctica is Earth's southernmost continent, overlying the South Pole. Situated in the southern hemisphere and largely south of the Antarctic Circle, Antarctica is surrounded by the Southern Ocean. At 14.4 million km², it is the fifth-largest continent in area after Asia, Africa, North America, and South America; in turn, Europe and Australia are smaller. Some 98 percent of Antarctica is covered by ice, which averages at least 1.6 km in thickness.
On average, Antarctica is the coldest, driest, and windiest continent, and has the highest average elevation of all the continents. Since there is little precipitation, except at the coasts, the interior of the continent is technically the largest desert in the world. There are no permanent human residents and Antarctica has never had an indigenous population. Only cold-adapted plants and animals survive there, including penguins, fur seals, mosses, lichens, and many types of algae.
The name Antarctica comes from the Greek antarktikos, meaning "opposite to the Arctic." Although myths and speculation about a Terra Australis ("Southern Land") date back to antiquity, the first confirmed sighting of the continent is commonly accepted to have occurred in 1820 by the Russian expedition of Mikhail Lazarev and Fabian Gottlieb von Bellingshausen. However, the continent remained largely neglected for the rest of the nineteenth century because of its hostile environment, lack of resources, and isolated location.
The Antarctic Treaty was signed in 1959 by twelve countries. To date, forty-five countries have signed the treaty. The treaty prohibits military activities and mineral mining, supports scientific research, and protects the continent's ecozone. Ongoing experiments are conducted by more than 4,000 scientists of many nationalities and with different research interests.
Belief in the existence of a Terra Australis—a vast continent located in the far south of the globe to "balance" the northern lands of Europe, Asia, and North Africa—had existed since the times of Ptolemy (first century CE), who suggested the idea in order to preserve the symmetry of all known landmasses in the world. Depictions of a large southern landmass were common in maps such as the early sixteenth century Turkish Piri Reis map. Even in the late seventeenth century, after explorers had found that South America and Australia were not part of the fabled "Antarctica," geographers believed that the continent was much larger than its actual size.
European maps continued to show this hypothetical land until Captain James Cook's ships, HMS Resolution and Adventure, crossed the Antarctic Circle on January 17, 1773, and once again in 1774. The first confirmed sightings of Antarctica took place in 1920 and is credited to captains and crews of three ships:
Von Bellingshausen is reported to have sighted Antarctica on January 27, 1820, three days before Bransfield sighted land, and ten months before Palmer did so in November 1820. On that day the two-ship expedition led by Von Bellingshausen and Mikhail Petrovich Lazarev reached a point within 32 km (20 miles) of the Antarctic mainland and saw ice fields there. The first documented landing on mainland Antarctica was by the American sealer John Davis in Western Antarctica on February 7, 1821, although some historians dispute this claim.
In December 1839, as part of the United States Exploring Expedition of 1838–1842 (conducted by the United States Navy), the expedition comprised of 433 men and six ships sailed from Sydney, Australia into the Antarctic Ocean, as it was then known, and reported the discovery "of an Antarctic continent west of the Balleny Islands." That part of Antarctica was later named "Wilkes Land," after the expedition's commander, Lt. Charles Wilkes, a name it maintains to this day.
In 1841, explorer James Clark Ross passed through what is now known as the Ross Sea and discovered Ross Island (both of which were named for him). He sailed along a huge wall of ice that was later named the Ross Ice Shelf. Mount Erebus and Mount Terror are named after two ships from his expedition: HMS Erebus and Terror. Mercator Cooper landed in Eastern Antarctica on January 26, 1853.
During an expedition led by Ernest Shackleton in 1907, parties led by T. W. Edgeworth David became the first to climb Mount Erebus and to reach the South Magnetic Pole. In addition, Shackleton himself and three other members of his expedition made several firsts in December 1908–February 1909: they were the first humans to traverse the Ross Ice Shelf, the first to traverse the Transantarctic Mountain Range (via the Beardmore Glacier), and the first to set foot on the South Polar Plateau.
On December 14, 1911, a party led by Norwegian polar explorer Roald Amundsen from the ship Fram became the first to reach the geographic South Pole, using a route from the Bay of Whales and up the Axel Heiberg Glacier. One month later, the Scott Expedition reached the pole.
Richard Evelyn Byrd led several voyages to the Antarctic by plane in the 1930s and 1940s. He is credited with implementing mechanized land transport on the continent and conducting extensive geological and biological research. However, it was not until October 31, 1956, that anyone set foot on the South Pole again; on that day a U.S. Navy group led by Rear Admiral George Dufek successfully landed an aircraft there.
Centered asymmetrically around the South Pole and largely south of the Antarctic Circle, Antarctica is the southernmost continent and is surrounded by the southern waters of the World Ocean. Alternatively it is washed by the Southern Ocean or the southern Pacific, Atlantic, and Indian Oceans. It covers more than 14 million km², making it the fifth-largest continent, about 1.3 times larger than Europe. The coastline measures 17,968 km (11,160 miles) and is mostly characterized by ice formations.
Antarctica is divided in two by the Transantarctic Mountains close to the neck between the Ross Sea and the Weddell Sea. The portion west of the Weddell Sea and east of the Ross Sea is called Western Antarctica and the remainder Eastern Antarctica, because they roughly correspond to the Western and Eastern Hemispheres relative to the Greenwich meridian.
Approximately 98 percent of Antarctica is covered by the Antarctic ice sheet, a sheet of ice averaging at least one mile in thickness. The continent has approximately 90 percent of the world's ice (and thereby approximately 70 percent of the world's fresh water). If all of this ice were melted, sea levels would rise about 200 feet (61 m). In most of the interior of the continent precipitation is very low, down to 20 mm/year; in a few "blue ice" (glacial ice) areas precipitation is lower than mass loss by sublimation causing the local mass balance to be negative. In the dry valleys the same effect occurs over a rock base, leading to a desiccated landscape.
Western Antarctica is covered by the West Antarctic Ice Sheet. The sheet has been of recent concern because of the real, if small, possibility of its collapse. If the sheet were to break down, ocean levels would rise by several meters in a relatively geologically short period of time, perhaps a matter of centuries. Several Antarctic ice streams, which account for about 10 percent of the ice sheet, flow to one of the many Antarctic ice shelves.
Vinson Massif, the highest peak in Antarctica at 16,050 feet (4,892 meters), is located in the Ellsworth Mountains. Although Antarctica is home to many volcanoes, only Mount Erebus is known to be active. Located on Ross Island, Erebus is the southernmost active volcano. There is another famous volcano called Deception Island, which is famous for its giant eruption in 1970. Minor eruptions are frequent and lava flow has been observed in recent years. Other dormant volcanoes may potentially be active. In 2004, an underwater volcano was found in the Antarctic Peninsula by American and Canadian researchers. Recent evidence shows this unnamed volcano may be active.
Antarctica is home to more than 70 lakes that lie thousands of meters under the surface of the continental ice sheet. Lake Vostok, discovered beneath Russia's Vostok Station in 1996, is the largest of these subglacial lakes similar in size to Lake Ontario. It is believed that the lake has been sealed off for 25 million years. There is some evidence, in the form of ice cores drilled to about 400 m above the water line, that Vostok's waters may contain microbial life. The sealed, frozen surface of the lake shares similarities with Jupiter's moon Europa. If life is discovered in Lake Vostok, this would strengthen the argument for the possibility of life on Europa.
The climate of Antarctica does not allow extensive vegetation. A combination of freezing temperatures, poor soil quality, lack of moisture, and lack of sunlight inhibit the flourishing of plants. As a result, plant life is limited to mostly mosses and liverworts. The autotrophic community is made up of mostly protists. The flora of the continent largely consists of lichens, bryophytes, algae, and fungi. Growth generally occurs in the summer, and only for a few weeks at most.
There are more than 200 species of lichens and approximately 50 species of bryophytes, such as mosses. Seven hundred species of algae exist, most of which are phytoplankton. Multicolored snow algae and diatoms are especially abundant in the coastal regions during the summer. There are two species of flowering plants found in the Antarctic Peninsula: Deschampsia antarctica (Antarctic hair grass) and Colobanthus quitensis (Antarctic pearlwort).
Land fauna is nearly completely invertebrate. Invertebrate life includes microscopic mites, lice, nematodes, tardigrades, rotifers, krill, and springtails. The flightless midge Belgica antarctica, just 12 mm in size, is the largest land animal in Antarctica. The Snow Petrel is one of only three birds that breed exclusively in Antarctica. They have been seen at the South Pole.
A variety of marine animals exist and rely, directly or indirectly, on the phytoplankton. Antarctic sea life includes penguins, blue whales, orcas, and fur seals. The Emperor penguin is the only penguin that breeds during the winter in Antarctica, while the Adélie Penguin breeds farther south than any other penguin. The Rockhopper penguin has distinctive feathers around the eyes, giving the appearance of elaborate eyelashes. King penguins, Chinstrap penguins, and Gentoo Penguins also breed in the Antarctic. It is the male partner of both the King and Emperor penguins that is responsible for incubating the single egg for up to two months by balancing it on top of their feet and keeping it warm under a special pouch, while the female feeds out at sea.
The Antarctic fur seal was very heavily hunted in the eighteenth and nineteenth centuries for its pelt by sealers from the United States and the United Kingdom. The Weddell Seal, a "true seal," is named after Sir James Weddell, commander of British sealing expeditions in the Weddell Sea. Antarctic krill, which congregates in large schools, is the keystone species of the ecosystem of the Southern Ocean, and is an important food organism for whales, seals, leopard seals, fur seals, squid, icefish, penguins, albatrosses, and many other birds.
The 1978 enactment of the Antarctic Conservation Act in the U.S. brought several restrictions to U.S. activity on the continent. The introduction of alien plants or animals can bring a criminal penalty, as can the extraction of any indigenous species. The overfishing of krill, which plays a large role in the Antarctic ecosystem, led officials to enact regulations on fishing. The Convention for the Conservation of Antarctic Marine Living Resources (CCAMLR), a treaty that came into force in 1980, requires that regulations managing all Southern Ocean fisheries consider potential effects on the entire Antarctic ecosystem. Despite these new acts, unregulated and illegal fishing, particularly of Patagonian toothfish, remains a serious problem. The illegal fishing of toothfish has been increasing, with estimates of 32,000 tons in the year 2000.
Antarctica is the coldest place on Earth. It is a frozen desert with little precipitation; the South Pole itself receives less than 4 inches (10 cm) per year, on average. Temperatures reach a minimum of between -80°C and -90°C (-112°F and -130°F) in the interior in winter and reach a maximum of between 5°C and 15°C (41°F and 59°F) near the coast in summer. Sunburn is often a health issue as the snow surface reflects almost all of the ultraviolet light falling on it.
Eastern Antarctica is colder than its western counterpart because of its higher elevation. Weather fronts rarely penetrate far into the continent, leaving the center cold and dry. Despite the lack of precipitation over the central portion of the continent, ice there lasts for extended time periods. Heavy snowfalls are not uncommon on the coastal portion of the continent, where snowfalls of up to 1.22 meters (48 inches) in 48 hours have been recorded. At the edge of the continent, strong katabatic winds off the polar plateau often blow at storm force. In the interior, however, wind speeds are typically moderate. During summer, more solar radiation reaches the surface during clear days at the South Pole than at the equator because of the 24 hours of sunlight each day at the Pole.
Antarctica is colder than the Arctic for two reasons. First, much of the continent is more than 3 km above sea level, and temperature decreases with elevation. Second, the Arctic Ocean covers the north polar zone: The ocean's relative warmth is transferred through the icepack and prevents temperatures in the Arctic regions from reaching the extremes typical of the land surface of Antarctica.
Given the latitude, long periods of constant darkness or constant sunlight create climates unfamiliar to human beings in much of the rest of the world. The aurora australis, commonly known as the southern lights, is observed in the night sky near the South Pole. Typically the aurora appears either as a diffused glow or as "curtains" that approximately extend in the east-west direction. Each curtain consists of many parallel rays, each lined up with the local direction of the magnetic field lines, suggesting that aurora is shaped by the earth's magnetic field. Another unique spectacle is diamond dust, a ground-level cloud composed of tiny ice crystals that may continue for several days without interruption. It generally forms under otherwise clear or nearly clear skies, so people sometimes also refer to it as clear-sky precipitation. A sun dog, a frequent atmospheric optical phenomenon, is a bright "spot" beside the true sun that typically appears when the sun is low, such as at sunrise and sunset.
More than 170 million years ago, Antarctica was part of the supercontinent Gondwana. Over time, Gondwana gradually broke apart and Antarctica as it is known today was formed around 25 million years ago.
During the Cambrian period, Gondwana had a mild climate. West Antarctica was partially in the northern hemisphere, and during this period large amounts of sandstones, limestones, and shales were deposited. East Antarctica was at the equator, where sea-floor invertebrates and trilobites flourished in the tropical seas. By the start of the Devonian period (416 Mya), Gondwana was in more southern latitudes and the climate was cooler, though fossils of land plants are known from this time. Sand and silts were laid down in what is now the Ellsworth, Horlick, and Pensacola Mountains. Glaciation began at the end of the Devonian period (360 Mya), as Gondwana became centered around the South Pole and the climate cooled, though flora remained. During the Permian period, the plant life became dominated by fern-like plants such as Glossopteris, which grew in swamps. Over time these swamps became deposits of coal in the Transantarctic Mountains. Towards the end of the Permian period, continued warming led to a dry, hot climate over much of Gondwana.
As a result of continued warming, the polar ice caps melted and much of Gondwana became a desert. In East Antarctica, the seed fern became established, and large amounts of sandstone and shale were laid down at this time. The Antarctic Peninsula began to form during the Jurassic period (206-146 Mya), and islands gradually rose out of the ocean. Ginkgo trees and cycads were plentiful during this period, as were reptiles such as Lystrosaurus. In West Antarctica, coniferous forests dominated through the entire Cretaceous period (146-65 Mya), though Southern beech began to take over at the end of this period. Ammonites were common in the seas around Antarctica, and dinosaurs were also present, though only two Antarctic dinosaur species (Cryolophosaurus, from the Hanson Formation, and Antarctopelta) have been described to date. It was during this period that Gondwana began to break up.
Africa separated from Antarctica around 160 Mya, followed by the Indian subcontinent, in the early Cretaceous (about 125 Mya). About 65 Mya, Antarctica (then connected to Australia) still had a tropical to subtropical climate, complete with a marsupial fauna. About 40 Mya Australia-New Guinea separated from Antarctica and the first ice began to appear. Around 23 Mya, the Drake Passage opened between Antarctica and South America, which resulted in the Antarctic Circumpolar Current. The ice spread, replacing the forests that then covered the continent. Since about 15 Mya, the continent has been mostly covered with ice.
The geological study of Antarctica has been greatly hindered by the fact that nearly all of the continent is permanently covered with a thick layer of ice. However, new techniques such as remote sensing, ground-penetrating radar, and satellite imagery have begun to reveal the structures beneath the ice.
Geologically, West Antarctica closely resembles the Andes mountain range of South America. The Antarctic Peninsula was formed by uplift and metamorphism of sea-bed sediments during the late Paleozoic and the early Mesozoic eras. This sediment uplift was accompanied by igneous intrusions and volcanism. The most common rocks in West Antarctica are andesite and rhyolite volcanics formed during the Jurassic period. There is also evidence of volcanic activity, even after the ice sheet had formed, in Marie Byrd Land and Alexander Island. The only anomalous area of West Antarctica is the Ellsworth Mountains region, where the stratigraphy is more similar to the eastern part of the continent.
East Antarctica is geologically varied, dating from the Precambrian era, with some rocks formed more than 3 billion years ago. It is composed of a metamorphic and igneous platform which is the basis of the continental shield. On top of this base are various modern rocks, such as sandstones, limestones, coal, and shales laid down during the Devonian and Jurassic periods to form the Transantarctic Mountains. In coastal areas such as Shackleton Range and Victoria Land some faulting has occurred.
The main mineral resource known on the continent is coal. It was first recorded near the Beardmore Glacier by Frank Wild on the Nimrod Expedition, and now low-grade coal is known across many parts of the Transantarctic Mountains. The Prince Charles Mountains contain significant deposits of iron ore. The most valuable resources of Antarctica lie offshore, namely the oil and natural gas fields found in the Ross Sea in 1973. Exploitation of all mineral resources is banned until 2048 by the Protocol on Environmental Protection to the Antarctic Treaty.
Antarctica has no permanent residents, but a number of governments maintain permanent research stations throughout the continent. The number of people conducting and supporting scientific research and other work on the continent and its nearby islands varies from approximately 4,000 in summer to about 1,000 in winter. Many of the stations are staffed year-round.
The first semi-permanent inhabitants of regions near Antarctica (areas situated south of the Antarctic Convergence) were British and American sealers who often spent a year or more on South Georgia Island, beginning in 1786. During the whaling era, which lasted until 1966, the population of that island varied from over 1,000 in the summer (over 2,000 in some years) to some 200 in the winter. Most of the whalers were Norwegian, with an increasing proportion of Britons. The settlements included Grytviken, Leith Harbour, King Edward Point, Stomness, Husvik, Prince Olav Harbour, Ocean Harbour, and Godthul. Managers and other senior officers of the whaling stations often lived together with their families. Among them was the founder of Grytviken, Captain Carl Anton Larsen, a prominent Norwegian whaler and explorer who adopted British citizenship in 1910, along with his family.
The first child born in the southern polar region was Norwegian girl Solveig Gunbjörg Jacobsen, born in Grytviken on October 8, 1913, with her birth being registered by the resident British Magistrate of South Georgia. She was a daughter of Fridthjof Jacobsen, the assistant manager of the whaling station, and of Klara Olette Jacobsen. Jacobsen arrived on the island in 1904 to become the manager of Grytviken, serving from 1914 to 1921; two of his children were born on the island.
Emilio Marcos Palma was the first person born on the Antarctic mainland, at Base Esperanza in 1978; his parents were sent there along with seven other families by the Argentinean government to determine if family life was suitable on the continent. In 1986, Juan Pablo Camacho was born at the Presidente Eduardo Frei Montalva Base, becoming the first Chilean born in Antarctica. Several bases are now home to families with children attending schools at the station.
As the only uninhabited continent, Antarctica has no government and belongs to no country. Various countries claim areas of it, although as a rule, no other countries recognize such claims. The area between 90°W and 150°W is the only part of Antarctica, indeed the only solid land on Earth, not claimed by any country.
Since 1959, claims on Antarctica have been suspended and the continent is considered politically neutral. Its status is regulated by the 1959 Antarctic Treaty and other related agreements, collectively called the Antarctic Treaty System. For the purposes of the Treaty System, Antarctica is defined as all land and ice shelves south of 60°S. The treaty was signed by twelve countries, including the Soviet Union (and later Russia), the United Kingdom, and the United States. It set aside Antarctica as a scientific preserve, established freedom of scientific investigation, environmental protection, and banned military activity on that continent. This was the first arms control agreement established during the Cold War.
The Antarctic Treaty prohibits any military activity in Antarctica, such as the establishment of military bases and fortifications, the carrying out of military maneuvers, or the testing of any type of weapon. Military personnel or equipment are permitted only for scientific research or for other peaceful purposes.
The United States military issues the Antarctica Service Medal to military members or civilians who perform research duty in Antarctica. The medal includes a "wintered over" bar issued to those who remain on the continent for two complete six-month seasons.
The main treaty was opened for signature on December 1, 1959, and officially entered into force on June 23, 1961. The original signatories were the 12 countries active in Antarctica during the International Geophysical Year of 1957-58 and willing to accept a U.S. invitation to the conference at which the treaty was negotiated. These countries were Argentina, Australia, Belgium, Chile, France, Japan, New Zealand, Norway, South Africa, the USSR, the United Kingdom, and the United States (which opened the Amundsen-Scott South Pole Station for the International Geophysical Year).
The main objective of the ATS is to ensure in the interests of all humanity that Antarctica shall continue forever to be used exclusively for peaceful purposes and shall not become the scene or object of international discord. The treaty forbids any measures of a military nature, but not the presence of military personnel per se. It avoided addressing the question of existing territorial claims asserted by some nations and not recognized by others.
Other agreements, some 200 recommendations adopted at treaty consultative meetings and ratified by governments, include:
Although coal, hydrocarbons, iron ore, platinum, copper, chromium, nickel, gold, and other minerals have been found, they have not been located in large enough quantities to exploit. The 1991 Protocol on Environmental Protection to the Antarctic Treaty also restricts a struggle for resources. In 1998, a compromise agreement was reached to add a 50-year ban on mining until the year 2048, further limiting economic development and exploitation. The primary agricultural activity is the capture and offshore trading of fish. Antarctic fisheries in 2000-01 reported landing 112,934 tons.
Small-scale tourism has existed since 1957 and is currently largely self-regulated by the International Association of Antarctica Tour Operators (IAATO). However, not all vessels associated with Antarctic tourism are members of IAATO. Several ships transport people to Antarctica to visit specific scenic locations.
There has been some recent concern over the adverse environmental and ecosystem effects caused by the influx of visitors. A call for stricter regulations for ships and a tourism quota have been made by some environmentalists and scientists. Antarctic sightseeing flights (which did not land) operated out of Australia and New Zealand until the fatal crash of Air New Zealand Flight 901 in 1979 on Mount Erebus, which killed all 257 aboard. Qantas Airlines resumed commercial overflights to Antarctica from Australia in the mid-1990s.
Transportation on the continent has transformed from heroic explorers crossing the isolated remote area of Antarctica on foot to a more open area due to human technologies enabling more convenient and faster transport by land and predominantly air and water.
Aircraft and pilots need to be capable of landing on ice, snow, or gravel runways, as there are no paved runways. Landings are generally restricted to the daylight season (Summer months from October to March). Winter landings have been performed at Williams Field but low temperatures mean that aircraft cannot stay on the ice longer than an hour or so, as their skis may freeze to the ice runway. Travel is normally by military aircraft delivering cargo.
Major landing fields include:
In the Antarctic summer, several companies offer excursions on ice-strengthened vessels to Antarctica. Ice-strengthened (not quite as tough as icebreaker) boats are preferred since icebreakers are round on the bottom—a configuration that amplifies the already massive wave action in the Drake passage.
Each year, scientists from 27 different nations conduct experiments not reproducible in any other place in the world. In the summer more than 4,000 scientists operate research stations; this number decreases to nearly 1,000 in the winter. McMurdo Station is capable of housing more than 1,000 scientists, visitors, and tourists.
Researchers include biologists, geologists, oceanographers, physicists, astronomers, glaciologists, and meteorologists. Geologists tend to study plate tectonics, meteorites from space, and resources from the breakup of the super continent Gondwanaland. Glaciologists in Antarctica are concerned with the study of the history and dynamics of floating ice, seasonal snow, glaciers, and ice sheets. Biologists, in addition to examining the wildlife, are interested in how harsh temperatures and the presence of people affect adaptation and survival strategies in a wide variety of organisms. Medical physicians have made discoveries concerning the spreading of viruses and the body's response to extreme seasonal temperatures. Astrophysicists at Amundsen-Scott South Pole Station study the celestial dome and cosmic microwave background radiation.
Many astronomical observations are better made from the interior of Antarctica than from most surface locations because of the high elevation, which results in a thin atmosphere and low temperature, which minimizes the amount of water vapor in the atmosphere, thus allowing for a view of space clearer than anywhere else on Earth. Antarctic ice serves as both the shield and the detection medium for the largest neutrino telescope in the world, built 2 km below Amundsen-Scott station.
Since the 1970s, an important focus of study has been the ozone layer in the atmosphere above Antarctica. In 1985, three British Scientists working on data they had gathered at Halley Station on the Brunt Ice Shelf discovered the existence of a hole in this layer. In 1998, NASA satellite data showed that the Antarctic ozone hole was the largest on record, covering 27 million square kilometers. It was eventually determined that the destruction of the ozone was caused by chlorofluorocarbons emitted by human products. With the ban of CFCs in the Montreal Protocol of 1989, it is believed that the ozone hole will close up over the next fifty years.
Meteorites from Antarctica are an important area of study about material formed early in the solar system; most are thought to come from asteroids, but some may have originated on larger planets. The first Antarctic meteorites were found in 1912. In 1969, a Japanese expedition discovered nine meteorites. Most of these meteorites have fallen onto the ice sheet in the last million years. Motion of the ice sheet tends to concentrate the meteorites at blocking locations such as mountain ranges, with wind erosion bringing them to the surface after centuries beneath accumulated snowfall. Compared with meteorites collected in more temperate regions on Earth, the Antarctic meteorites are well-preserved.
This large collection of meteorites allows a better understanding of the abundance of meteorite types in the solar system and how meteorites relate to asteroids and comets. New types of meteorites and rare meteorites have been found. Among these are pieces blasted off the moon, and probably Mars, by impacts. These specimens, particularly ALH84001 discovered by ANSMET, are at the center of the controversy about possible evidence of microbial life on Mars. Because meteorites in space absorb and record cosmic radiation, the time elapsed since the meteorite hit the Earth can be determined from laboratory studies. The elapsed time since fall, or terrestrial residence age, of a meteorite represents more information that might be useful in environmental studies of Antarctic ice sheets.
In 2006, a team of researchers from Ohio State University used gravity measurements by NASA's Gravity Recovery and Climate Experiment (GRACE) satellites to discover the 300-mile-wide Wilkes Land crater, which probably formed about 250 million years ago.
All links retrieved July 20, 2017.
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
The history of this article since it was imported to New World Encyclopedia: |
This study plan provides a complete set of skills for designing and managing industrial production systems. The courses offered in this study plan correspond to the different areas characterising the work of mechanical engineers: plant engineering and planning; the design and management of production logistical systems and processing technologies and systems.
This study plan provides transversal skills for planning mechanical systems with high-tech, smart systems: automatic machines and systems, vehicles and industrial robots. Graduates of this track are Mechanical Engineering designers able to work with the skills proper to automation, electric and information engineering.
This study plan trains engineers to use a systems theory approach oriented towards the product in its entirety, system architecture and the effective, integrated use of methods and simulation technologies based on paradigms of virtual prototyping, virtual construction and virtual mannequins. The courses offered in this study plan are those of the "Industrial Engineering and Information Design and Methods".
This study plan trains engineers with a solid foundation in the principles of engine and turbine engine operation and capable of developing and managing projects involving problems of dimensioning, development, selection and operation of internal combustion engines and gas turbines. Special attention is paid to the fluid dynamics, energy and ecological aspects of engines for land and air propulsion.
This study plan trains engineers to use advanced, innovative methods for designing mechanical components and systems. The courses offered in this study plan concern the methodological and content aspects of the mechanical design process, to then turn to the more in-depth study of the design problems of certain components and systems, as well as the rational use of materials for design.
The aim of this study plan is to train engineers capable of working in all settings where the ability to identify innovative technological solutions and use advanced materials is a fundamental competitive element. Particular attention is paid to special processing technologies and the application of advanced materials, the design and optimisation of technological processes, experimental methods and laboratory activity.
This study plan provides in-depth training in the general Mechanical Engineering disciplines, as applied to the field of ground vehicles (road and track). Students study the various functional, design, construction and management aspects proper to vehicles, with special attention to the environment and active and passive safety.
This study plan trains engineers specialised in the design, integration and performance measurement of complex mechanical systems, such as numerical control machines for the mechanical processing of integrated production systems. The courses in this study plan include systems mechanics, machine construction, processing systems and technologies and automatic controls.
The graduate in Mechanical Engineering – Mobility track will blend in depth knowledge about mobility systems and related technology with a scientific and engineering approach in electrical topics too. The graduate in Mechanical Engineering – Mobility track will be able to deal with the complexity of mobility systems and their dependence on the interaction between different critical issues: technology, management, ethics and policy-making. Hence, the graduate in this field will cover highly qualified posts in different types of organizations (including primarily transport operators).
This study plan provides the design principles necessary for realising mechanical systems. The courses are especially focused on the following topics: optimisation of the dynamic behaviour of mechanical systems; dimensioning of components and verification of their mechanical resistance; measurement and instrumentation methods for the verification and monitoring of the operation of mechanical systems.
This study plan develops cultural and design aspects towards working in the area of process design, a sector typical of industrial production. In particular, in addition to being capable of handling and resolving problems relative to manufacturing in general, graduates of this track have in-depth knowledge of metals and transformation technologies. |
Jay gatsby, indeed was, a essay about learning in english victim of love. the great gatsby is regarded as a brilliant piece essays about the great gatsby of social commentary, offering a vivid peek into american life in the 1920s. “the carelessness of the rich,” “gatsby’s dream,” and “what makes gatsby great?”. the land of opportunity promised the chance for financial success.” (p the great essays about the great gatsby gatsby movie review the great gatsby is a phenomenal movie with drama and romance. daisy and myrtle after first free essay on leadership glancing at the great gatsby, essays about the great gatsby tj sis essay prompts 2020 it didn’t seem as if any similarities between the wealthy, dainty daisy buchanan, the object of gatsby’s worship, and myrtle wilson, the bawdy, mechanic’s wife who was writing a grad school essay having essay apa format an …. the ideas for definition essays great gatsby critical analysis essay: the parties are spectacularly projected as an extravaganza. fitzgerald good readers and good writers thesis uses indirect method of characterization wealth in the great gatsby essays about the great gatsby essay. catherine “cathy” ames analysis. materialism is defined as the devotion to material wealth and possessions writing the essay pdf at the cost of spiritual or intellectual principles american school uniforms essays dream. there is no strict definition of the ‘american dream’ though ear. custom writings in the novel race is not a large factor but meehan did not necessarily cover all aspects of […]. being true to its genre, love, mystery, and luxury about fictitious characters from the past is present in this …. the screen how to write all about me with the government can take place his own connections between two years may 16, 2016 · the great gatsby:. |
I'm often amazed at the Sisyphean lengths people will go to try and prevent failure, yet prepare so little for its inevitability.
There's nothing wrong with attempting to prevent failures that are easily preventable. But such preventative measures have to be weighed against the friction and cost the measure introduces. Lost in this calculation is the consideration that much of the energy and effort that goes into prevention might be better spent in preparing to respond to failure and the repair process.
This is a lesson that's not just true for software, but all aspects of life. The following are examples of where this principle applies to social policy, parenting, relationships, and code.
The "War on Drugs" is it a colossal failure of social policy...
If there is one number that embodies the seemingly intractable challenge imposed by the illegal drug trade on the relationship between the United States and Mexico, it is $177.26. That is the retail price, according to Drug Enforcement Administration data, of one gram of pure cocaine from your typical local pusher. That is 74 percent cheaper than it was 30 years ago.
So after thirty years spent, $51 Trillion (yes, Trillion!) spent, not to mention the incredible social costs, the result we get for all that expenditure is it's 74 percent cheaper for that hit of cocaine. Wall street traders are rejoicing.
It doesn't take 5 Nobel Prize winning economists to tell you that the drug war is a failure.
The idea that you can tell people to "Just Say No" and that will somehow turn the tide of human nature is laughably ridiculous. This is the failure of the prevention model.
A response that focuses on repair as opposed to all out prevention realizes that you can't stop people from taking drugs, but you can help with the repair process for those who do get addicted. You can get better results if you treat drugs as a health problem and not a criminal problem. It's worked very well for Portugal. Ten years after they decriminalized all drugs, drug abuse is down by half.
This development can not only be attributed to decriminalisation but to a confluence of treatment and risk reduction policies.
It's a sane approach and it works. Locking an addict up in jail doesn't help them to repair.
A while back I wrote about the practice of Reflective Parenting. In that post, I wrote about the concept of repairing.
Now this last point is the most important lesson. Parents, we are going to fuck up. We’re going to do it royally. Accept it. Forgive yourself. And then repair the situation.
If there's ever a situation that will disabuse a person of the notion that they're infallible, it's becoming a parent. An essential part of being human is that mistakes will be made. Learning how to gracefully repair relationships afterwards helps lessen the long term impact of such mistakes.
Perhaps I'm fortunate that I get a lot of practice fucking up and then repairing with my own kids. Just the other day I was frazzled trying to get the kids ready for some birthday party. I told my son to fill out the birthday card, but avoid a splotch of water on the table while I went to grab a towel. Sure enough, he put the card on the water. I was pissed. I berated him for doing the one thing I just finished explicitly telling him not to do that. Why would he do that?! Why didn't he liste?!
His normal smile was replaced with a crestfallen face as his eyes teared up. That struck me. When I calmed down, he pointed to a little plate full of water on the table. He thought I had meant that water. "Asshole" doesn't even begin to describe how much of a schmuck I felt at that moment. It was a total misunderstanding. He didn't even see the splotch of water next to the more conspicuous plate of water.
I got down to his eye level and told him that I'm sorry. I made a mistake. I understand how my instructions would be confusing. I was sincere, remorseful, and honest. We hugged it out and things were fine afterwards. Learning to repair is essential to good parenting.
I've been reading Difficult Conversations: How to Discuss What Matters Most. This book is a phenomenal guide to communicating well, both at work and home. Even if you think you are great at communicating with others, there's probably something in here for you.
It helped me through a recent difficult situation where I hurt someone's feelings. I had no idea that my words would prompt the response it did and I was surprised by the reaction. Prior to reading this book, my typical approach would be to try and defend my actions and help this person see the obvious reason in my position. I would try to win the argument.
Difficult Conversations proposes a third approach, rather than try to win the argument, it suggests you move towards a learning conversation.
Instead of wanting to persuade and get your way, you want to understand what has happened from the other person’s point of view, explain your point of view, share and understand feelings, and work together to figure out a way to manage the problem going forward. In so doing, you make it more likely that the other person will be open to being persuaded, and that you will learn something that significantly changes the way you understand the problem. Changing our stance means inviting the other person into the conversation with us, to help us figure things out. If we’re going to achieve our purposes, we have lots we need to learn from them and lots they need to learn from us. We need to have a learning conversation.
What I've learned is that people in general aren't irrational. They only appear to be irrational because you are often missing a piece of context about how they view the world and interpret the actions of others.
This becomes crystal clear when you consider how you interpret your own actions. When was the last time you concluded that you acted with malicious intent or irrationally? How is it that you always act rationally with good intent, and others don't? Given your impeccable track record, how is it that sometimes, others ascribe malice to your actions? Well they must be irrational! Or is it that they are missing a piece of context that you have? Could it be possible, when you've been on the other end, that you ascribed malice in a situation where you really were missing some information?
It's not until you realize most people are alike in this way that you can start to have more productive learning conversations - even with folks you strongly disagree with.
Back to the story, despite all my good intentions and all my efforts to be respectful, I still failed and hurt my friend's feelings. It's just not possible to avoid this in every situation, though I strive to greatly reduce the occurrences. Fortunately, I've prepared for failure. By focusing on a learning conversation, we were able to repair the relationship. I believe it's even stronger as a result.
There's so many examples in software, it's hard to point to just one. So I'll pick two. First, let's talk about The Thing About Git. I've linked to this post many times because one of its key points really resonates with me.
Git means never having to say, "you should have"
If you took The Tangled Working Copy Problem to the mailing lists of each of the VCS's and solicited proposals for how best to untangle it, I think it's safe to say that most of the solutions would be of the form: "You should have XXX before YYY." ... More simply, the phrase: "you should have," ought to set off alarm bells. These are precisely the types of problems I want my VCS to solve, not throw back in my face with rules for how to structure workflow the next time.
Git recognizes that people make mistakes and rather than tell you that your only recourse is to grab a time machine and do what you should have done in the first place, it gives you tools to repair mistakes.
The theme of preparing for failure applies just as much to software and systems as it does to dealing with people.
There are a lot of backup systems out there. And to a degree, backups are a step in recognizing the value in preparing for disasters. But as any good system administrators know, backups are not the important part of the process. Backups are nothing without restores. Restores are what we really care about. That's the "repair" step when a hard-drive fails.
Systems and policies that require 100% failure prevention to work are highly suspect. Such a system should trigger your Spidey sense. When building a system or policy, think not only about how the system or policy might fail, but how users of the system and those subject to the policy might fail. And give them tools to recover and repair failures. Perhaps the only guarantee you can provide is there will be failure. So prepare for it and prepare to recover from it. |
The objective of a study paper is to provide an argument on a particular topic (in this situation, to perform research on a certain topic), current support for this, and how to make a paper longer with periods give support to that place in a well-organized, logically structured document. The expression”research paper” may likewise be applied to an academic article which contains the outcomes of other studies or research conducted by other folks. In the United States, research papers are often given the highest recognition at academic seminars and conventions. A research paper, however, differs in the academic post in several ways.
First of all, a study paper is usually a intricate piece of writing with many sub-topics, lots of supporting details, and frequently many pages of text messages. Many academic books do not accept these complicated and lengthy works, so many scholars turn to books to compose their own research papers, although many often these books are quite short. In addition, unlike an educational article, a study paper doesn’t need extensive research methodology. Instead, it’s usually an exegetical practice, even though there are many authors who contain scientific references within the study.
Second, study papers typically have limited space and may even be restricted by the amount of time it requires to complete them. In some cases, the number of pages in a study paper can be as low as ten pages. It is uncommon but not impossible, for a study paper to include multiple hundred pages. That is the reason why many scholars choose to publish their research papers in journals instead of in academic journals, since most academic journals just allow one hundred and twenty pages to get one article and permit a maximum of two hundred to each subsequent article, for a maximum of four hundred pages.
Last, research papers, like essays, require less study and more than academic essays and articles. Because they are not essays, they may be researched by individuals unfamiliar with its contents. Even though most research papers are extremely lengthy and at times quite dull, they typically present easy and clear discussions, unlike more complex posts in academic literature, which frequently involve multiple factors along with a huge quantity of proofreading. A study paper often only takes a few hours to finish, but can be completed in the afternoon or overnight. And be posted on a website without any more work demanded.
However, in spite of their simplicity, study papers are often criticized for being too academic, with no private flair, lacking in supporting evidence, or even relying exclusively on study findings. Although it is usually tough to write bad research document, it’s possible, and lots of scholars think research papers shouldn’t be too academic or technical. The goal of the study paper is to persuade readers by introducing the author’s personal views, and not to show the writer’s research methodology and outcomes. In the view of most, a research paper should be clear and simple to read.
Many scholars think research papers ought to be made accessible to individuals who are not scholars, so to be able to encourage more participation. If performed in an informal style, research papers are much better suited to public consumption. For people who buy essay online cheap prefer to have the study papers reviewed before publication, numerous publishers will publish the newspapers on the internet, and permit writers to cite the sources used in their study. Moreover, some people decide to have their research documents peer reviewed by fellow pupils or experts in the area, but this practice is frowned upon by a few in academe. The internet has also helped many scholars to produce their study papers more accessible and in some instances allows the study papers to achieve a wider audience, because they are easier to locate and access from various sources. |
Simply put, a web server primarily supports communication in HTTP protocols or other internet related protocols like (FTP/HTTPS etc). but the Application Servers go beyond that, including support of the RMI - IIOP protocols, and for example BEA uses propreitory t3 protocols. the second major difference is that the web servers work on a request response pardigm while the Application Servers you can exchange Remote Objects which are Java Objects / Components (Like EJBs, Messages, Corba client support etc).
Apache Axis (for Web Services) cuts into the difference and helps theoritically make J2EE webservers into application servers by providing support to web services, where the client can exchange "Serializable / Deserializable" Objects using Simple Objece Access Protocol (SOAP). Axis is just another Servlet Application running in the context of the Webserver and this is possible because SOAP depends on the HTTP. Of course, these differences are personal feelings, have not researched on this. some one could still give a more technically correct info on this. Thanks |
General Allergy Patient Information
Allergies are very common conditions that can have a severe impact on daily life. Allergies result from an abnormal immune system response to substances that usually do not cause a reaction in most people. These substances are called allergens. In some cases, an allergic reaction can be life threatening.
There are many types of allergens, or allergy triggers, and many types of allergic reactions. Allergies often are related to other medical conditions, such as asthma and eczema (dermatitis).
Allergy symptoms may be similar to those caused by another condition, such as a cold or a stomach virus. For example, an allergic reaction to an allergen in the air (e.g., pollen, dust, mold) can cause nasal congestion, sore throat, and cough; and a food allergy can cause abdominal pain, cramping, diarrhea, and nausea.
Here are some important questions to ask your doctor about your allergies. The answers to these questions can help you to better manage your condition. Print this page, check off the questions you would like answered, and give it to your doctor, physician's assistant (PA), nurse, or other member of your allergy care team.
Questions to Ask about Your Allergies
- How severe are my allergies? Are my allergies life-threatening?
- What complications may I experience as a result of an allergic reaction?
- What allergens do you suspect are responsible for causing my allergies? How can I avoid these allergy triggers?
- Are my allergies hereditary or related to my environment? Are they seasonal or year round, or associated with another condition, such as asthma or eczema?
- Do my allergies require medical treatment? Do they increase my risk for developing other medical problems?
- Might my child outgrow his or her allergies?
Questions to Ask about Allergy Tests
- Will allergy tests (e.g., skin tests, patch tests, blood tests) be used to diagnose my allergies?
- Do you recommend "use and elimination" allergy testing?
- Will a pulmonary function test be performed to help diagnose my condition?
- Will my allergy tests be conducted by a board-certified allergist/immunologist (allergy specialist)?
- If not board certified, has my doctor completed a fellowship program or received special training in allergy/immunology?
- How should I prepare for my allergy testing?
- How long will the allergy testing take?
- Are there any side effects or complications associated with these allergy tests?
- How long will it take to get the results of the allergy tests? Should I call for the results, or will someone contact me? Telephone # to call: When to call:
Questions to Ask about Your Allergy Treatment
- What are the treatment options for my allergies? Do my allergies require medications or allergy shots (immunotherapy)?
- What type of treatment do you recommend?
- What are the potential benefits and drawbacks of the recommended allergy treatment?
- What are the common side effects of this treatment?
- What should I do if I experience severe side effects? Telephone # to call:
- How long should it take for this allergy treatment to work?
- What lifestyle changes do you recommend to help me manage my allergies?
- How should I schedule my allergy treatment appointments? How often should I be seen for follow-up appointments? Next appointment: Date: Time:
- Can you recommend an asthma/allergy support group or a source for additional allergy information? |
High output stomas are not commonly understood by all health care professionals and can be mismanaged. This article will discuss what stomas are, the different types, and the consequences of living with a high output stoma
The gastrointestinal tract begins with the mouth, which contains three pairs of salivary glands and is where digestion begins. Chewing breaks larger food pieces into smaller particles with the addition of saliva lubricating the food to aid with swallowing. The body produces an average of 500–1500ml of saliva per day.1 Alongside acting as a lubricant, saliva contains amylase, which partly digests complex sugars. These processes prepare the body for the movement of food from the mouth to the stomach using peristaltic wave-like motions via the oesophagus, which is approximately 25cm in length. Peristalsis continues into the middle of stomach and churns food together with gastric juices. The stomach secretes up to 2000ml of gastric juices per day, which contains 20–60mmol/l of sodium as well as protein-digesting enzymes and hydrochloric acid.1,2 Gastric acid converts a mass of food into ‘chyme’, a semi-solid mixture that moves into the small intestine (also referred to as the small bowel). The duodenum is the first part of the small bowel; it measures approximately 25cm in length and is the widest and most fixed part of the small bowel.3
Two adjacent organs – the pancreas and the liver – secrete substances that enter the duodenum via ducts. The exocrine function of the pancreas is to produce digestive enzymes and a bicarbonate-ion rich fluid. The bicarbonate ions neutralise the acidic chyme entering the duodenum from the stomach, which would otherwise inactivate the pancreatic enzymes. The pancreas produces on average 1500ml of secretions per day that contains 125–138mmol/l sodium.2,3 The liver produces approximately 500ml/day of bile. Bile contains bicarbonate ions, cholesterol, phospholipids and organic wastes, which are collectively called the bile salts. These salts solubilise dietary fats, aiding in their digestion and absorption. The small bowel itself secretes approximately 1500ml of fluid into the intestinal lumen: most of this fluid is reabsorbed in the jejunum, which is the second part of the small bowel and begins at the duodenojejunal flexure.3 The duodenum and jejunum constitute two-fifths of the length of the small bowel and the ileum comprises the remaining three-fifths. There is no set length of small bowel and it therefore varies between patients. Each litre of jejunal fluid contains approximately 140mmol sodium.2 Within the small bowel, the motility of the muscular walls mixes the luminal contents, which include the nutrients from the food, and brings these into contact with the epithelial surface, primed for absorption to take place. This peristalsis slowly moves the water, salt and undigested food from the ileum and into the colon. The colon consists of four parts: ascending colon; transverse colon; descending colon; and sigmoid colon. The right side of the colon reabsorbs remaining water and salts from the food moving through it. The left side of the colon helps to produce a solid stool and acts as storage, alongside propelling stool towards the rectum to be passed out of the body as a bowel motion.
What is a stoma?
The word stoma derives from a Greek word meaning mouth; mouthpiece; talk; voice; mouth of a river; any outlet or inlet. A stoma is a surgically-formed opening from the inside of an organ to the outside.4 A stoma is created to manage a range of illnesses, for example, diverticulitis, Crohn’s disease, the removal of a cancer, or following trauma to the abdomen.
Unpublished data from the British Healthcare Trades Association estimates there are 195,000 people in the UK currently living with a stoma.5 The stoma usually appears pink and moist and is warm to touch.
Types of stomas
Tracheostomy, jejunostomy, ileostomy, colostomy and urostomy are all examples of stomas; the prefix (tracheo-, ileo-, etc) determines where the opening originates. Stomas can either be temporary, where reversal is planned, or permanent. Where stomas are permanent, there is no distal bowel remaining to re-join or the bowel cannot be re-joined due to other factors.6 Stomas can be further classified as an end stoma, a loop stoma or a double-barrelled stoma.7 This section will only focus on faecal output stomas.
At the surface of the abdomen, one opening – the stoma – is present. The surgeon fully divides the bowel lumen and creates one stoma, a proximal opening to allow the output of faecal matter. Depending on the type of surgery, the distal section of the bowel is either left within the abdomen or removed (Figures 2 and 3). These are the most common permanent stomas.
At the surface of the abdomen, a rounded or egg-like shaped stoma is present. The surgeon will partly divide a loop of the bowel creating two openings. The proximal opening of the loop will act as an outlet stoma passing faecal matter and flatus, and the distal opening of the loop will pass mucous only (Figures 4 and 5).
At the surface of the abdomen, two stomas are seen. The surgeon will fully divide a section of the bowel and bring out two distinct stomas that resemble end stomas in appearance. One will act as an outlet stoma; this is the proximal section of the bowel, and the other is the distal section of the bowel (Figure 6).
Loop and double-barrelled stomas are the most common temporary stomas. Figure 7 shows the anatomy of these.
The section of the bowel that forms the opening at the surface of the abdomen is the jejunum. The consistency of the output (effluent) is looser than from an ileostomy.
The section of the bowel which forms the opening at the surface of the abdomen is the ileum; the stoma is formed into a spout of about 2–3cm from the skin. The consistency of the effluent usually resembles porridge; however, it can be fluid when the ileostomy is first formed. Depending on the effluent consistency, patients may need to empty their stoma bags four–six-times per day. Ileostomies are the most common temporary stomas.
The section of the bowel that forms the opening at the surface of the abdomen is the colon, the stoma is ideally minimally raised. Colostomies tend to produce formed stools; however, the consistency might vary depending on the section of the colon used to form the stoma; for example, a looser consistency will be seen if the caecum is used compared with the sigmoid colon. Patients tend to produce one formed stool per daily and may experience multiple episodes of flatus.8 Colostomies are the most common permanent stomas.
The more proximal the section of bowel utilised to form the stoma the looser the consistency of output. In clinical practice, those with a higher stoma output tend to be patients with more proximally formed stomas.9
What is a high output stoma and what are the consequences?
The normal output from an ileostomy ranges from approximately 300ml to 800ml/day. Although there is no agreed definition of a high output stoma (HOS), it is generally considered as an output exceeding 1–2l/day.10 However, clinical significance is more likely when the output exceeds 2l/day, causing water, sodium and magnesium depletion, with malnutrition occurring as a late complication. Physiologically, jejunostomy patients are more likely to experience a HOS, where the absorptive function of the bowel is removed; it is unlikely to occur in those with a colostomy with retained small bowel, due to the large capacity for water resorption in the remaining colon, unless there is radiation damage, for example.10,11
It is important to know how much small bowel remains after a resection. Patients with <100cm of small bowel (referred to as short bowel syndrome (SBS) or intestinal failure) with a jejunostomy, are more at risk of a HOS than patients with an ileostomy, although HOS can still occur. Other factors that can cause a HOS in non-SBS patients include:
- intra-abdominal sepsis;
- small intestinal bowel overgrowth.
Differentiation of the cause is important to guide management.10 Symptoms of a HOS can include thirst, lethargy, hypotension, muscle weakness and cramps.9–11
Water and sodium depletion occurs in jejunostomy patients, especially after eating and drinking, as the absorptive function of the jejunum is significantly reduced. If ingested fluid has a low sodium concentration (hypotonic) not matching that of the jejunostomy fluid (approximately 100mmol/l sodium), the concentration gradient favours the loss of sodium from plasma. This also occurs with hypertonic fluids, containing sorbitol or glucose (for example, fizzy drinks). Therefore, patients are advised to limit their intake of hypotonic fluid to 1l/day and sometimes to 500ml/day. Patients will be advised to slowly sip 1l/day of oral rehydration solution, which contains approximately 90mmol/l sodium.10
Nutrition and magnesium depletion is another consequence of HOS. The small bowel functions to absorb water and nutrients from ingested food, owing to its large surface area. Reducing this surface area reduces the capacity to absorb these nutrients. Magnesium normally binds to fat-soluble vitamins and is absorbed in this way. However, in HOS patients, magnesium depletion occurs because of this absorption pathway and increased renal excretion; this could lead to muscle cramps and weakness.10
Nutritionally, dietetic input is valuable in aiding patients to understand how to adjust their diets to maintain an appropriate hydration and nutritional status. If a trial of an enteral diet does not suffice, an intravenous route to administer parenteral nutrition might be required.
In conclusion, it is important to understand that each type of gastrointestinal stoma behaves differently and the consistency and volume of effluent can vary. Knowing the signs and symptoms of a HOS can help to provide effective treatment before the patient begins to suffer metabolic effects. The type of stoma that your patient has can help guide management. This will be discussed in Part 2 of this short series included
in this issue.
The authors thank Mia Small, Nurse Consultant Nutrition and Intestinal Failure, and Jennifer Burch, Head of Gastrointestinal Nurse Education.
- Widmaier EP et al. Vander’s Human Physiology: the mechanisms of body function. Boston: McGraw-Hill Higher Education; 2008.
- National Institute for Health and Care Excellence. Intravenous fluid therapy in adults in hospital Clinical guideline CG174. www.nice.org.uk/Guidance/CG174 (accessed April 2021).
- Agur AM, Dalley AF. Moore’s essential clinical anatomy. Lippincott Williams & Wilkins; 2018.
- Hyland J. The basics of ostomies. Gastroenterol Nurs 2002;25(6):241–4.
- BHTA (unpublished) UK patient numbers survey 2019. British Healthcare Trades Association.
- Windsor A et al. Stomas: Surgery. In: Burch J (ed) Stoma Care. Wiley-Blackwell, West Sussex; 2008:106–17.
- Burch J. Essential care for patients with stomas. Nurs Times 2011;107(45):12–14.
- Burch J. Stomas: The past, present and future. In: Burch J (ed) Stoma Care. Wiley-Blackwell, West Sussex; 2008:1–11.
- Baker ML, Williams RN, Nightingale JM. Causes and management of a high output stoma. Colorectal Dis 2011;13(2):191–7.
- Mountford CG, Manas DM, Thompson NP. A practical approach to the management of high-output stoma. Front Gastroenterol 2014;5(3):203–7.
- Nightingale J, Woodward JM. Guidelines for management of patients with a short bowel. Gut 2006;55(suppl 4):iv1–2. |
If you want teens to wear sunscreen, don't bother telling them it prevents skin cancer. Tell them it keeps their skin from getting wrinkly and old-looking.
A University of Colorado study found teens only protect their skin from UV light after watching PSAs about how the sun affects appearance.
The same teens, when shown a video about the negative health effects of the sun, did not alter their behaviours at all.
"We see this anecdotally in the clinic. The teens who come in, often it's because their parents are dragging them. A lot have undergone tanning or never wear sunscreen. You can tell that when we talk about the skin cancer risk, it doesn't faze them," dermatologist Dr. April W. Armstrong said in statement.
"If our endgame is to modify their behaviour, we need to tailor our message in the right way and in this case the right way is by highlighting consequences to appearance rather than health."
tap here to see other videos from our team. |
Born this day in 1838, Kate Gannett Wells,anti-suffragist. There was some women who did not support suffrage and Wells was one of them. And like most "anti"(word used by suffragists at the time of the movement), Wells wanted to work outside the home, she did not want to have children, she found being a wife, a mother and running a household completely un-interesting and unfulfilled. Wells wanted to be a minister in her father's and brother's church, the Unitarian Church. It is also rare to have any documentation of the life of an "anti" and their personal feelings. Wells wrote to her brother Will weekly and shared her feelings and thoughts about her life. William Garrentt's Papers are archived at Harvard College. Garrentt was a founding name of Harvard College and well known in Boston, MA. Most of Wells friends and family were suffragists and very surprised when Wells spoke out against The Suffrage Movement.
Woman suffrage was "inexpedient," Kate told the legislators, "until the highest type of morality and the clearest sense of justice and the widest reaches of law in its theoretical and practical applications are reached by all women." Kate conceded that "Women now do generous, wise, and lofty deeds, "but they also "do mean, foolish, despicable actions,—oh, how mean! how bad!" She beseeched the gentlemen of the legislature to "Withhold from us the duty, necessity, right of suffrage, whichever it may be called, until you can have only noble, honest women for your voters and legislators
Kate feared that educated, refined women would choose not to exercise their right of suffrage while the "unintelligent and depraved women" would flock to the polls to help their brothers force the state to give them whatever they needed. "Once let the great mass of uneducated women be added to the great mass of already uneducated men," Kate declared, "and the state will slowly but surely be shaken under the varying demands made upon it for bread, work, money, leisure and all kinds of laws to favor all kinds of persons."
Yes, bigotry was a prime reason to stop the Suffrage Movement as it was for Slavery, Civil Rights. I will also point out that Kate Wells thought that Slavery was a necessary part of society. Anytime there is a issue about Human Rights there are those who are willing to profit off the pain and suffering of the people who are harmed by the injustice. And somehow feel perfectly entitled to it.
Wells found her way out, "of the house". Philanthropic work in women's education and tending to the poor (and if they were indeed lifted up what would the ladies do for volenteer work!)
The old saying, "Do as I say, not as I do." applies to most women who rejected suffrage. They themselves, were lawyers, writers, working women outside the home. But, as the saying, they viewed other women as unable to handle it. Sad, so sad. |
There is actually often some kind of preconceived thought that supplements are actually unwell when one talks about health and wellness supplements. The fact is actually that not all supplements are actually healthy. It would certainly be actually a lot more beneficial to teach oneself on the various type of supplements on call and also why they serve for the body. Below are actually several of the health and wellness supplements that are helpful for the body and which you need to feature in your daily diet:
A regular Посетете уебсайта multivitamin. A multivitamin pill is a supplement made to nutritional supplement an individual’s diet plan when taken orally as a supplement, tablet computer, pill, or even fluid. A multivitamin can easily give vitamins either removed directly from natural food resources or even man-made, at times combined with artificial elements, for boosting the amount of the person’s regular consumption.
Magnesium supplements. Magnesium mineral is actually an essential mineral for the physical body considering that it aids the physical body produce power. Magnesium mineral could be found typically in dairy products, vegetables, seeds, fruits, as well as nuts. Nevertheless, people who have actually taken medications or other sources of magnesium, may need to have to take a multivitamin supplement including magnesium. Most health and wellness supplements containing magnesium mineral include salt as an additive.
Fish oil supplements. Fish oil consists of essential fatty acids that are crucial to the body system’s production of omega 3 fats. These fats are actually essential for effective functioning of the cells as well as the brain. They may also aid sustain the correct levels of cholesterol in the blood stream.
Herbal разберете тук сега health and wellness supplements. These supplements can easily be taken orally, the main benefit of taking herbal supplements lies in the ability to supply vital nutrients and also vitamins that are actually certainly not conveniently located in regular foods items. Several of one of the most typical weeds featured in plant based health supplements include ginseng, eco-friendly tea, St. John’s Wort, chamomile, untamed yam, as well as dandelion root.
Fish oil. Some people make use of fish oil supplements to strengthen the top quality of their skin, cardiovascular system health and wellness, as well as to reduced high blood pressure. Fish oil is actually essential for the formation of a brand new cell, which is a foundation of muscle tissue. It has actually likewise been actually revealed to help slow the growing old process and also is good for soul as well as brain wellness.
Vitamin E supplements. This supplement helps the physical body make even more red blood cells.
Other вижте този сайт body immune system enhancers. When taken as component of a healthy lifestyle, a lot of these supplements can assist in improving the natural defenses of the physical body.
Vitamins A, C, b1 as well as E. Vitamins A, B1, C and E interact to avoid cancer cells as well as support secure against health conditions such as arthritis. An insufficiency of these vitamins has been linked to particular cancers and also it is crucial to consume enough of the appropriate vitamins to avoid ailment.
Calcium mineral supplements. Calcium works with the immune system and also assists manage cholesterol levels as well as helps manage the absorption of excess fats.
These are only some of the immune system enhancers that can aid to keep you experiencing much better. Aside from the supplements discussed, there are lots of various other health supplements available online that can aid to harmonize the body immune system and also help to improve health and wellness.
Several of the various health and wellness supplements that can easily assist to improve health and wellness are actually based on herbal remedies. Among these supplements is the Mandarin natural herb phoned environment-friendly herbal tea.
Green tea possesses antioxidant and also health and wellness benefits as well as studies have actually shown that consuming two cups of it daily can significantly reduce the risk of creating particular ailments. It can easily also help stop a variety of serious conditions.
Veggie tea contains coffee and also is strongly believed to aid in lowering hypertension. It can decrease the risk of Parkinson’s health condition and Alzheimer’s condition, in addition to being an anti-diabetic.
There are also lots of natural supplements on the market that are actually made use of to deal with a large range of diseases. They feature a stable of herbs including ginseng, Cayenne, ginkgo biloba and gingko biloba.
An organic nutritional supplement is any kind of item made to nutritional supplement an existing diet when taken as a strong pill, grain, liquid, or pill. A natural supplement may give details nutrients extracted coming from healthy food sources, either artificially or typically, in mix or separately, to increase the volume of day-to-day intake.
Organic dietary supplements were actually presented during the overdue 1990s. They had initially been made use of by athletes as well as body building contractors to raise functionality and also electricity. It was actually rapidly established that they were effective as well as risk-free as well as a lot more health and wellness aware individuals began to seek out these items for their health and nutrition needs to have.
Organic diet supplements are actually very identical to prescribed medicines during that there are risks involved. Lots of organic supplements include cannabis that are illegal to utilize in some nations. Some vitamins are outlawed in various other countries because of their possible side effects. The Fda carries out not manage these items.
There are lots of wellness perks related to natural nutritional supplements. They feature raised electricity as well as psychological alertness; an increase to body immune system function; help for the physical body in taking care of the tension of day-to-day lifestyle; as well as an improvement in physical stamina. These items can be discovered online, at health and wellness outlets, and also in specialty outlets.
Natural nutritional supplements can likewise aid the physical body in handling and/or lowering specific sorts of diseases. A lot of these items operate to boost general health and wellness, lower weight, and also deliver energy for frequent tasks. A lot of the natural items operate to stop specific diseases like cancer and cardiovascular disease. Some even help people decrease ache and help alleviate clinical depression and also anxiety.
Some all-natural nutritional supplements are readily available without prescribed. There are many people that have attempted taking natural diet supplements without the suggestions of a physician, as well as found that they work just alright on their own. It is important, nevertheless, to consult with your medical professional just before you begin taking any sort of medication or even modifying your consuming habits or regular. The ingredients in a lot of organic supplements might engage with drugs you might be actually taking, so you must consistently speak with your health care service provider just before starting any sort of new course.
It is actually essential to select meticulously which products you are going to take given that natural diet supplements may function to boost many problems. and which ones you will not. You must consistently try a handful of various supplements just before you discover the one that works best for your particular condition |
Railway recruitment for civil service is made through UPSC. This service is responsible for the overall administrative, technical and managerial function associated with the Rail transport and comes under the category of Group A. This selection for the category is made through two kinds of examinations, namely, civil service examination and combined engineering service examination. These examinations are conducted every year through Union Public Service Commission (UPSC).
Group A for civil services exam includes:
Indian Railway Traffic Service (IRTS) – The primary responsibility of the job is to take care of the commercial transportation of objects through trains and head the Operations Department of Railways.
Indian Railway Accounts Service (IRAS) – It is in charge of all the accounts of the railways, i.e income, expenditures etc.
Indian Railway Personnel Service (IRPS) – The primary responsibility involves tasks such as recruitment of all railway staff (inspectors, drivers, IRTS officers) and planning of recruitments, deciding promotions, postings, training, welfare, in fact all work concerning personnel.
Railway Protection Force (RPF) – It is responsible for the security of the railway tracks, personnel and equipment.
For more details: https://www.civilserviceindia.com/civil-services-list.html
Combined Engineering Services Examination is conducted by the Union Public Service Commission (UPSC ) for recruitment of engineers to the 4 categories of Engineering Services : Civil Engineering, Mechanical Engineering, Electrical Engineering and Electronics and Telecommunication Engineering.
Engineers selected through the Combined Engineering Services Examination are appointed to various posts in railways like
For more details:http://www.coachingindians.com/upsc-exam/ies-syllabus.html |
A lightning strike lasts about 1-2 microseconds…not even time to blink an eye and yet long enough to cause destruction of life and property. Storms this spring are already ferocious and violent in the U.S.
Lightning bolts and electronics do not play well together. Check out some shocking facts that put your electronic gear (and YOU) in danger:
- At any given time, approximately 2000 thunderstorms are in progress around the world with an average of 25 million cloud to ground lightning strikes per year in the U.S. alone
- 100 lightning flashes strike earth every second
- Lightning can produce currents as high as 500 kA and voltage up to 30,000 kV meaning a direct hit is rarely survivable whether human or electronics
- And no, contrary to a popular myth – wearing rubber shoes will NOT protect you from a lightning strike
Your outside equipment such as your HVAC, fire alarms, perimeter security, remote pumps and controls, even your parking lot lights may already be cowering in fear from the coming electrical storms.
Following a thunder storm, if your industrial electronic equipment fails to start, will not perform normal functions, loses a phase, starters short, or back up batteries are alarming and will not charge it’s a pretty good sign that you have sustained lightning damage or a power surge, even if your building did not experience a direct hit.
Lightning strikes can cause damage through power surges called “transients” which happen when lightning strikes nearby hitting transmitting devices such as metallic plant equipment, pipes, or wiring. Even the magnetic field associated with lighting can affect computers nearby causing damage that might not show up until days or weeks later.
Damage to electrical and electronic equipment can include flashover of insulation inside motors or transformers, vaporized traces on printed circuit boards, vaporized transistors and integrated circuits, blown fuses, and more. None of it good and frequently unrepairable.
The cost of lightning damage is downtime, reduced production, and industrial electronic repairs or replacement costs. There are some things you can do to help minimize lightning damage:
- Diversion: ground metallic structures
- Attenuation: careful wiring such as metallic raceways, cable shields, twisted pairs, extensive grounding and earthing
- Suppression: up-to-date suppression devices installed at each point closes to the equipment to be protected or where the conductor enters and leaves a structure
- Your power distribution systems must be capable of withstanding repeat lightning-induced peak surge currents. This is not a DIY project. Make sure you get a qualified electrician for this job.
Know this too: when you install surge protection devices around your plant, realize that undetected damage may have already occurred to circuit boards, processors, wiring, and connections prior to the installation so some losses may continue for a time and it is not a failure of the new devices.
Even after all that, sometimes your electronic equipment will still suffer damage. If that’s the case, get a qualified, experienced industrial electronic repair company to evaluate your item to see if it is repairable or “toast”. If you’re not sure about the potential damage get your equipment checked out whether it’s circuit board repairs, control repairs or any other piece of your electronics.
The best repair companies will provide this evaluation at no cost and give you an accurate quote for repairs. They should also be able to provide rush repair services and offer a minimum of a one year warranty on most repairs. If your item is “toast” the company should be able to dispose of the electronics properly.
Keep your equipment safe this summer and most importantly, keep yourself safe. Unfortunately, there are no surge protection devices for humans! |
The discovery of Makemake's little moon increases the parallels between Pluto and Makemake. This is because both of the small icy worlds are already known to be well-coated in a frozen shell of methane. Furthermore, additional observations of the little moon will readily reveal the density of Makemake--an important result that will indicate if the bulk compositions of Pluto and Makemake are similar. "This new discovery opens a new chapter in comparative planetology in the outer Solar System," Dr. Marc Buie commented in the April 26, 2016 Hubble Press Release. Dr. Buie, the team leader, is also of the Southwest Research Institute.
Ganymede: Ganymede is both the largest moon of Jupiter, our Solar System's planetary behemoth, as well as the largest moon in our entire Solar system. Observations of Ganymede by the HST in 2015 suggested the existence of a subsurface saline ocean. This is because patterns in auroral belts and rocking of the magnetic field hinted at the presence of an ocean. It is estimated to be approximately 100 kilometers deep with a surface situated below a crust of 150 kilometers.
Simply put, resistance to the creation of a space frontier originates with the insecurities of Western leaders. First, it is clear that everything changes with the emergence of a frontier. Established power structures are usually shaken, not reinforced. (If this is not clear, try reading Walter Prescott Webb's The Great Frontier, particularly the last chapter, and Divided We Stand: The Crisis of a Frontierless Democracy, by the same author.) |
The Greek goddess Athena's personality traits included courage, wisdom, intelligence, cunning and chastity. As a goddess of war, she relied on strategy and morality rather than bloodshed, and as a goddess of wisdom she stressed diplomacy, justice, education, arts and crafts.
According to Olympian mythology, after impregnating the sea nymph Metis, Zeus swallowed her to prevent her from giving birth to his progeny. After Zeus developed a great headache, his head was cloven with an axe, and Athena emerged fully mature and clad in armor. From her mother, Athena inherited wisdom. As Zeus' favorite offspring, Athena acquired strength, dominance and imperviousness. She demonstrated her martial ability by backing the Greeks in the Trojan War. While Ares, the god of war, represented direct combat and blood lust in battle, Athena epitomized diplomacy, strategy, skill and discipline. As a counselor, Athena cunningly guided Odysseus home from Troy to Ithaca. She also was credited with using her wise counsel in helping Perseus to kill Medusa and assisting Hercules to successfully accomplish several of his labors.
Athena had no lovers or offspring and was given the title Athena Parthenos, or Virgin Athena. The Parthenon, a temple to Athena on the Acropolis in Athens, got its name from this attribute. Athena's characteristic of wisdom was illustrated in a contest with Poseidon for the patronage of the city of Athens. Poseidon gave the Athenians the gift of a saltwater spring, while Athena gave them the much more useful olive tree, which yielded olives, oil and wood. |
Infectious diseases are infections transmitted by organisms such as viruses, bacteria, parasites or fungi. These organisms live on or in the human body, where some have beneficial roles, while others cause diseases, according to Mayo Clinic. They spread from through direct contact or indirect contact, and typical examples include measles, respiratory illnesses and malaria, notes Healthline.
The transmission of infectious diseases through direct person-to-person contact occurs when a person touches body fluids of an infected person. Infectious diseases transmitted this way include sexually transmitted diseases and respiratory illnesses. Some sexually transmitted diseases such as gonorrhea pass from the mother to the child during delivery. Infectious diseases also spread through the droplets created when an infected person speaks or through the spray of droplets when sneezing and coughing. Common examples where infectious diseases spread indirectly include airborne transmission and insect bites from organisms that suck blood such as fleas, ticks and mosquitoes, notes Healthline.
Symptoms of these diseases vary depending on the organism that causes them, and typical ones include diarrhea, muscle aches and fever. A person should seek medical attention in case of a cough that lasts for more than a week, if there is unexpected fever, sudden vision or breathing problems, or if an individual has been bitten by an animal, states Mayo Clinic. |
By unpicking how to read visual art, we will be able to piece together how to make a depiction of a person using a variety of visual language.
This week we looked at resemblance. We captured likeness through observational drawing using pencil.
Much easier to say than do.
Below are the images of the group and at the bottom are some very quick sketches made at the end of the session.
Well done everyone!
Next week we will introduce colour to a more familiar subject. |
Drug use is a complex, multi-faceted phenomenon that encompasses a range of behaviors. People who use drugs are complex, multi-faceted individuals who are more than their behaviors (i.e. drug use).
While there are inherent risks associated with drug use – whether related to where drugs are used, how they are used, and what kind or quality of drugs are being ingested – some ways of using drugs are clearly safer than others. This section outlines various options for people to approach their drug use consciously and minimize harm.
This section also provides information on harm rooted in drug-related stigma and discrimination, as opposed to the drug use itself.
Harm reduction tips and tools on individual drugs, including general information and safer use strategies. Also, a comprehensive (and growing) list of online resources specifically for people who use drugs.
Information and resources about drug-related stigma.
The Teeth Project focuses on state-of-the-art dental reconstruction that is normally prohibitively expensive for most people. (Harm Reduction Coalition is fiscal sponsor of The Teeth Project.)
The New York Health Benefit Exchange is where New Yorkers will shop for, compare and enroll in health insurance coverage. You will have a choice of health plans; help finding the plan that best meets your needs; and, for eligible persons, federal tax credits to help pay for coverage. Health insurance offered on the Exchange will include a comprehensive set of benefits. The Exchange will begin enrollment on October 1, 2013 for health insurance coverage that starts on January 1, 2014. |
According to the University of Florida, 18 species have the common name staghorn fern. They naturally are found growing in trees rather than soil and range from easy to grow to more difficult. They are hardy outdoors in U.S. Department of Agriculture plant hardiness zones 9 to 11, but can also be kept as houseplants. Although they all come from moist climates, some in the more challenging group, such as Playcerium superbum and Playcerium wandae, can be easily over-watered. This can lead to fungal growth on the staghorn fern, most commonly Rhizoctonia fungus. Ferns affected with this fungus will have black spots.
Stop watering and misting your fern. Too much water likely lead to the fungal infection and your plant needs to dry out.
Move the fern to a less humid location if possible. This will also help dry out the fern and stop the spread of the fungus.
Use a copper fungicide labeled to control Rhizoctonia blight. Follow the instructions for use on the container. Each product will have specific instructions for use, depending on the type of plant for fungus control. Copper fungicide won’t kill the fungus already growing, but it can help prevent its spread.
Water only when the fern starts to wilt, when starting to water again. Since you cannot check soil moisture when growing a staghorn fern, this is the best way to determine if your fern is truly in need of water. Watering needs can range greatly depending on your climate. In drier regions, they may need watering every few days, while in more humid and rainy regions, they may need watering only a couple of times a month.
Fertilizer your fern monthly with fish emulsion or general-purpose fertilizer that contains potassium, once you start watering again. This will help keep your fern healthy and able to fight disease.
Things You Will Need
- Copper fungicide |
Sputter deposition is a physical vapor deposition (PVD) method of thin film deposition by sputtering. This involves ejecting material from a “target” that is a source onto a “substrate” such as a silicon wafer. Resputtering is re-emission of the deposited material during the deposition process by ion or atom bombardment. Sputtered atoms ejected from the target have a wide energy distribution, typically up to tens of eV (100,000 K). The sputtered ions (typically only a small fraction of the ejected particles are ionized — on the order of 1 percent) can ballistically fly from the target in straight lines and impact energetically on the substrates or vacuum chamber (causing resputtering). Alternatively, at higher gas pressures, the ions collide with the gas atoms that act as a moderator and move diffusively, reaching the substrates or vacuum chamber wall and condensing after undergoing a random walk. The entire range from high-energy ballistic impact to low-energy thermalized motion is accessible by changing the background gas pressure. The sputtering gas is often an inert gas such as argon. For efficient momentum transfer, the atomic weight of the sputtering gas should be close to the atomic weight of the target, so for sputtering light elements neon is preferable, while for heavy elements krypton or xenon are used. Reactive gases can also be used to sputter compounds. The compound can be formed on the target surface, in-flight or on the substrate depending on the process parameters. The availability of many parameters that control sputter deposition make it a complex process, but also allow experts a large degree of control over the growth and microstructure of the film.
Showing all 5 results |
This is a high-power diode and a very powerful microwave source that is used in high-frequency electronics and microwave devices. A diode whose negative resistance is dependent on the classical effects of phase shift introduced by the time lag between maximum field and maximum avalanche current, and by the transit time through the device. It is an active solid-state device that operates by a reverse bias adequate to cause avalanche breakdown. 420. 442. The line that is plotted in the diode characteristic curve which represents the load, 429. Mostly used as a rectifier C. Mostly made with silicon D. All of the above Logic circuitry in which a diode is the logic element and a transistor acts as an inverting amplifier. TRAPATT DIODE Derived from the Trapped Plasma Avalanche Triggered Transit mode device. 11) The type of antenna to be used for producing circularly polarized beams is a) pyramidal horn b) log-periodic array c) paraboloid d) helical antenna 12) In LOS-line of sight propagation systems, to take account of normal refraction, an effective earth radius factor k is used whose value is a) 4/3 b) 4 c) ¾ ... Read more Microwave Engineering MCQ Questions Answers Electronics ECE Heutzutage kann pulsierende Leistung von 1,2 kW bei 1,1 GHz erzeugt werden und den höchsten Wirkungsgrad von 75 % konnte man bei 0,6 GHz erzielen. This point is technically termed as. We calculate in this paper the output power obtainable, versus frequency, for TRAPATT diodes. It is a variation of a tunnel diode. 449. A. 409. 415. When PN junction diode is forward bias, forward current is dominated by The diffusion current The displacement current The drift current The drift or diffusion current Answer – (1) 3. If the doping level of a crystal diode is increased ,the breakdown voltage. Four terminal multi-directional switch. Choose the letter of the best answer in each questions. In many respects the IMPATT diode is an unusual diode in that it is able to provide high power RF signals at microwave frequencies using a structure that is not that far different from the basic PN junction. In addition to reading the questions and answers on my site, I would suggest you to check the following, on amazon, as well: You can follow and Like us on following social media.Website - http://ekeeda.comParent Channel - https://www.youtube.com/c/ekeedaFacebook - https://www.facebook.com/ekeedaTwitter - https://twitter.com/Ekeeda_VideoLinkedIn- https://www.linkedin.com/company-beta...Instgram - https://www.instagram.com/ekeeda_/Pinterest - https://in.pinterest.com/ekeedavideoYou can reach us on [email protected] Learning : ) IMPATT Diode. It has very high noise figure which is about 60 dB. The resistor network is supplied with 10 V. 437. Gunn vs Impatt vs Trapatt vs Baritt-difference between Gunn diode, Impatt diode, Trapatt diode and Baritt diode types. Home » Electronics » Questions and Answers ». The gunn diode is. The impedance presented by a junction operating in its zener breakdown region. 435. 414. ... For Gunn diodes, gallium arsenide is preferred to … 425. 424. The effect obtain when the electric field across a semiconductor is strong enough which causes the free electrons to collide with valence electrons, thereby releasing more electrons and a cumulative multiplication of charge carriers occur. Here, you will discover the NEET Physics MCQ Questions for all Concepts as per the latest syllabus. In a diode-capacitor voltage quadrupler, what is the voltage across the third stage capacitor? Power Electronics MCQ Quiz & Online Test: Below is few Power electronics MCQ test that checks your basic knowledge of Power Electronics. 444. Principle of operation : A high field avalanche zone propagates through the diode and fills the depletion layer with a dense plasma of electron & holes that become trapped in low-field region behind the zone. a. lower noise. A. Jan 03,2021 - Test: 1P Diode Rectifiers FW | 20 Questions MCQ Test has questions of Electrical Engineering (EE) preparation. Help me go forward with the same spirit. B. How much power the diode can handle if operated at 50°C. They have negative resistance and are used as oscillators and … You have to select the right answer to a question. The TRAPATT diode belongs to the similar basic family of the IMPATT diode. 439. This page compares Gunn diode vs Impatt diode vs Trapatt diode and Baritt diode and mentions difference between Gunn diode,Impatt diode,Trapatt diode and Baritt diode. B. IMPATT diode. A planar TRAPATT diode includes a substrate selected from an area of a silicon wafer, a diffused region within the area, a mask of an insulating layer of SiO 2, and a conductive layer of polycrystalline silicon.The silicon wafer includes a doped P region adjacent to the surface thereof and a heavily doped P + region adjacent to the P region. 433. Harikesh Yadav February 24, 2017 ECE MCQ PDF, General. 403. inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. It is a high-efficiency microwave generator competent of operating from numerous hundred MHz to several GHz. A diode whose negative resistance is dependent on the classical effects of phase shift introduced by the time lag between maximum field and maximum avalanche current, and by the transit time through the device. Two germanium diodes are connected in series and have a load resistance of 10 kΩ and a forward supply voltage of 5 V. Calculate the voltage across the load resistor. TRAPATT DIODE The TRAPATT (Trapped Plasma Avalanche Triggered Transit) diode is another microwave energy which is used as both amplifier and oscillator. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize in each and every questions compiled here taken from various sources including but not limited to past Board Exam Questions in Electronics Engineering field, Electronics Books, Journals and other Electronics References. PN Junction Diode Multiple Choice Questions Answers; 1. MCQ in Semiconductor Microwave Devices and Circuits from the book Electronic Communication Systems by George Kennedy. A silicon diode is in parallel with a germanium diode and is connected to a load resistor having a value of 20 kΩ and a forward supply voltage of 10 V. What is the approximate voltage across the silicon diode? Multiple Choice Questions and Answers on Semiconductor Diode. It was first reported by Prager in 1967. 422. IMPATT diode basics. The TRAPATT diode's diameter ranges from as small as 50 μm for CW operation to 750 μm at lower frequency for highpeak- power devices. An improvement of a diode-capacitor half-wave voltage doubler is the full-wave doubler, this circuit uses how many capacitors? What will happen to the power handling capability of the diode if it is to be operated at a higher temperature? A Varactor Diode performs as A variable resistor A variable capacitor A switching device none of these Answer – (2) 2. A type of Read diode that uses a heavily doped n-type material as its drift region. Principles of Operation :- A high-field avalanche zone propagates through the diode and fills the depletion layer with a dense plasma of electrons and holes that become trapped in the low-field region behind the zone. 445. 415. ankit_pandey The TRAPATT mode is known as transit-time mode in the real sense that the time delay of carriers in transit (i.e. Practice more on a regular basis with these NEET Physics objective questions on air pollution and improve your subject knowledge & problem-solving skills along with time management. A. B) is reverse biased. Read diode. we respect your privacy and take protecting it seriously, Series of Multiple Choice Questions in Electronics Engineering, Pinoybix Elex is officially on Google Play | First of …, Complete List of Reviewers to Pass Engineering Board Exam, MCQ in Machine Design and Shop Practice Part 8 | …, MCQ in Machine Design and Shop Practice Part 7 | …, MCQ in Refrigeration Engineering Part 8 | ME Board Exam, MCQ in Solid State Devices Part 12 | ECE Board Exam, MCQ in Solid State Devices Part 11 | ECE Board Exam, MCQ in Solid State Devices Part 10 | ECE Board Exam, MCQ in Solid State Devices Part 9 | ECE Board Exam, MCQ in Solid State Devices Part 8 | ECE Board Exam, MCQ in Solid State Devices Part 7 | ECE Board Exam, MCQ in Solid State Devices Part 6 – Answers, MCQ in Solid State Devices Part 6 | ECE Board Exam, MCQ in Solid State Devices Part 5 – Answers, MCQ in Solid State Devices Part 5 | ECE Board Exam, MCQ in Solid State Devices Part 4 – Answers, MCQ in Solid State Devices Part 4 | ECE Board Exam, MCQ in Solid State Devices Part 3 – Answers, MCQ in Solid State Devices Part 3 | ECE Board Exam, MCQ in Solid State Devices Part 2 – Answers, MCQ in Solid State Devices Part 2 | ECE Board Exam, MCQ in Solid State Devices Part 1 – Answers, MCQ in Solid State Devices Part 1 | ECE Board Exam, MCQs in Special Services (Photo Electric, Photo voltaic). 434. One of the electronic semiconductor devices known as diac, function as, A. This high efficiency mode of operation is analyzed by means of a simplified model for both germanium and silicon avalanche diodes. A light emitting diode (LED) is to be used in a circuit with a supply voltage of 5 V. What should be the value of the resistor needed by the LED to operate normally? Is the combination of the inductance of the leads and electrodes, capacitance of the junction, and the resistance of the junction of a semiconductor diode. D. Path It can be viewed as two zener diodes connected back-to-back in series. 440. This is the Multiples Choice Questions Part 9 of the Series in Solid State Devices/Circuits as one of the Electronics Engineering topic. A diode that is especially processed so that its high-current flow takes place when the junction is reverse-biased. Also provides professionals with materials for their lectures and practice exams. Android Application - https://play.google.com/store/apps/details?id=student.ekeeda.com.ekeeda_studentAccess the Complete Playlist of Microwave Communication:- https://www.youtube.com/playlist?list=PLm_MSClsnwm8-xZSNbH3Am_AAs1QSffdMAccess the Complete Playlist of Chapter Avalanche Transit Time Devices:- https://www.youtube.com/playlist?list=PLL6Ah8JHS-GBEeYeFeDENzPX1Fze1yWe6Subscribe to Ekeeda Channel to Access More Videos :- http://gg.gg/Subscribe-Now#MicrowaveCommunication#EkeedaOnlineLectures #EkeedaVideoLectures #EkeedaVideoTutorialAvalanche Transit Time DevicesAvalanche Transit Time Devices Video LecturesAvalanche Transit Time Devices VideosMicrowave CommunicationMicrowave Communication TutorialMicrowave Communication in LecturesThanks For Watching. A clipper circuit wherein the diode is connected in series with the load. Which of the given circuit below must have a capacitor? In a reverse-biased pn junction, the sudden large increase in current that occurs when a particular value of reversed voltage is reached, and which is due to ionization by the high intensity electric field in the depletion region. The appearance of RF current oscillations in a dc-biased slab of n-type gallium arsenide in a 3.3 kV electric field. This is also considered as an ac diode. Half-wave rectifier is a good example of. 447. The maximum power the diode can handle. Diode is said to be operating at a point where the characteristic curve and the load line intersect. B) the diode is destroyed. 419. (Redirected from TRAPATT diode) An IMPATT diode (IMP act ionization A valanche T ransit- T ime diode) is a form of high-power semiconductor diode used in high-frequency microwave electronics devices. 10 to 10 2 W/m 2. A bulk effect device. NEET Physics is the scoring paper in the medical entrance examination. 1W Zener Diode Assorted Kit (30 Values x 11pc 3V 3.3V 3.6V 3.9V 4.3V 4.7V 5.1V 5.6V 6.2V 6.8V 7.5V 8.2V 9.1V 10V 11V 12V 13V 15V 16V 18V 20V 22V 24V … 450. 436. Trapatt diode 1. TRAPATT mode can operate at low frequencies since discharge time of plasma can be considerably greater than the nominal transit time of the diode at high field. P+ region is kept thin and is of 2.5 to 2.7 μm . TRAPATT Diodes Video Lecture From Avalanche Transit Time Devices Chapter of Microwave Communication Subject For All Engineering Students. Sie ist ein Bauteil mit hoher Leistung und hohem Wirkungsgrad. Pinoybix.org is an engineering education website maintained and designed toward helping engineering students achieved their ultimate goal to become a full-pledged engineers very soon. 404. A rectifying metal-semiconductor junction, 412. Diode whose negative resistance depends on a specific form of quantum-mechanical bond structure of the material, 413. The biggest advantage of the TRAPATT diode over the IMPATT diode is its. 417. A germanium diode is connected to a load resistance of 1.5 kΩ and is supplied with 12-V such that the diode will be forward biased. This device is also known as Esaki diode. The model evolved from a study of detailed computer simulations of experimental diode‐circuit systems. What is the voltage across the diode? What semiconductor diode that have a fine wire (called a cat-whisker) whose point is in permanent contact with the surface of a wafer of semiconductor material such as silicon, germanium or gallium arsenide? A silicon diode that exhibits a very high resistance in both directions up to certain voltage, beyond which the unit switches to a low-resistance conducting state. How many capacitors are used in a diode-capacitor half- wave voltage doubler? The regulator circuit consists of a zener diode in parallel with the load and an appropriate limiting resistor. In this video, I have explained following topics regarding IMPATT Diode: 1. D. all of the above A semiconductor device especially fabricated to utilize the avalanche or zener breakdown region. Diode circuit that is used to cut a portion of the input signal, 438. What will happen to the magnitude of the load-line slope when the load resistance is decreased? An avalanche diode having a P+NN+ or N+PP+ doping profile and operable in the TRAPATT mode, but wherein the impurity profile of the device is such as to prevent initiation of TRAPATT oscillations by IMPATT oscillations. Quiescent or Q-point position is dependent on. 427. In a PN junction with no external voltage, the electric field between acceptor and donor ions is called a. C) carries more than the rated current. 432. A network with a diode and a capacitor that is used to shift the dc-level of the input signal, 441. Refers to a special type of diode which is capable of both amplification and oscillation. 1. Jan 01,2021 - Test: Types Of Power Diodes | 20 Questions MCQ Test has questions of Electrical Engineering (EE) preparation. Following is the list of practice exam test questions in this brand new series: P 446. 443. 408. ELECTRONICS AND COMMUNICATION ENGINEERING IMPORTANT MCQ-Microwave,EMFT,Communication Part-3. A simple voltage-regulator whose output is the constant voltage drop developed across a zener diode conducting in the reverse breakdown region. Peak. 407. A chopper, employing an alternately biased diodes as the switching element. It operates efficiently below 10 GHz and need greater voltage swing for its operation. Die TRAPATT-Diode ist ein Hochfrequenz-Halbleiter-Bauelement der Mikroelektronik, das als Diode zu den elektronischen Bauelementen gehört. 34. 410. After this, operation of the Read diode was demonstrated and then in 1966 a PIN diode was also demonstrated to work. TRAPATT DIODE ANKIT KUMAR PANDEY M.TECH 3rd sem ALLAHABAD UNIVERSITY 1 ankit_pandey 2. ... Q135 THE BIGGEST ADVANTAGE OF THE TRAPATT DIODE OVER THE IMPATT DIODE IS IT’S (a)lower noise (b)higher efficiency (c)ability to operate at higher frequency (d)lesser sensitivity to harmonics When the p-n junction of a semiconductor diode is inserted with an intrinsic material, the diode becomes a. 448. 418. Basic electronics Important Multiple choise question MCQ, Semiconductor diode important questions and answers that is very important for all examination, B. This is normally operated in the reverse-region and its application is mostly for voltage reference or regulation. 421. The term TRAPATT stands for “trapped plasma avalanche triggered transit mode”. TRAPATT Diodes Video Lecture From Avalanche Transit Time Devices Chapter of Microwave Communication Subject For All Engineering Students. What is the most important specification for semiconductor diode? C. TRAPATT diode. MCQ on Rectifiers and Converters. Subscribe to our mailing list and get interesting stuff and updates to your email inbox. C. Threshold. D) none of the above. What is the output voltage across a load resistor if it is paralleled with a forward biased silicon diode? At the moment, Pinoybix has become one of the most trusted engineering review sites helping thousands of aspiring engineers achieve their goals. The Trapatt diodes diameter ranges from as small as 50 µm for µw operation to 750 µm at lower frequency for high peak power device. Gunn Diode objective questions and answers. BARITT Diode is consist of two back to back diode in its construction, so when potential is applied, most of the voltage drop occurs across the reverse biased diode region.BARITT Diode operation is based on the Punch through Effect which is when the voltage is increased till the edges of the depletion region meet, then a condition occurs that is known as Punch through effect. 405. A certain diode has a maximum power dissipation of 500 mW at room temperature and a linear power derating factor of 5.0 mW/°C. Construction: Diode comprises of two layers of heavily doped P+ and N+ region and a N doped third layer is used to separate the heavily doped layers as shown in figure. What is the drop across the diode when it is connected in series to a resistor of 1.8 kΩ and a supply voltage of 50 V. The supply voltage causes the diode to be reverse-biased. Barrier. The TRAPATT diode is normally used as a microwave oscillator. IMPATT Diode Basics 2. Another name of a three-layer diode. 423. 33. This Power Electronics Test contains around 20 questions of multiple choice with 4 options. This test is Rated positive by 85% students preparing for Electrical Engineering (EE).This MCQ test is related to Electrical Engineering (EE) syllabus, prepared by Electrical Engineering (EE) teachers. 401. C) the diode behaves like a zener diode. 431. A device containing more than one diode. 430. IMPATT diode is abbreviated as an impact-ionization avalanche transit-time diode. These MCQs are very important & helpful for campus placement test, semester exams, job interviews and competitive exams. 411. A four layer semiconductor diode whose characteristic at the first quadrant is similar to that of a silicon-controlled rectifier (SCR). This test is Rated positive by 90% students preparing for Electrical Engineering (EE).This MCQ test is related to Electrical Engineering (EE) syllabus, prepared by Electrical Engineering (EE) teachers. A) the diode conducts poorly. The doping concentration of N region is such that the depletion in this region is just at breakdown. It has the advantage of a greater level of efficiency when compared to an IMPATT microwave diode. Following are the disadvantages of TRAPATT diode: It is not used for continuous operation mode as it offers high power densities i.e. 402. Zener diode is destroyed if it… A) is forward biased. 426. Diode parameter that will inform the user as to what factor does the power handling capability of the diode is reduced as the operating temperature is increased. 416. It was first reported by Prager in 1967. What do you call a clipper circuit wherein the diode is shunted with the load? IMPATT Diode Internal Structure 3. D) none of the above. It is a p-n junction diode characterized by the formation of a trapped space charge plasma within the junction region. An example is the full-wave bridge-rectifier integrated circuit. A negative resistance diode commonly used in microwave oscillators and detectors, it is sometimes used as amplifiers. A curve showing the relationship between the voltage and the current of the diode at any given temperature, 428. TRAPATT Diode. PDF | On Apr 8, 2015, Vatsal N Shah published TRAPATT DIODE | Find, read and cite all the research you need on ResearchGate Typically the DC to RF signal conversion efficiency may be in the region of 20% to 60% which is particularly high.. TRAPATT diode basics A combination of several diodes in a single housing. 406. The time required for forward voltage or current to reach a specified value after switching the diode from its reverse-to-forward-biased state.
Gravy In Arabic, Ink Tank Printer Pros And Cons, Change Your Thinking Book, Professional Office Administrator Job Description, Quilt As You Go No Front Sashing, Naica Mine Crystals, Floracraft Smooth Finish Cosplay, |
- habitat structure
- food webs
The first activities review data and identify ideas in the book (like critter and habitat diversity).
In later activities students design experiments and conduct field studies. These activities use Ellie and Ricky as models for asking questions, recording information and pursuing answers to their own questions. Biota and ecological processes in the book are based on research at the H.J. Andrews Experimental Forest, and can be used as data for class activities.
Molly Charnes, a teacher in the HJA Research Experience for Teachers program, created a game entitled: H.J. Andrews Experimental Forest Tea Party, that includes a “deck” of organism role cards with great photos and notes on natural history. These are biota of Ellie’s forest, and in addition to the Tea Party game, could be used in a variety of ways to explore questions of biota, habitats or ecosystems. I’ve added a few stream organism role cards specific to Ellie’s Log. |
Logic proof solvers, or logic calculators, are tools that help individuals check the validity of their premises and conclusions. Logic proofs are a numbered series of letters and symbols that symbolically represent an argument.
Logic calculators may simply assistance students in finding flaws in their logic proofs, or they may point out specific areas of nonsensical reasoning. Logical reasoning involves presenting a series of arguments that demonstrates that if one thing is true, then another, through a series of implications, must also be true or untrue. Logic proofs are semi-mathematical in nature in that they assign a specific system of representative symbols that, like a formula, consistently produces the same result. |
Considering your options for healthy skin dermatology? Dermatology is the science that is concerned with the diagnosis and treatment of diseases of the skin, hair and nails. Did you know that your skin is the largest and most visible organ of the body? It reflects the overall health of your body and also acts as a barrier against injury and bacteria.
If something related to your skin or hair is bothering you, a dermatologist can help with diagnosing and treating specific conditions which can include:
- skin rashes or skin irritation
- itchy, flaky, or scaly skin
- skin blemishes or discoloration
- moles, warts, or other skin growths
- signs of aging, like wrinkles, sun damage, or sagging skin
- hair loss or hair damage
What if however you are not having an issue but you just want healthy glowing skin? Many people spend a lot of time and effort in taking care of their skin. Beauty is a big business, and the global cosmetic skincare market for 2020 is estimated to be worth $145.3 billion. This figure demonstrates how much money consumers invest in their quest for flawless skin.
Mainstream skin care products are the go-to choice for many consumers, but natural skincare is becoming increasingly popular. As more shoppers become environmentally-aware, the demand for skincare that is free from chemical nasties increases.
Achieving healthy skin naturally gives you a glow that you cannot get from plastic surgery and quick fixes. If you are interested in transforming your skin without the need for chemicals, then why not give some of these ideas a try and see if you notice the difference? These healthy skin dermatology tips that can be done at home might just do the trick.
Slap on the Sunscreen
While everyone needs vitamin D to stay healthy, too much exposure to the sun is bad news for your complexion. If you are someone that lays out in the sun each summer to achieve a golden glow, you could be damaging your skin. Protecting your skin from the sun’s harmful rays is vital to avoid sun damage, premature aging, and cancer. Using a good quality sunscreen will help to protect you against the potentially damaging effects of the sun.
Read More >>> All About Beauty Tips for Summer: Head to Toe
Use a Body Brush
Dry body brushing is an excellent way to naturally improve the appearance of skin. Dry body brushing helps remove dead skin cells, reduce fluid retention, and get your lymph moving. The result is healthier-looking legs and less cellulite.
Moisturizing your skin is vital. But to get the most benefit from moisturizing your skin, you will need to choose the best products for the job. Using moisturizers such as hemp cream that utilize the power of nature provide the perfect moisturizing solution. Rubbing a natural cream into your skin will provide you with the reassurance of knowing that no hidden nasties are lurking within the product.
Moisturizing is essential for helping skin maintain its moisture barrier, improving its appearance, and staying healthy. Using your moisturizer each day should help to keep the skin soft and supple.
Read More >>> Top 5 Dry Skin Remedies That Are Cheap
Keep on Drinking For Glowing Skin
While moisturizing is essential, it is also crucial to go deeper than this and protect your skin from the inside out. The best way to take care of your skin from the inside is to keep it hydrated. Drinking enough water each day is an excellent way to achieve clear skin and also has a whole host of other benefits for your wellbeing.
Eat for Skin Health
While everyone knows about the foods that can be detrimental to the health of your skin; fewer people know about the foods that can improve their complexion. Most people suffer from breakouts or dry skin when they over-indulge in sweet treats and greasy foods. Research into foods linked to skin health still has a way to go but eating a balanced diet that includes foods rich in antioxidants is a great place to start and works wonders for healthy skin dermatology.
Read Next >>> Beauty Superfoods: 11 Best Foods for Gorgeous Skin |
(SwStr: t. 843; s. 12 k.)
Magnolia was a seagoing, wooden sidewheeler with typical walking-beam engine, built at Greenpoint, N.Y., in 1857. One of 14 ships belonging to Charles Morgan's Southern S. S. Co., she was impressed as a public vessel at New Orleans, 15 January 1862, by Maj. Gen. Mansfield Lovell, CSA, acting for Secretary of War Benjamin. The original intention was to arm them all as cottonclad rams to defend the Delta, but further consideration argued in favor of smaller, low-pressure steam towboats, with lower fuel consumption and easier to shield for battle, and few of the high-pressure seagoing steamers were used for this essentially inappropriate role.
Rejected as a ram but probably still Government-owned, Magnolia made at least two successful runs to nearby British islands in 1861 with extremely large cargoes. Escaping through Pas aŽ l'Outre, she was overhauled, 19 February 1862, by USS Brooklyn and South Carolina as a rich prize carrying 1,210 bales of cotton. USS Magnolia entered the U.S. Navy 22 July 1862 at New York, following Key West prize court proceedings in April. After expensive repairs, she was a valuable gunboat carrying 2 to 5 guns the rest of the war. Sold at auction 12 July 1865, she was enrolled for commercial transportation 23 August, going out of service in 1866.
(SwStr: t. 824)
New Orleans sidewheeler Magnolia, built at New Albany, Ind., in 1859, was "one of the finest steamboats in the West" and served the Confederacy well as a river transport until destroyed in the Yazoo City area to escape Porter's flotilla, the spring of 1863. Admiral Porter wrote that the chief gain from his Yazoo Pass expedition was its "harm to the enemy" in causing them "to sink the Star of the West, Magnolia, and Natchez, three of their best vessels." |
How do metamorphic rocks form? Fault. hydrothermal metamorphism. The original rock (protolith) is subjected to heat (temperatures greater than 150 to 200 °C) and pressure (1500 bars), causing profound physical and/or chemical change. Other metamorphic rocks form when the rocks surrounding super-hot igneous rocks are baked by the high temperatures. This causes the platy or elongated crystals of minerals, such as mica and chlorite, to become rotated such that their long axes are perpendicular to the orientation of shortening. The differences in formation account for variations in the appearance of the rocks and, with some practice, you can learn to recognize the different types by sight. 8. Examples of Metamorphic Rocks. Non-foliated metamorphic rocks do not have a layered or banded appearance. They come in infinite sizes, shapes, colors, weights, textures, and strengths. Depending on conditions, a protolith can transform into any metamorphic rock. Metamorphic rocks form when rocks are subjected to high heat, high pressure, hot mineral-rich fluids or, more commonly, some combination of these factors. Metamorphic rocks do not melt. These rocks are transformed near, but not within the magma, so that that area has very high temperatures, but is not directly in the molten rock swell. Because of the conditions necessary to transform rocks, those being heat and pressure, the process usually occurs deep within the Earth’s crust, or in areas where tectonic plates collide. What is quartzite? The study of metamorphic rocks (now exposed at the Earth's surface following erosion and uplift) provides information about the temperatures and pressures that occur at great depths within the Earth's crust. These rocks undergo a change, either caused by high heat, high pressure, or exposure to mineral rich hot liquid, which transforms the existing rock into a new type of rock, changing the minerals’ composition in the process. Many complex high-temperature reactions may take place, and each mineral assemblage produced provides us with a clue as to the temperatures and pressures at the time of metamorphism. Metamorphic Definition. 31m video. In the process atoms are exchanged between the minerals, and thus new minerals are formed. Uplift and erosion help bring metamorphic rock to the Earth's surface. Metamorphic Rock. Protolith undergoes high temperature and high-pressure processes, which also cause a physical and chemical change in the rock. Figure 4.13 shows a large outcrop of metamorphic rocks. As this process happens deep below the surface of the earth, these rocks are often rarer, or at the very least, harder to find on the Earth’s surface, than other types of rock, and only come to light due to geological lift. A mineral and a rock do not mean the same thing. 11. It is a low-grade metamorphic rock that splits into thin pieces. sedimentary rocks: formed by the compaction and cementing of layers of sediment (rock fragments, plant and animal remains, minerals from water) 3. metamorphic rocks: formed by the effect of heat and pressure on other rocks. Examples of these rock types include marble, slate, gneiss, schist. Foliated Nonfoliated. If originally of similar composition they may be very difficult to distinguish from one another if the metamorphism has been great. How to use metamorphic in a sentence. These conditions are most often found either deep in Earth’s crust or at plate boundaries where tectonic plates collide. When these are compressed and heated a little, tiny new flakes of mica grow, and tend… Slate (with folded layer) This rock originally consisted of alternating layers of silty material and mud. They are also formed when rock is heated by the intrusion of hot molten rock called magma from the Earth's interior. Metamorphic grade is a general term for describing the relative temperature and pressure conditions under which metamorphic rocks form. In that case, hybrid rocks called skarn arise, which don't have the characteristics of normal igneous or sedimentary rocks. Marble and slate are examples of metamorphic rock. The original rock is subjected to very high heat and pressure, which cause obvious physical and/or chemical changes. Folded or wavy layers; large crys… 8 Terms. Metasomatism is the drastic change in the bulk chemical composition of a rock that often occurs during the processes of metamorphism. Again, this happens at the boundaries of tectonic plates, usually along mountain belts and ranges. Best Answer: Igneous rocks are made by: melting, cooling, crystallization and then destroyed by the way sedimentary rocks are made by: weathering, erosion/transport, deposition/precipitation, lithification and then destroyed by the way metamorphic rocks are made by: … 35m video. Uplift and erosion help bring metamorphic rock to the Earth's surface. When rocks are transformed by heat, it is known as thermal metamorphism. Igneous rocks form at higher temperatures than metamorphic rocks do. How do metamorphic rocks form? What is recrystallization? The original rock (protolith) is subjected to heat (temperatures greater than 150 to 200 °C) and pressure (100 megapascals (1,000 bar) or more), causing profound physical or chemical change. What does shale become when heated and put … Metamorphic Environment and Tectonic Setting. Any rock, including igneous and sedimentary … This screencast has been created with Explain Everything™ Interactive Whiteboard for iPad They may be formed simply by being deep beneath the Earth's surface, subjected to high temperatures and the great pressure of the rock layers above it. Like quartz, it maintains a strong crystalline structure, and is very hard and dense. Extreme pressure may also lead to the form… It is due to the introduction of chemicals from other surrounding rocks. This means that temperature was the principal cause of the transformation, and the catalyst for the protolith rock’s recrystallization. Use the resource below to answer the questions that follow. 4 years ago. Describe gneiss. The metamorphic rocks which are produced by this process as known as dynamothermal metamorphic rocks, and are some of the most commonly formed. “When igneous, sedimentary or even metamorphic rocks get buried deep beneath the surface of the earth, over millions of years the heat and pressure inside the earth change them into something else” (Koday, 1998). Around the igneous rock that forms from the cooling magma is a metamorphosed zone called a contact metamorphism aureole. “”Metamorphic rocks arise from the transformation of existing rock types, in a process called metamorphism, which means “change in form””. The process in which sedimentary and igneous rocks are crushed and melted underground to form metamorphic rock is explained. Lesson 6. Metamorphic rocks are formed, buried inside the Earth’s surface on being subjected to high temperatures and pressures of the rock layers above it. Metamorphic rocks arise from the transformation of existing rock types, in a process called metamorphism, which means "change in form". Extreme pressure or heat can squeeze or cook rocks so much that they change their character, turning into metamorphic rocks. If the rock was originally banded or foliated (as, for example, a laminated sandstone or a foliated calc-schist) this character may not be obliterated, and a banded hornfels is the product; fossils even may have their shapes preserved, though entirely recrystallized, and in many contact-altered lavas the vesicles are still visible, though their contents have usually entered into new combinations to form minerals that were not originally present. 6. Metamorphic rocks are formed through immense pressure and heat below the surface of the earth. The formation of important ore minerals may occur by the process of metasomatism at or near the contact zone. This shearing and crushing of the plates is the main cause of cataclastic metamorphism, and results in rocks with very small, broken down particles. Metamorphic rocks are formed from other rocks that are changed because of heat or pressure. After this process, the protolith rock will often change texture, composition and mineralogy to create a new completely different rock form. The standard scientific notation for pressure is expressed in pascals or megapascals (1 pascal is equivalent to 10 bars). These more intense stages of alteration are not Marble is a beautiful type of non foliated metamorphic rock which is actually derived from limestone, a carbonated sedimentary rock. Where do metamorphic rocks form… Wind, rain and breakdown wash or eat away at the dirt and rock encompassing these metamorphic rocks deep underground. Although different rocks can contain the same minerals, they are sorted into different types of rocks depending on how they were formed.. Metamorphic rocks form when existing rocks are exposed to heat and pressure deep within the Earth’s surface. A metamorphic rock forms from a parent rock called a protolith. Metamorphic rocks can be formed by pressure deep under the Earth's surface, from the extreme heat caused by magma or by the intense collisions and friction of tectonic plates. Metamorphic rocks start off as igneous, sedimentary, or other metamorphic rocks. metamorphic rocks that contain distinct layers with parallel, flat, or elongated minerals. contact metamorphism. These minerals formed during the crystallization of igneous rocks. These extreme conditions converge to create a physical and/or chemical change in the original, or protolith rock. Originally, they were either igneous or sedimentary rocks. Metamorphic definition is - of or relating to metamorphosis. Metamorphic rocks are actually products of rocks that have undergone changes. Regional metamorphism tends to make the rock more indurated and at the same time to give it a foliated, shistose or gneissic texture, consisting of a planar arrangement of the minerals, so that platy or prismatic minerals like mica and hornblende have their longest axes arranged parallel to one another. These minerals, known as index minerals, include sillimanite, kyanite, staurolite, andalusite, and some garnet. , By recrystallization in this manner peculiar rocks of very distinct types are often produced. It is used in the production of high grade steel. With time, extreme pressure and heat cause some chemical changes to occur, transforming the original rocks into metamorphic rocks. Movement in Earth’s crust can cause cracks called faults. Metamorphic rocks are often made from other types of rock. Metamorphic rocks undergo a progressive transition as the original rock is exposed to increasing heat and pressure. Therefore, metamorphic rocks are created by either the physical or chemical alteration through heat and pressure of an igneous or sedimentary rock into a denser form. Metamorphic rocks are the rocks formed from other rocks. 31m video. • Anthracite is actually a metamorphic rock. The three main ways terrestrial rocks are formed: Sedimentary rocks are formed through the gradual accumulation of sediments: for example, sand on a beach or mud on a river bed. They are sedimentary or igneous rocks that have undergone changes as a result of extreme pressure and heat. Metamorphic activities occur in heats between 300° and 1470° Fahrenheit. Metamorphic rocks make up a large part of the Earth's crust and form 12% of the Earth's land surface. Metamorphic Rocks Metamorphic rocks are rocks that have been changed from their original form by immense heat or pressure. Pressure levels must similarly reach a very high level. In order for this metamorphosis to occur, the heat and/or pressure surrounding the rock much reach certain extreme levels. , There is also a tendency for metasomatism between the igneous magma and sedimentary country rock, whereby the chemicals in each are exchanged or introduced into the other. 10. Igneous rocks can turn into a metamorphic rock by converting it into magma and cooling it. How do sedimentary rocks and igneous rocks change? Metamorphic rocks form under conditions somewhere between the conditions that form sedimentary rocks and the conditions that form igneous rock. Sometimes an invading granite magma permeates the rocks around, filling their joints and planes of bedding, etc., with threads of quartz and feldspar. › Quiz. Another important mechanism of metamorphism is that of chemical reactions that occur between minerals without them melting. This means the classification is dependent on the protolith which is used to form the metamorphic rock. The diagram above shows you how the rocks on Earth have been changed continually over time from one rock type to another. It is this plating process which creates thin layers and directional patterns in the rocks. The layering within metamorphic rocks is called foliation (derived from the Latin word folia, meaning "leaves"), and it occurs when a rock is being shortened along one axis during recrystallization. It can also occur close to volcanoes, where underground magma can cause the heating. These walls expose metamorphic rock formed by heat and pressure deep underground almost two billion years ago. Home; About Oak; People & partners; News & views; Contact; Support and … For other uses, see, Learn how and when to remove this template message, Metamorphic textures – Middle East Technical University, Metamorphic Rocks Tour, an introduction to metamorphic rocks, https://en.wikipedia.org/w/index.php?title=Metamorphic_rock&oldid=994798092, Wikipedia articles incorporating a citation from the 1911 Encyclopaedia Britannica with Wikisource reference, Wikipedia articles incorporating text from the 1911 Encyclopædia Britannica, Wikipedia indefinitely semi-protected pages, Short description is different from Wikidata, Articles needing additional references from January 2012, All articles needing additional references, Creative Commons Attribution-ShareAlike License, This page was last edited on 17 December 2020, at 16:12. They can form from tectonic processes such as continental collisions, which cause horizontal pressure, friction and distortion. That’s a pretty neat way of understanding different types of rocks! fine grained, compact, non-foliated products of contact metamorphism. The word "metamorphic" comes from Greek and means "To Change Form". This layering is a result of the process of metamorphism. The specimen shown above is about two inches (five centimeters) across. 7. Non-foliated rock does not have planar patterns of strain. Foliated rocks are rocks where the minerals have become aligned. For example, shale, a sedimentary rock, can be changed, or metamorphosed, into a metamorphic rock such as slate or gneiss. Metamorphic rocks started out as some other type of rock, but have been substantially changed from their original igneous, sedimentary, or earlier metamorphic form. Within the Earth’s crust there are tectonic plates which move and shift. Metamorphic rocks:-The rocks that are formed when rocks are subjected to high heat and pressure are called as metamorphic rocks. Slate. Lv 4. Metamorphic rocks are one of the three types of rock classifications, the other two being igneous and sedimentary. They are not made from molten rock – rocks that do melt form igneous rocks instead. They are classified by texture and by chemical and mineral assemblage (metamorphic facies). deep within the earth's crust. The steep canyon was carved by the Gunnison River; the unusually fast flow of this river has allowed it to cut through the notoriously tough metamorphic rock. Soapstone is an unusual type of rock which is formed when mineral talc, which is rich in magnesium is transformed into a solid, hard rock. They may form when buried rocks are squeezed, folded, and heated as mountain ranges are pushed up from Earth’s crust (outer layer). Aureoles may show all degrees of metamorphism from the contact area to unmetamorphosed (unchanged) country rock some distance away. In Geology, metamorphic basically pertains to or exhibiting structural change or transformations. Regional metamorphism, also known as dynamic metamorphism, is the name given to changes in great masses of rock over a wide area. The parent rock can be either sedimentary, igneous, or even another metamorphic rock. Why are these rocks the most dense? Sometimes heat and pressure work together to produced metamorphic rock. Thus shales may pass into cordierite rocks, or may show large crystals of andalusite (and chiastolite), staurolite, garnet, kyanite and sillimanite, all derived from the aluminous content of the original shale. It forms during mountain building when compaction and friction are extremely high. Where do metamorphic rocks form? 6. This is contact metamorphism. After being compacted they will become sedimentary rocks. How are metamorphic rocks classified? metamorphic rocks do not really form at the surface, although what you mean by "surface" does matter. Once this melted rock cools, igneous rock has been formed. With close attention to the grains and crystals that make up metamorphic rocks, you’ll be able to distinguish … If you notice any major striations in the rock, you are likely dealing with metamorphic rock. You may remember that igneous rocks form when rocks are heated to the point of melting. Rocks are made up of one or more minerals. They are generally found inside the Earth's crust where there is enough heat and pressure to form the rocks. This is valuable to find out the conditions under which a rock was formed and to understand the geological … On the edge of the specimens, however, the white folia of granular quartz will be visible. How is metamorphic rock formed? For example, slate is a foliated metamorphic rock, originating from shale. We call this process metamorphism. This is caused by mass amounts of pressure, usually in conjunction with heat, which force the elongated minerals to fall into a foliated pattern. Conditions like these are found deep within the Earth or where tectonic plates meet. Moreover, a protolith can be a sedimentary rock, igneous rock or an … Metasomatism will change the original composition. What are the steps in the rock cycle? of clay or sand in the original rock such minerals as garnet, epidote, idocrase, wollastonite, will be present. Still, the introduction of new chemicals is not necessary for recrystallization to occur. For example, when granite undergoes extreme pressure and heat, it can be transformed into a type of gneiss. Metamorphic minerals are those that form only at the high temperatures and pressures associated with the process of metamorphism. A shale may become a dark argillaceous hornfels, full of tiny plates of brownish biotite; a marl or impure limestone may change to a grey, yellow or greenish lime-silicate-hornfels or siliceous marble, tough and splintery, with abundant augite, garnet, wollastonite and other minerals in which calcite is an important component. Resource below to answer the questions that follow thus new minerals grow the... Answer the questions that follow normal igneous or sedimentary rocks time from one another quartzite... Protolith which is actually derived from limestone, a protolith can be difficult determining whether a rock a. Occurs during the crystallization of igneous rocks are exposed at the Earth 's crust and form 12 % of specimens! Bring metamorphic rock to the Earth ’ s a pretty neat way of understanding different types of rocks in! Anthracite is actually derived from limestone, a protolith of chemicals from other rocks that form rocks. The classification is dependent on the protolith rock they how do metamorphic rocks form form from tectonic processes such mica... And mineral assemblage ( metamorphic facies ) rearranging their structure some distance away cause some chemical.... Describing the relative temperature and high-pressure processes, which also cause a physical and chemical is. From magma “ bakes ” surrounding rock so that it is a product of differential stress the. That follow given to changes in great masses of rock over a wide area is... Greater heat and pressure completely different rock form texture and by chemical mineral... Protolith can transform into metamorphic rocks forms from the cooling magma is a general term for describing relative! Often occurs during the process of metamorphism is called recrystallization allows its use as a result a. Down into sediments sizes, shapes, colors, weights, textures and. Derived from limestone, a protolith can transform into any metamorphic rock, you are likely dealing with rock... And ranges these faults or cracks create a new completely different rock form, completely... Matamorphic rocks that were originally sedimentary and rocks that have undergone changes as a result of heat. Place on a large scale. [ 4 ] original or parent rock called a can. Into sediments from their original form by immense heat or pressure, protolith! Is hard to identify what they were originally sedimentary and rocks that have mineral with. Are under pressure, the rock will often change texture, composition and mineralogy to create a completely... Used to form a rock 's physical and chemical composition how do metamorphic rocks form a that! The parent rock can how do metamorphic rocks form either sedimentary, or combination of two or different! Physical changes as index minerals, non foliated rocks are classified as either foliated or non foliated metamorphic being. `` metamorphic '' comes from Greek and means `` to change form '' crust is primarily! Their character, turning into metamorphic rocks are changed because of heat or pressure place a! Or sedimentary rocks pascal is equivalent to 10 bars ) rocks of very distinct are! Where there are many more with some really weird names like anthracite, quartzite, marble, quartzite marble! The foliation is the aligning of elongated or platy layers, sedimentary, or other rocks! Volcanoes, where underground magma can cause cracks called faults from other surrounding rocks and almost smokeless the. And are tougher and less fissile anthracite, quartzite, granulite, gneiss and schist as more and coarsely. Different minerals layers and directional patterns in the process of metasomatism at or near the area... Over a wide area combination of two or more maintains a strong crystalline structure, and conditions. Term for describing the relative temperature and pressure, `` metamorphic '' comes from Greek means. Cause cracks called faults form… how do slate, phyllite, and some of mineral... Not become foliated extreme levels deal of friction distinct layers with parallel, flat, or other metamorphic form. Normal igneous or sedimentary rocks and the minerals that formed them pressure, `` metamorphic redirects! Magma from the original or parent rock into a completely new rock crust is metamorphic, except for igneous! So transformed that it is used in the new rocks are rocks that have mineral grains with a,... Sometimes creating a plane of cleavage unchanged during the crystallization of igneous rocks these types! • anthracite is actually derived from limestone, a carbonated sedimentary rock under?... Are elongated minerals schist, and are some of the Earth ’ surface! Carbonated sedimentary rock, originating from shale crystalline structure, and the minerals that formed! When magma cools relatively slowly underground minerals need to be stable under the same pressure and below. Underground almost two billion years ago, originating from shale Earth have changed! Be of different grades ( low, medium, high pressure, friction and distortion to heat! Pressure levels must similarly reach a very high heat and pressure, do! Crust where there are tectonic plates which move and shift flags, photos and original ©... Lift happens when soil is eroded over time from one rock type to another are actually products of that. Ideal environment for metamorphic rocks form when the rocks on Earth have been by... And distortion on the metamorphic rock are very specific may change during metamorphism is that of chemical reactions occur! They are sedimentary or igneous intrusions common uses these rock types ( igneous sedimentary... Less fissile that occur between minerals without them melting for sculpture and architecture compress, however they do align... And high-pressure processes, which cause obvious physical and/or chemical changes hard and.! A change in the production of high grade steel of these rocks split readily in one plane sometimes... Be transformed by heat and pressure underground the heating figure 5.1.1-1 – is! Rock much reach certain extreme levels the existing rock types, in a process called metamorphism, which turn! To 10 bars ) rock types include marble, slate is a term. Minerals is put under immense pressure and heat cause some chemical changes together to produced metamorphic rock to the 's! Burns very hot and almost smokeless not made from molten rock called magma from the alteration of rock. Heat, it must be exposed to high heat and pressure formed them minerals is put pressure. As either foliated or non foliated rocks are under pressure turning into metamorphic rocks are from! Dirt and rock encompassing these metamorphic rocks are baked by the high temperatures and pressures associated with the process metamorphism! Intrusion it very frequently becomes more indurated, and some garnet underground to form unchanged ) rock. -The rocks that have undergone changes original form by immense heat or alters... Does not have planar patterns of strain again, this tends to take place in of! Understand their basic types and how is it formed of rocks make up facies are groups metamorphic... There is a result of the lower continental crust is metamorphic, hornblende. Are crushed and melted underground to form a rock is exposed to high heat and pressure deep the... Outcrop of metamorphic rocks arise from the contact area to unmetamorphosed ( unchanged ) country rock some away. Plane, sometimes creating a plane of cleavage rocks called skarn arise, which causes chemical or physical.., non foliated rocks are how do metamorphic rocks form to the introduction of new chemicals not. Igneous, or metamorphic—can become a metamorphic rock to the point of melting to how do metamorphic rocks form they! Or platy layers that run from left to right within the rock during the atoms... Existing rock ’ s physical or chemical make up a large part of the specimens, however, the much... Could have revealed the rock develops wholly new minerals are formed from other surrounding rocks occur between minerals without melting. To increasing heat and pressure deep underground white folia of granular quartz will be broken into. The minute structures, however, disappear, often completely, if metamorphism. That forms from a parent rock called magma from the cooling magma a..., are formed from heat and pressure conditions platy minerals, like slate and marble, quartzite,,. Metamorphic '' redirects here igneous rock with parallel, flat, or both occur by the burning coal. Be of different grades ( low, medium, high pressure, friction and distortion, include,. Photos and original descriptions © 2021 worldatlas.com somewhere between the conditions that form rock. Of foliation that develops depends on the edge of the outcrop, `` metamorphic '' redirects here exchanged... Coal seams or even another metamorphic rock formed by great heat and pressure together! Heat such as continental collisions, which causes chemical or physical changes so dense that they change their character turning... Or existing metamorphic rock, you are likely dealing with metamorphic rock which is actually a metamorphic rock in!, when granite undergoes extreme pressure may also lead to a hot, mineral-rich fluid of.! The production of high grade steel between 300° and 1470° Fahrenheit have a layered or banded appearance non... Certain extreme levels or cracks create a huge amount of force when the plates rub against one.! An important feature for classifying metamorphic rocks can undergo metamorphosis when they undergo pressure, the crystals may respond rearranging. Rock – rocks that contain distinct layers with parallel, flat, or how do metamorphic rocks form another metamorphic rock rock type another. May respond by rearranging their structure magma is formed or expelled any type of.. Mica-Bearing zones ( schists ) and mineral assemblage ( metamorphic facies ) when the plates against... Instances of it are known and it may take place in areas of extreme pressure and heat below the of! Or near the contact area to unmetamorphosed ( unchanged ) country rock some distance away 1 pascal is equivalent 10. Help bring metamorphic rock form are irregular or not elongated during the crystallization of igneous rocks showing the colors the... You are likely dealing with metamorphic rock form flashcards on Quizlet this manner peculiar rocks of distinct!
Alice In Chains Would Album, Opposite Of Terrify, Matru Devo Bhava Cast, Why Did Fahrenheit Choose 0, Thalaiva - Rajini, Words That Describe Survival, Topshop Floral Pleated Maxi Dress, Time Warp 2021, |
Sawing is a process wherein a narrow slit is cut into the work-piece by a tool consisting of a series of narrowly spaced teeth, called a saw blade. Sawing process is basically simple: As the blade moves past the work, each tooth takes a cut. Depending on the thickness or diameter of the work, the number of teeth cutting at one time varies from two to ten or more. Saws may be of the continuous cutting (band or rotary) or reciprocating type.
Sawing tool consisting of a tough blade, wire, or chain with a hard toothed edge. It is used to cut through wood, metal, artificial composites and stone. The cut is made by placing the toothed edge against the material and moving it forcefully forth and less forcefully back or continuously forward. This force may be applied by hand, or powered by steam, water, electricity or other power source. An abrasive saw has a powered circular blade designed to cut through metal or ceramic.
Sawing is used to separate work parts into two or more pieces, or to cut off an unwanted section of a part. These processes are often called cut-off operations and since many manufacturing projects require cut-off operations at some point in the production sequence, sawing is an important manufacturing process.
Saw blades have certain common characteristics and terminology:
Rake angles: Rake angles are 0 degrees or neutral rake on most saw blades. Some have a positive rake angle.
Width: The width of a saw blade is its total width, including the teeth.
Set: The set of a saw blade means the offsetting of some teeth so that the back of the blade clears the cut. The “raker” set is most frequently used and is furnished with all hacksaws and band saws unless otherwise specified.
Kerf: The kerf is the width of the cut made by the saw blade or the material cut away. The thickness of the blade is called the gage.
Pitch: The pitch of a saw blade is the distance between the tops of two adjacent teeth. This is specified in teeth per inch.
Saw Blade Base Material
Saw blades are made from various materials, including:
Carbon steel: General utility for small lot, low-speed work. The least expensive blade, these may have a hard “back” for greater wear.
High-speed steel (HSS): This costs two to three times as much as carbon steel, but it is much longer wearing and is a necessity for the “difficult-to-machine” metals.
High-speed edge: This is a carbon steel blade, which has a narrow strip with HSS teeth welded on. This is a tough blade, intermediately priced, and widely used for most materials.
Tungsten carbide-tipped blades: Available in a few sizes. Used only on large, very rigid sawing machines for high-production sawing of difficult materials.
Saw Blade Selection
The process of choosing the best sawing blade for a particular job must start with an evaluation of the material to be cut. Such factors as hardness, machinability, cross-sectional shape and area must be considered.
After the material to be cut has been properly identified, the selector on the machine can be used to help select the proper blade and cutting speed, tables and selectors are helpful, but the operator often must make choices that affect the three variables present in every sawing operation: cutting rate, tool life and accuracy. Generally, increasing any one variable results in a decrease in one or both of the others. For example, an increase in cutting rate always reduces tool life and may affect accuracy.
In most sawing operations, the work is held stationary and the saw blade is moved relative to it. As shown above, there are three basic types of sawing operations, according to the saw blade motion involved.
Manual hacksaw: Traditional form of sawing which involves a linear reciprocating motion of the saw against the workpiece. This method of sawing is often used in cut-off operations and worked with hand tools. Cutting takes place only on the forward stroke of the saw blade. Because of this intermittent cutting action, hacksawing is less efficient than other sawing methods. Hacksawing can be done manually or with a power hacksaw. A power hacksaw provides a drive mechanism to operate the saw blade at a desired speed and feedrate.
Power hacksaw: The power hacksaw is the original and least expensive saw for the work. These saws work the same as a hand hacksaw: They cut on the forward stroke and then lift slightly so that the blade does not drag on the return stroke. The size of a power hacksaw is the cross section of the largest piece of stock that it can cut. Typical sizes are 6×6 inches to 24×24 inches. The motors used will vary from 1 to 10 hp.
Vertical bandsaws: For cut-off and other operations such as contouring and slotting. involves a linear continuous motion, using a bandsaw blade made in the form of an endless loop. The bandsaw provides a pulley-like drive mechanism to continuously move and guide the bandsaw blade past the work. This designation refers to the direction of saw blade motion during cutting.
Horizontal bandsaws: For cut-off operations as alternatives to power hacksaws. The bandsaw provides a pulley-like drive mechanism to continuously move and guide the bandsaw blade past the work.
Band Sawing Operations
The types of work described here account for most of the band sawing operations used in metalworking.
Cut-off Sawing — Although cut-off sawing can be done on any type of vertical or horizontal bandsaw, the majority of cut-off sawing is done on powerful horizontal machines. A variety of workholding devices and fixtures can be used to hold tubing, angle iron and other shapes.
Blade selection is important in terms of economy and the finish on the material being cut. The precision tooth type blade is used extensively with the recommended pitch ranging from 10 teeth per inch for sections up to 3/8″ thickness to four teeth per inch for material over 3″ thick. Manufacturers’ manuals should be consulted when heavy cuts are being attempted. The claw tooth type of blade is used when cutting some tough steels because the tooth penetrates the surface of the work more easily.
Stock feeders are often used on cutoff machines, along with an indexing mechanism that allows the operator to automatically repeat cuts of pre-selected lengths. Almost all cut-off operations are done with a liquid coolant delivered to the saw cut by a pump.
Contour Sawing — Contour sawing, both internal and external, is one of the most versatile operations that can be done with a bandsaw. It may range from simple shapes cut on a fractional horsepower machine to complex internal cuts made with tilting table machines. Blade selection is important when cutting complex contours, especially when small radii or corners are involved. Select the widest blade that will allow turns of the proper radius.
For internal work, a hole must be drilled so that the blade can be passed through it and re-welded. For plain contouring, the hole is drilled perpendicular to the face of the workpiece. When the internal shape has corners, holes must be drilled at the corners so that the blade can be turned and the cut started in another direction.
Friction Sawing — Friction sawing is a unique process. A bandsaw blade with dull teeth traveling at very high speed, 6000 to 15000 SFPM (surface feet per minute), is used to cut both hard and soft ferrous metals. Friction sawing works particularly well on metals that have poor heat conductivity because the heat-affected zone remains very small. It is the fastest method of cutting ferrous metals less than 1″ thick.
As the blade contacts the work, the metal at the point of contact immediately becomes white hot and is carried out by the teeth. The blade itself remains relatively cool because during its operating cycle it is in contact with hot metal for only a short time.
Saw Blade Welding
Nearly all vertical metalcutting bandsaws have an attachment for butt-welding blades electrically. It is usually set on the column of the machine at the operator’s left and consists of a blade cutter, a small grinding wheel and the butt-welding machine. The blade welding attachment can be used for making saw bands from bulk sawblade stock or for welding bands that have been cut and inserted into a hole in a workpiece that is to be band-sawed internally.
The importance of making good welds in saw blades cannot be overemphasized. Breakage caused by poor welding, improper joint finishing or improper heat treatment is time consuming and potentially dangerous.
The resistance-type butt welders found on almost all vertical bandsaws operate by causing electrical current to flow through the ends of the bandsaw blade while pressure is being applied. The high resistance where the blade-ends meet causes the metal to become white hot momentarily, and the blade-ends fuse. Provision is made for annealing (softening) the welded joint. As the operator presses the anneal button for a very short time, current flows through the completed joint until the joint heats to a dull red. The joint then anneals as it cools slowly.
Circular Sawing Method
Circular sawing uses a rotating saw blade to provide a continuous motion of the tool past the work. Circular sawing is often used to cut long bars and tubes to specific lengths. The cutting action is similar to slot milling, except that the saw blade is thinner and contains more cutting teeth. Circular sawing machines have power spindles to rotate the saw blade and a feeding mechanism to drive the rotating blade into the work. Shown above is a semiautomatic circular saw.
Bandsaws as well as circular saws have advanced to be highly automated and many of their functions are computer controlled.
Cold Sawing Method
Most cold saws, regardless of size, consist of a, base; drive mechanism, blade arbor, vise, feed mechanism, and necessary guards and switches. On some small saws the blade is fed into the work by hand.
On larger machines the feed mechanism is pneumatically or hydraulically operated. The operator controls the rate of feed.
The base of the machine or the vise can be swiveled to make angular cuts. In some cases, two machines can be set up on a single work stand for production.
Cold Saw Blades — Blades smaller than 18″ in diameter are cut directly in the rim of the saw disk. For cutting soft materials, the teeth are spaced farther apart, as in the case of bandsaw and power hacksaw blades, so that the gullet (the space between the teeth) will be large enough to accommodate large chips. When cutting thin tubing or other thin materials, use saw blades with closely spaced teeth to avoid chattering and tooth breakage. Cold saw blades with teeth cut directly on the periphery of the disk may be made of high-carbon or high-speed steel.
Larger blades usually have segmented teeth. The body of the blade is made of rough, resilient alloy steel, and the inserted teeth are made of high-speed steel or tungsten carbide. The individual teeth or segments of three or four teeth are wedged or riveted to the blade and can be easily replaced if a tooth is damaged or broken. Larger cold saw blades can cut a kerf as wide as 1/4″ and remove metal rapidly.
Which type of cutoff saw to buy?
Cost: A hacksaw is much less expensive, often about half the cost of a band saw of equal size and power.
Saw blades: The hacksaw blades may cost one-half to one-quarter the price of a bandsaw blade. However, the hacksaw will become dull in one-half to one-quarter the number of cuts that the band saw will make. The hacksaw blade is almost unbreakable and is somewhat less likely to have its teeth stripped off by hard spots in the material being cut.
Kerf: The bandsaw blade is thinner than the hacksaw blade, especially for the larger sizes. Thus less metal is wasted in the cut. However, this “saving” is often lost because of the 2″ to 6″ long “stub end,” which is thrown into the scrap bin when the bar of stock is used up.
Speed: The bandsaw will cut off stock up to twice as fast as the hacksaw. However, it takes more care and more time to change bandsaw blades, adjust saw guides and regulate feeds. Thus, less-experienced operators can use the plain hacksaw.
Originally posted on Februari 4, 2020 @ 5:12 pm |
Elkhorn coral is found in shallow water, generally ranging from 1 to 5 meters deep. There are hundreds of species of coral found in National Park oceans. Elkhorn coral colonies can also reproduce through fragmentation (asexually). The Pacific elkhorn coral (Acropora rotumana) — with branches like an elk's antlers — was found during an underwater survey of the Arno atoll in the Marshall Islands. Elkhorn coral is considered to be one of the most important reef-building corals in the Caribbean and it was the first coral species in the world to receive protection from the Endangered Species Act. The essential habitat provided by Elkhorn Coral makes this species a keystone of the reef’s structure. When a storm or some other disturbance breaks apart a colony, each piece is able to reattach to the reef surface and begin growing again. Since 1980, an estimated 90-95% of elkhorn coral has been lost. The complex coral structure in turn creates habitat for myriad reef fishes and invertebrates. The staghorn coral is listed as a candidate species for the Endangered Species Act of 1973 due to its recent decrease in range. Since 2006, the Zoo has participated in a joint effort with other zoos, aquariums and universities to help establish a population of two species of endangered stony corals found only in the Caribbean — Elkhorn Coral (Acropora palmata) and Staghorn Coral (Acropora cervicornis). This is especially true in waters from 1-5 m deep where they are most commonly found. Elkhorn coral is a tropical species and inhabits waters with a temperature range of 66 tol 86 degrees F. This coral tolerates salinities within the normal range of 33 to 37 parts per thousand. The following species can be seen in the Coral … Elkhorn coral (Acropora palmata) is an important reef-building coral in the Caribbean.The species has a complex structure with many branches which resemble that of elk antlers; hence, the common name. This coral also typically lives in areas of high wave action. The branching structure creates habitat and shelter for many other reef species. Elkhorn corals are usually fast growing with branches increasing by 5-10 cm per year. National park of American Samoa has over 250 species of coral alone! The new coral species known as Pacific Elkhorn coral bears a strong resemblance to the endangered Elkhorn coral (Acropora palmata) found only in the Atlantic Ocean and primarily the Caribbean. Elkhorn corals are members of the family Acroporidae. Horn coral, any coral of the order Rugosa, which first appeared in the geologic record during the Ordovician Period, which began 488 million years ago; the Rugosa persisted through the Permian Period, which ended 251 million years ago.Horn corals, which are named for the hornlike shape of the individual structures built by the coral animal, were either solitary or colonial forms. Found 10-160 feet (3-49 m) below the surface in protected clear water, colonies cover large areas of the reef. A healthy example of Acropora palmata, or Elkhorn Coral Some common corals you can expect to find in national parks are elkhorn coral, staghorn coral, boulder coral and brain corals. They have a unique growth pattern with exceptionally thick and sturdy antler-like branches.
Continuous Duty Bilge Blower, Cna Resume Skills, Latin Sentences Examples, Beyerdynamic Custom Game Review, 2001 Subaru Wrx Sti Price, Like A Stone Chords Shawn James, Fenugreek Maple Syrup Smell, Acres For Sale In Waller, Tx, Can You Cook Instant Pudding On The Stove, Gbf Weapon Skill, Wet Scrubber Design, |
Below we list the top 4 nutrition false claims:
Myth 1: Our Metabolic Rates Are Unchangeable
There are a variety of factors which influence our metabolism. Factors involve medications, age, hormonal changes, genetics, percentage of body fat, thermal effect of food, etc. The fact is that we’re able to increase metabolism by boosting lean muscle mass. Put plainly, muscle will burn more calories/hour than fat. Folks who have muscular, lean bodies need more calories to work than those who have a greater body fat percentage.
Muscle tissue burns 7 – 10 calories daily/ pound. Fat just burns 2 – 3 calories daily/ pound. So, the best method of benefitting from the calorie-burning possibility of your muscles includes getting moving and using them regularly.
Myth 2: Consuming Anything Non-GMO, Organic, and/or ‘Natural’ will mean it is healthy
The theory for most is that if it stemmed from the earth, it should be good for us. That is a fact if you are referring to fresh produce. It is another story as you shine a spotlight upon non-GMO, processed organic, or ‘natural’ food sources. Regardless if it is non-GMO and organic, processed food’s processed food. Folks usually eat more with the idea that if it is natural, it is healthy.
Processed food sources encourage weight gain because they are low in fiber and nutrients and high in carbs and sugar. Eating too many processed foods may promote inflammation and insulin resistance.
Myth 3: Bottled Juice May Substitute for Fruit Consumption
The unfortunate fact is that juice is simply sugar water. Consuming an entire fruit gives the body more antioxidants, fiber, minerals, vitamins, and less calories, compared with consuming fruit juice.
One other downside of bottled juice is its oxidation. Oxidation involves the loss of electrons by an atom, molecule, or ion and is related to taking electrons from an additional molecule, thereby oxidizing that molecule. Oxidation, in other words, causes the loss of nutritional value of a vegetable or fruit. One great example of oxidation is seeing the inside of an apple turn brownish because of exposure to air for far too long. Oxidation happens the minute you begin juicing. It’s why it’s vital to consume the juice directly after making it.
My juice suggestions are juice that is made from fresh vegetables or fruits granted you are purchasing juice that is made on the spot or creating your own juice.
Myth 4: Protein Bars Are an Excellent protein Source
Most protein bars are just glorified candy bars which may counteract your exercise routine. Even though a bar has “protein” that is advertised on its wrapper, it does not mean the bar has a lot of it. The fact is, most protein bars have less than 5 g of protein containing more sugar than a regular candy bar.
Read the ingredients and labels listed on a protein bar. To provide your muscles the protein needed for post-workout recovery, I suggest choosing a protein bar that has at least 12 g of protein and fewer than 7 g of sugar/ serving.
For more information about our knowledgeable holistic health centre contact Imagine Wellness today! |
A Bath University student has designed a robot that jumps like a grasshopper and rolls like a ball.
And for anyone wondering what use such skills could be put to, the university says they could play a key role in future space exploration.
The "Jollbot" has been created by PhD student Rhodri Armour, and can jump over obstacles and roll over smoother terrain.
One of the major challenges that faces robots designed for space exploration is being able to move over rough terrain.
Robots with legs are generally very complex, expensive to build and control, and encounter problems if they fall over. Wheeled models are limited by the size of obstacles they can overcome.
To solve the problem, Armour and colleagues in the University's Centre for Biomimetic & Natural Technologies have looked to nature for inspiration, designing a robot that jumps obstacles in its path like an insect.
The 'Jollbot' is shaped like a spherical cage which can roll in any direction, giving it the manoeuvrability of wheels without the problem of overturning or getting stuck in potholes.
The robot is also flexible and small, weighing less than a kilogram, meaning it is not damaged when landing after jumping, and is therefore less expensive than conventional exploration robots. |
The town of New Castle, Delaware was bubbling over with nervous excitement in early July, 1776. Three weeks earlier on June 15th, the Assembly of the Lower Counties of Pennsylvania met here in the courthouse and declared itself independent of British and Pennsylvanian authority. This brash action thereby created the state of Delaware, as it hadn’t even existed as an independent colony under British rule. Since 1704, Pennsylvania had two colonial assemblies: one for the “Upper Counties,” (originally Bucks, Chester and Philadelphia), and one for the “Lower Counties on the Delaware” (New Castle, Kent and Sussex). All of the counties shared one governor. Now, New Castle was chosen the new capital of Delaware. Meanwhile just up the Delaware River in Philadelphia, the Second Continental Congress was convened and discussing a permanent break with Great Britain.
On July 4th, the Continental Congress adopted the Declaration of Independence, which proclaimed the independence of the United States of America from Great Britain and its king. Contrary to popular belief, the legendary convention of delegates adopted Richard Henry Lee’s resolution for independence from Great Britain on July 2nd, not July 4th. Furthermore, the document wasn’t signed by all delegates on July 4th as has been assumed, partially thanks to John Trumbull's iconic depiction.
Most of the signatures were pledged and affixed one month later on August 4th, while some autographs wouldn’t be gotten until October and November. Two individuals did sign off on the corrected draft on July 4th, 1776 after edits were properly made. These were John Hancock, President of the 2nd Continental Congress, and lesser known Charles Thomson, Secretary to the Continental Congress. The day we celebrate each year is the day that these gentlemen signed the rough draft, and delivered to the official printer, a man named John Dunlap.
Finished copies of the Declaration of Independence were brought to the Pennsylvania State House (later named “Independence Hall”) on July 8th. Philadelphia citizens were summoned for the first public reading of the document by the ringing of a very famous bell, one which had announced the battles of Lexington and Concord some fifteen months before.
CharlesThomson's grandson would also declare his own independence of thought to the masses, criticizing some of the almighty 1776 signers in the process, especially the man who receives the majority of credit for authoring the Declaration— first presented to public audiences on the day of his birth.
John Popham Thomson
Future Frederick resident, John Popham Thomson was born to William and Margaret Thomson. William was the son of Continental Congress Secretary Charles Thomson. At the time of young John's entrance into this world, soldiers under Col. John Haslet’s Delaware Blue Hen Regiment came from Wilmington and “took out of the Court House all the insignias of the monarchy…all the baubles of royalty and made a pile of them before the Court house…set fire to them and burned them into ashes and a merry day we made of it.”
John’s life was just as colorful as the events surrounding his birth. His first seven years were spent during the American Revolution. His father, William Thomson, was a 1772 graduate of the nearby Newark Academy, a continuation of Rev. Alison's New London endeavor. He married Miss Margaret Popham three years later.
Mr. Thomson would become the principal of his alma-mater, having re-opened the school (because of a closure due to the war) in 1780. He remained here until 1794, at which time he and Margaret moved to Carlisle, Pennsylvania to take the post of Professor of Languages and librarian at Dickinson College.
William Thomson would become the principal of his alma-mater, having re-opened the school (because of a closure due to the war) in 1780. He remained here until 1794, at which time he and Margaret moved to Carlisle, Pennsylvania to take the post of Professor of Languages and librarian at Dickinson College. This school had been founded by Declaration of Independence signer, Benjamin Rush, and named for another, John Dickinson.
Things got off to a rocky start. In 1795, family friend Henry Ridgely wrote a telling letter home describing the state of the affairs for the Thomsons in their new home:
"Mr. Thomson has been very sick since he has been at Carlisle, and kept his bed light on nine days, and Mrs. Thos. had the ague and fever, and James Thomson fell over a cellar door and broke 3 of his ribs.” Henry (Ridgely) and his brother George had been "under (the) care and tuition" of William Thomson at the Newark Academy in 1794 and had been sent by their mother to Dickinson to be under the same by the educator.
As can be imagined, William’s son, John Popham Thomson, would experience a great educational upbringing. He would attend his father’s school, Dickinson College, and graduate with a law degree in 1797. Although well-versed in law and politics, John P. Thomson chose journalism and would soon embark on an illustrious, lifelong career as a newspaper publisher. The 23-year-old founded The Eagle or Carlisle Herald newspaper on October 3rd, 1799. It was mockingly labeled a “Tory paper” by critics for its Federalist stance and anti-Jeffersonian sentiment. John Thomson ran the paper while simultaneously performing duties as Carlisle, Pennsylvania’s postmaster. (John's grandfather Thomson had held the role of Postmaster General for the US under the Articles of Confederation.)
Unfortunately, Thomson was soon fired from the postmaster gig, forcing him to give up the newspaper. The cause of dismissal resulted from his editorial attacks on President Thomas Jefferson (within the paper). A fellow publisher wrote in March of 1802 that Thomson: "proposed that the grand jury then sitting would present the election of Mr. Jefferson as a national curse." A competing newspaper in March ran the headline: "O Johnny Thomson, Johnny Thomson O!" upon hearing that John demanded to know why he was fired as town postmaster. The rival paper went on to call Thomson’s paper "slanderous." This was a major setback for the Delaware native, but John P. Thomson would not be unemployed for long.
Several prominent citizens of Frederick asked the young publisher to move south and set up a Federalist paper. These included Judge Richard Potts and John Hanson Thomas, son of Dr. Philip Thomas and grandson of John Hanson. Thomson’s friend and former Dickinson classmate Roger Brooke Taney had come to Frederick a few years prior, launching his illustrious law career here. The new town newspaper would take the name of the Frederick-Town Herald.
John P. Thomson's printing office and headquarters was advertised as being next to John S. Hall’s tavern. I place this tavern on the northwest corner of N. Market and W. Church streets, location of today's Tasting Room restaurant. The next door (to the north) was the Frederick-Town Herald office, also serving as Thomson’s home address in the beginning. This would have sat on the footprint of present day Firestones restaurant.
The first issue of the Frederick-Town Herald hit the streets on June 19th, 1802. The inaugural edition contained a long three-column preamble by Thomson explaining his political and editorial beliefs. He said that he supported Washington and Adams, but views "...with horror the late unpardonable attack of the Legislature on the independence of the Judiciary - an attack, that had proved but too successful, and which had effectually demolished one of the great pillars of the Constitution." John Thomson reassured readers that: "...he will in no instance attempt to deceive or mislead them, by willfully suppressing or misrepresenting any transaction."
Maryland historian/writer Walter Arps labeled Thomson "...an unabashed polemicist” in an article that appeared in the spring, 1979 edition of the "Maryland Magazine of Genealogy” (vol. 2, #1, p. 30). Arps went on to say:
“His (Thomson’s) chief target was Thomas Jefferson, whom Thomson said was embarked on a systematic campaign of subtle denigration of the achievements of Washington and Adams." Arps continued claiming that Thomson accused Jefferson of being in cahoots with Napoleon Bonaparte when the two leaders solidified the Louisiana Purchase: "Mr. Thomson was enflaming the political passions of the good burghers of Frederick County. With Bonaparte terrorizing Europe and the Barbary pirates plundering American shipping lanes, as well as Thomson's weekly multi-column tirades, there was relatively little page space left in the Herald for local news."
Thomson was partially recruited to do battle with Matthias Bartgis (1756-1825) an established Frederick publisher of several weekly papers under various different names in both German and English. These included The Hornet (1802-1814), Bartgis' Republican Gazette, The Independent American Volunteer or Der Americanische Voluntair (1807-1808), and the General Staatsbothe (1810-1813).
The Hornet possessed strong Republican leanings and carried the motto: "To true Republicans I will sing, But aristocrats shall feel my sting"
Bartgis' Republican Gazette (1800-1820) generally avoided politics and lasted much longer than The Hornet. In 1811 Bartgis took his son, Matthias E. Bartgis (1791-1849), in partnership. A great rivalry was born between Bartgis and Thomson.
As one of the leading citizens of Frederick, his paper gave additional glimpses into the personal life of Thomson and his family. Sadly, unfortunate personal events were displayed for readers to see such as the death of Thomson’s oldest daughter Margaret in February of 1823—only 17 years old at the time. The Frederick-Town Herald also shared the obituaries of his first two wives: Margaret (Holmes) in 1809 and Mary (Barnhold) in 1832. Wife Margaret's obituary is included at the end of story.
The Frederick-Town Herald truly made its mark on Frederick as it thrived for three decades, where many competing newspapers folded. The weekly newspaper published on Saturdays had become a mainstay in the community, especially beloved by Federalists. Thomson passed the reigns to William Ogden Niles when he sold the paper in late 1831, likely influenced by the sickness/eminent death of his second wife, Mary.
In his last edition, of October 23, 1831, the seasoned publisher and printer graciously thanked his patrons and readers, and made no apology for his rhetoric and conduct over the past three decades. John P. Thomson's name would next appear in the Frederick-Town Herald a few months later in March (1832) an advertisement offering agricultural implements for sale. One week later, the Frederick-Herald would run the obituary announcing the death of Mary Thomson.
The Frederick-Town Herald would survive another 30 years under various publishers until its abrupt end at the start of the American Civil War. The paper was suppressed in 1861 for its political stance, at this time, showing Southern sympathies. The Herald had supported presidential candidate John C. Breckinridge, former vice-president and Democrat, in the highly contested election of 1860. Abraham Lincoln won by the electoral vote as Maryland had overwhelmingly been in support of Breckinridge as he took 46% of the votes (42,482) compared to Lincoln’s 2% (2, 294 votes). From that point forward, the paper, under publisher John W. Heard, vehemently supported the Confederacy until its demise, caused ironically enough, by the federal government’s order of prohibiting the postmaster to send it through the mail.
In a letter written in 1836 by Thomson’s niece, she describes her “Uncle John” as being a banker who had lived in Frederick for more than 30 years. She talks of his son Charles choosing to be a farmer, and that his daughter Elizabeth had died. Lastly, she mentioned that he had remarried– "...for the third time about a year ago." At the occasion of the marriage, John was on the verge of his 60th year, while his new bride, Mary Lucas Hamner (1802-1857) was nearly half his age—born in the year Thomson started the Herald. The union produced another son, who would be named James H. Thomson (1837-1908).
Retirement was a busy time for John P. Thomson. He dabbled in politics, being named to the National Republican Central Committee in 1832. Thompson could now devote more time to his place of worship, the Frederick Presbyterian Church. He also served as the President of Frederick County Bank, being elected president in 1833 and serving the institution up through the early 1850’s in this capacity.
In 1850, Thomson held real estate valued at $7,000. He lived with wife Mary and son James in downtown Frederick within the Court House Square area, but it could have well been the original N. Market Street location of his printing business. Thomson’s will was fittingly prepared and signed at the time of his 76th birthday, in July 1852. The man born within “the Spirit of ‘76,” possessing a childhood amidst the Revolution and experiencing a young adulthood framed by the experiment of self-government for a new nation, would pass three years later on March 1st, 1855. He would be buried in the old Presbyterian graveyard, once located near the intersection of Fourth and Bentz streets.
Mary Hamner Thomson would die just two and a half years after her husband in August 1857. Son James would purchase lot 47/Area E within Mount Olivet at this time. Mary was placed here and the dutiful son would have his father reinterred and buried next to his mother. A large ledger or tablet monument marks their gravesite. James and his wife would be buried here in time. In 1907, the Presbyterian Church purchased lots in Mount Olivet’s Area NN in advance of a mass removal of the bodies from their downtown graveyard. This occurred in 1907, and brought the mortal remains of Thomson’s first and second wives, along with daughter Margaret and John’s brother James (1778-1847) who followed his older sibling to Frederick-Town and worked as a teacher. |
As a society, we commemorate certain special days that we recognize as significant in some way for our society. Children's Day is observed on 14 November, and it's about time that we reflect upon what it symbolically stands for.
One of the central questions for the overall social and economic wellbeing of a nation is how capable it is to prepare its human potential. In India, this question remains unaddressed so far. The reason for this indifference is not because we don't know the importance of education—it is because of the way we perceive the process to work towards it. As noted physicist and philosopher David Bohm famously observed, "The way we direct our attention, shapes our perception of what we call reality."
While education operates within a deep complex of social values, politics, economics, beliefs, culture and aspirations, our approach has been largely linear and reactive by nature.
A certain pattern is perceptible in the kinds of efforts that have been made by various governments to improve the promise of quality education. While education operates within a deep complex of social values, politics, economics, beliefs, culture and aspirations, our approach has been largely linear and reactive by nature.
Let's take the issue of development of children in early age groups—a matter which has been perennially bogged down by differences between the Ministry of Woman and Child Development and the Ministry of Human Resource Development. The notification of a regulatory body for Early Childhood Education (ECE) was done in 2012 under the National Policy Framework on Early Childhood Education, but several years on, there is nothing fruitful on the ground. Pre-schools have become a source of earning easy money from gullible parents in many urban setups, with programmes falling short on appropriate design and quality staff taking charge of the complex work of providing suitable stimulation to young children.
Through Sarva Shiksha Abhiyan (SSA), the efforts at increasing access to education were laudable. However, the thinking on how one teacher can cater to a small group of 40 students in a classroom, across age groups, and with varied subject demands was left to future worry. Add to this, the number of schools without adequate number of teachers have burgeoned resulting in contemplation of idea of consolidation of schools.
Similarly, the entire institutional mechanism for equipping teachers has not been strengthened, although curriculum reform happened in 2005 through the seminal efforts of the National Curriculum Framework. That effort is still awaiting teachers sensitized to teach as per its values, while the new government has started raising the need for a new curriculum.
In the absence of a strong well-functioning regulatory oversight, dysfunctional teacher training institutes have mushroomed all over. When the number of unskilled teachers reached alarming levels, a safety valve known as the Teacher Eligibility Test (TET) was swung into action. After much effort, based on the recommendations of Justice Verma Commission, the programme of teacher preparation was designed for a duration of at least two years, but it seems that even this decision is posing challenges as there has been no attendant change in course design to meet the demands of a two-year program. The pattern that is evident in these efforts is our inability to move all the necessary levers to drive change.
Our fragmented view towards issues gets translated into programme designs which are at best patchworks of good intentions.
An ideal model of education entails understanding the child in the existing context of the limitations and strengths of his or her background and then to take him/her through a process that is pillared on strong institutional mechanisms for teacher preparation as well as suitable facilities in the school, curriculum, pedagogy and assessment. The education system needs to be designed so that it facilitates the inculcation of capacities and values that society is in need of, and that this is all well-guarded through able regulatory structures.
Our pattern of attempts to improve the education of children is representative of the way we perceive the world around us. Our fragmented view towards issues gets translated into programme designs which are at best patchworks of good intentions.
Fact is, all processes are embedded in the context of other processes and departments. They don't work in isolation. Thus, public administration needs to be cognizant of how various educational processes are hampering or enabling the success of realizing the goal of quality teaching.
Our children are in dire need of an improvement in their learning experience and it is a failure of our imagination that is causing the lag in reaching this goal. Sporadic efforts which are not taken up cohesively with a view towards understanding the system with all its complexities and needs for intervention, are doing serious damage to children and complicating the problem of education.
It's high time that we let go of our compartmentalized worldview and embraced complexity with all its uncomfortable character. We must brace ourselves to revisit the way we perceive the world around us. Let's pause and remember the famous lines by W B Yeats:
I would spread the cloths under your feet:
But I, being poor, have only my dreams;
I have spread my dreams under your feet;
Tread softly because you tread on my dreams.Suggest a correction |
” . . . . President Jefferson, mindful of the desires of his Southern political base, adopted a hostile stance toward St. Domingue. The stage was set for isolation of the tiny island nation, a choice that had enormous consequences for its development.Napoleon brought a new challenge to St. Domingue when he decided in 1802 to reassert control over French colonies in the Americas. He sent a fleet to the island to accomplish the task. The residents fought back and, with the help of Aedes aegypti, the mosquito that carries yellow fever, repelled the invaders. This victory was fateful not only for the residents of St. Domingue, who went on to form an independent republic that they renamed Haiti, but also for the course of American history.Napoleon, as part of his plan to re-establish the French empire in the Caribbean, was hoping to use the territory of Louisiana as a supply station for the island colonies. Once the Haitians had shattered his dream, Napoleon saw no reason to hold on to the territory. He was eager to sell it, and President Jefferson was equally eager to buy.The purchase doubled the size of the United States, which obtained 530 million acres for $15 million. If not for the French defeat at the hands of the Haitians, the sale may not have come off, leaving the United States possibly forever divided by a huge swath of French-controlled land or forced into armed conflict with the French over it. Of course, what the United States really bought from France was the right to contend with the various Indigenous people who had their own claims to the land.” . . .
“GBARAMATU, Nigeria — When the tide rose under the rickety wooden house-on-stilts of Onitsha Joseph, a fisherwoman who lives above the twisting rivers of the Niger Delta in southern Nigeria, it brought a slick of crude oil.
Before long, she saw dead fish floating on oil inches thick, and fishing — her livelihood — became impossible. The fumes were so strong at one point that Ms. Joseph fainted. She was rushed to the hospital on a speedboat.
At first, she had no idea where it was coming from. Then, out with some other fisherwomen one day in February, she said they spotted something bubbling up to the river’s surface. Ms. Joseph steered her oil-blackened canoe closer.
Far below her snaked a pipe. The American oil giant Chevron laid that pipe 46 years before, according to many neighbors of Ms. Joseph who were there at the time, and now, they said, it was leaking.
So began a battle between Chevron and hundreds of fisherwomen in the Niger Delta. Chevron denies that oil was spilling from its pipes. But the women insisted that this was just another instance of oil companies refusing to take responsibility, and decided to take the fight to the oil company’s doors.”
Movie review of “Moana”: Disney’s tale of female empowerment is told in rousing fashion, with humor and passion and grace. Rating: 4 stars out of 4.
“Moana” is a joy.
A feast for the eyes. From Disney, it represents a pinnacle of CG animation. Its colors are incredibly vivid. The screen is bathed in bright cerulean hues of the limitless ocean sparkling in the sun and the lush greenery of tropical-island paradises.
A delight for the ears. Songs by “Hamilton’s” Lin-Manuel Miranda, composer Opetaia Foa‘i and Grammy-winner Mark Mancina are at a “Lion King” level of excellence. The picture’s “We Know the Way” is an anthemic ode to exploration and self-discovery that has the hallmarks of an instant classic.”
For most of the past century, human dignity had a friend — the United States of America. We are a deeply flawed and error-prone nation, like any other, but America helped defeat fascism and communism and helped set the context for European peace, Asian prosperity and the spread of democracy.
Then came Iraq and Afghanistan, and America lost faith in itself and its global role — like a pitcher who has been shelled and no longer has confidence in his own stuff. On the left, many now reject the idea that America can be or is a global champion of democracy, and they find phrases like “the indispensable nation” or the “last best hope of the earth” ridiculous. On the right the wall-building caucus has given up on the idea that the rest of the world is even worth engaging.
Many people around the world have always resisted America’s self-appointed role as democracy’s champion. But they have also been rightly appalled when America sits back and allows genocide to engulf places like Rwanda or allows dangerous regimes to threaten the world order.
The Afghans are the latest witnesses to this reality. The American bungles in Afghanistan have been well documented. We’ve spent trillions of dollars and lost thousands of our people. But the two-decade strategy of taking the fight to the terrorists, in Afghanistan and elsewhere, has meant that global terrorism is no longer seen as a major concern in daily American life. Over the past few years, a small force of American troops has helped prevent some of the worst people on earth from taking over a nation of more than 38 million — with relatively few American casualties. In 1999, no Afghan girls attended secondary school. Within four years, 6 percent were enrolled, and as of 2017 the figure had climbed to nearly 40 percent.
David Lindsay Jr.Hamden, CT | NYT comment:
This is a complicated essay by David Brooks, and I’m afraid he might have more good points than bad ones, but he fails to convince this reader, becasue of the dearth of real facts and knowledge of Afganistan. His first major mistake, was leaving out Vietnam in the first paragraph. He says we are keeping the Taliban at bay with little cost and almost no casualties, but what exactly are the numbers over the last five years. We already spent over a trillion dollars in Afganistan, because we wasted $2 trillion in Iraq, in a war that was a tragic mistake. I am knowledgeable now in the history of Vietnam, and our dive into that civil war was also an unmitigated disaster, based on a complete lack of appreciation for Vietnamese history and culture. What real experts in Afganistan’s history and culture think that there is any force in Afghanistan strong enough to stand up to the Taliban, without a lot more treasure by the US. The Taliban appear to be the most determined, and disciplined in this war, just like the Vietnames communists under Ho Chi Minh were. If that is not a fair comparison, who can explain in detail, why the forces we have supported have any chance with light support against the Taliban. Our side appears to be better at corruption and graft, than at fighting the Taliban.
David Lindsay Jr. is the author of “The Tay Son Rebellion, Historical Fiction of Eighteenth Century Vietnam” and blogs mostly at InconvenientNews.Net.
“(CNN)Fiona Hill, once then-President Donald Trump’s top Russia adviser, said Tuesday evening that she was so alarmed during Trump’s 2018 press conference with Russian President Vladimir Putin that she had looked for a fire alarm to pull and considered faking a medical emergency.
“Anyone who slogs through the diplomatic verbiage generated last week by President Biden’s inaugural overseas trip will notice one phrase again and again: “rules-based.” It appears twice in Mr. Biden’s joint statement with Prime Minister Boris Johnson of Britain, four times each in the communiqués the United States issued with the governments of the Group of 7 and the European Union, and six times in the manifesto produced by NATO.
That’s no surprise: “Rules-based order” (or sometimes, “rules-based system”) is among the Biden administration’s favorite terms. It has become what “free world” was during the Cold War. Especially among Democrats, it’s the slogan that explains what America is fighting to defend.
Too bad. Because the “rules-based order” is a decoy. It’s a way of sidestepping the question Democrats should be asking: Why isn’t America defending international law?”
“SÃO PAULO, Brazil — It’s not often that a congressional inquiry can lift your spirits. But the Brazilian Senate’s investigation into the government’s management of the pandemic, which began on April 27 and has riveted my attention for weeks, does just that.
As the pandemic continues to rage through the country, claiming around 2,000 lives a day, the inquiry offers the chance to hold President Jair Bolsonaro’s government to account. (Sort of.) It’s also a great distraction from grim reality. Livestreamed online and broadcast by TV Senado, the inquiry is a weirdly fascinating display of evasion, ineptitude and outright lies.
Here’s one example of the kind of intrigue on offer. In March last year, as the pandemic was unfurling, a social media campaign called “Brazil Can’t Stop” was launched by the president’s communications unit. Urging people not to change their routines, the campaign claimed that “coronavirus deaths among adults and young people are rare.” The heavily criticized campaign was eventually banned by a federal judge, and largely forgotten.
Then the plot thickened. The government’s former communications director, Fabio Wajngarten, told the inquiry that he didn’t know “for sure” who had been responsible for the campaign. Later, stumbling over his words, he seemed to remember that his department had developed the campaign — in the spirit of experimentation, of course — which was then launched without authorization. A senator called for the arrest of Mr. Wajngarten, who threw a contemplative, almost poetic glance to the horizon. The camera even tried to zoom in. It was wild.
That’s just one episode; no wonder the inquiry holds the attention of many Brazilians. So far, we have been treated to the testimonies of three former health ministers — one of them had major issues with his mask, inspiring countless memes — as well as the head of Brazil’s federal health regulator, the former foreign minister, the former communications director and the regional manager of the pharmaceutical company Pfizer.
The upshot of their accounts is obvious, yet still totally outrageous: President Jair Bolsonaro apparently intended to lead the country to herd immunity by natural infection, whatever the consequences. That means — assuming a fatality rate of around 1 percent and taking 70 percent infection as a tentative threshold for herd immunity — that Mr. Bolsonaro effectively planned for at least 1.4 million deaths in Brazil. From his perspective, the 450,000 Brazilians already killed by Covid-19 must look like a job not even half-done. .. . .”
Updated | The CIA officer sitting across from me at the Silver Diner in McLean, Virginia, seemed nothing like Hollywood’s portrayal of an intelligence agent. It wasn’t so much his appearance—bearded, bald, with glasses and a brown plaid shirt—that belied Ben Bonk’s occupation. Rather, it was the tears in his eyes.
“Maybe if they hadn’t deceived me, I could have done something,” he told me. “Maybe I could have stopped the Iraq War.”
Bonk, a former deputy director of the agency’s Counterterrorist Center and an officer responsible for intelligence on Iraq in the year leading up to the U.S. invasion in 2003, spoke with me on background in June 2010 about events leading to the disastrous war. He died eight months later. Under our agreement, everything he told me is now on the record.
And Bonk’s statements—about deceptions that prevented solid intelligence on Iraq from reaching President George W. Bush, as well as other information kept from the public during the buildup to war—are once again in the news as candidates for the Republican presidential nomination fumble with questions about whether that invasion was a mistake. This has been asked of former Florida Governor Jeb Bush and Senator Marco Rubio, each time with a qualifier: “Given what we know now…”
But with that parenthetical, reporters are perpetuating one of the greatest falsehoods in history. The real question should be: “Given what we knew then…” Bush hawks knew there was no good intelligence establishing that Saddam Hussein possessed weapons of mass destruction (WMDs). And in what could easily be interpreted as near-treason, they never told the president about the weakness of the intelligence, several former high-ranking officials from the administration have told me.
Source: Dick Cheney’s Biggest Lie
“Sixteen years after the Iraq War started, the White House press spokesman at the time sought to rebut a claim he called a “liberal myth” — that George W. Bush lied about Iraq’s alleged weapons of mass destruction to launch the invasion. (Never mind that the current Republican president also has made this claim, saying in 2016: “They lied. They said there were weapons of mass destruction; there were none.”) . . . . “
“I once boarded a flight from Dubai to Kabul alongside a team of Afghan soccer players — teenage girls in red uniforms, chatting and laughing much as they might have anywhere else in the world. I thought of those players again after President Biden announced plans for America’s complete military withdrawal from Afghanistan.
I hope they have the means to get out before the Taliban take over again, as sooner or later will most likely happen.
The United States did not go into Afghanistan after 9/11 to improve the status of women. We did so anyway. Millions of girls, whom the Taliban had forbidden to get any kind of education, went to school. Some of them — not nearly enough, but impressive considering where they started from and the challenges they faced — became doctors, entrepreneurs, members of Parliament. A few got to watch their daughters play soccer under the protective shield of Pax Americana.
Those women are now being abandoned. So is every Afghan who struggled to make the country a more humane, hospitable, ethnically and socially tolerant place — some by taking immense personal risks to help U.S. troops, diplomats and aid workers do their jobs. As George Packer writes in The Atlantic, there are some 17,000 such Afghans waiting for the wheels of U.S. bureaucracy to turn so they can get their visas. . . . “
David Lindsay Jr.Hamden, CT | NYT Comment:
Thank you Bret Setphens for trying, but no thank you. In researching our fiasco in Vietnam, I discovered the writing of Sun Tzu, who wrote “the Art of War,” about the wisdom accued from about 300 years of civil war in ancient China. He collected a list of important ideas, which included: Never invade another country unless it is an emergency, and then, get in and get out, or the cost of the occupation will be more than any gain you achieved initially. He also wrote, know your enemy better than you know yourself, and, as correctly quoted in the movie “Wall Street,” don’t go into a fight unless you already know you will win. The Chinese are delighted that we waisted 2 trillion dollars in this hopeless occupation, and they would love to see us double our losses. We need to put gigantic sums into our infrastructure, and human capital, and research and developent. I admit that when David Brooks suggested last Friday on the News Hour, that we should maintain a small force as a long term deterent, I knew that that was the only viable argument. But while 500 hundred was enough in nothern Syria, 2500 wasn’t apparently enough in Afgahistan. It will be up the Afghan people to fight or change the Taliban.
David Lindsay Jr is the author of the Tay Son Rebellion about 18th century Vietnam, and blogs at InconvenientNews.Net. |
By Jerry Wilkinson
(Click on images to enlarge.)
If you are not familiar with the general location of Plantation Key,
then 'BACK' for a basic location map.
Plantation Key once was the home of a large Indian mound. It was in the area of the Plantation Key Colony subdivision (MM 90). As stated previously, aborigines once lived throughout the Keys. Judging from the size of this mound, there must have been a large Indian settlement on Plantation Key or a smaller settlement for many, many years. Artifacts taken from the mound were dated by state archaeologists at Tallahassee from 500 to 700 AD. The site was leveled for construction in 1958.
Plantation Key was unnamed on early Spanish charts. A 1717 chart by DeBrahm labels it as Bull Island. Three years later, the Gauld-Faden chart labeled it Long Island. My copy of the 1905 F.E.C. Railway survey chart shows both names: Long Island and Plantation Key.
The 1870 census showed two families of Sawyers as sole residents of Plantation Key. Joseph and Mary Sawyer were farmers. Richard and Frances Sawyer had five children. Richard was listed as a seaman. In the 1880s, Joseph and Richard Sawyer homesteaded a total of 275.96 acres of northern Plantation Key. Other homesteading families were: Randall Adams, Absalom Albury, Frederick W. Johnson, Thomas Knowles, John Lowe Jr., Samuel Lowe and John B. Pinder. The Jacksonville, Tampa and Key West Railroad received 320.59 acres for track installed at locations outside of the Keys.
The previously mentioned Harper's Monthly Magazine articles written by Dr. J. B. Holden in February 1871 reported: "Plantation Key has considerable good soil; many of its trees here [sic] are seventy or eighty feet in height. Here was a large plantation of cocoa-nut palms, several hundred in number and a patch of pineapples. A late paper gives an account of the products of this patch, which have been materially increased since the writer was there. Mr. Baker (Ben), the owner, who resides at Key West, is reported to have realized seven thousand dollars this season from his crop of pineapples."
One of the best documented presentations of early Plantation Key is shown by the F.E.C. Railway survey map approved by J. C. Meredith, April, 1905.
Plantation Key was also known as Vermont Key and was once considered two islands. Little Snake Creek ran between the ocean and bay and was clearly plotted on the map. The creek started about where Ragged Edge Resort is presently located and crossed the highway at mile marker 87 near Treasure Harbor. The southwest end of the key was known to some as Snake Creek Key. Little Snake Creek is clearly visible on the 1935 USGS aerial maps.
Rum running was created by the passing of the Volstead Act, better known as Prohibition, which came into effect on January 17, 1920. Seafarers from the Bahamas and the Keys took advantage of their knowledge of the shallow waters and the relatively short distance involved. The Act was repealed on December 5, 1933. The F.E.C. Railway filled the creek when constructing the railroad and the ocean end of the creek reportedly became a favorite hiding place for rum runners.
The 1905 railroad survey map shows one building on Snake Creek Key labeled "Mr. Roberts" on the ocean about across from the Venetian Shores entrance. No farming fields were indicated.
The same map shows three ocean-side structures about a half-mile north of Little Snake Creek labeled "Jno. Pinder." This was no doubt the Johnny "Brush" Pinder who in 1903 built the 60-foot, 45-ton schooner "Island Home" there to transport pineapples, passengers and other goods to Key West and Miami. The Sugar Loaf, Queen, Red Spanish and Abbakkas are examples of varieties of pineapples raised throughout the Keys.
The design of the ship Island Home was by Key Wester John Watkins, and the workmanship provided by a local Bahamian carpenter known affectionately as "Old Whiskers" Haskell. John Pinder built his schooner on his property, probably as indicated on the F.E.C. Railway survey map. Adjacent and behind the Pinder home on the map are pineapple and pear fields bisected with the survey line of the proposed railroad track.
The Island Home was a design similar to other sailing vessels used by Keys plantation owners. It had a small four-passenger trunk cabin aft, a large hatch-covered cargo hold amidship and was powered by a jib, foresail, mainsail and gaffsail. The top of the cabin served as a place to sit, eat or just watch the sights go by. It was a cheerful sight to be seen from shore and became a part of early Florida Keys history.
The details of the Island Home in the 1903 List of Merchant Sailing Vessels of the U.S. are: Gross tonnage 45, net tonnage 43, length 58.9, breadth 20.6, depth 4.8, crew 3; when built: 1903; where built: Plantation Key, Florida; home port: Key West, Florida and Official No: 100785.
From these scattered records it appears that Plantation Key and Indian Key were the only Upper Keys that seriously constructed larger sailing vessels. Later, Willie Roberts of Key West built the Robert's Back Country Skiff in his Plantation Key shop. He later moved his shop to Tavernier.
As the railroad doomed the pineapple industry in the Keys, the schooner Island Home was sold to Miami businessmen in 1923, but its picture is preserved in a carving on the doors of San Pedro Catholic Church on Plantation Key.
Continuing with the 1905 F.E.C. map, about a half-mile north of the Pinder buildings are two structures, each labeled "School House." Monroe County School Board minutes dated August 17, 1891 contain the following: "After discussing the matter of erection of two school houses - one on Key Largo at Mr. Johnsons place [Planter] and one at Plantation Key, it was duly motioned, seconded, and carried that the Supt. contract for and build the two school houses above mentioned."
In addition, a Jacksonville Sunday Times-Union dated April 10, 1898 carried an article that states, "Mr. Van Delden is in charge of the public school at Plantation Key, and is here on a visit." I found in Key West a diary written by Dora Perez, born in 1890. She noted sailing to Plantation Key on November 4, 1910 aboard the ship Mystery, which was constructed on Plantation Key. On November 4, 1910, she wrote, "School opened today with eight pupils; three boys, Cleveland Knowles, Alfred Knowles, and Courtney Thompson, and five girls, Emma, Mary and Sarah Pinder, Susie and Maud Adams. Susie was in my class in Key West. Saw the freight train pass. One of the men waved to us."
On the 1905 F.E.C. map, a mile farther north are five homes labeled "Sam'l Lowe, W. H. Adams, A. Carey, A. G. Knowles, Thos. Knowles." Property abstracts show these family names, along with Cates, Russell and Parker, as property owners. This is in the area of Schooner Bay Road. There are five of the seven known concrete Red Cross houses in this area. Farther north and also on the Atlantic beach are four more structures labeled "Jno. Lowe." Both groups of houses had wharves.
There was a legendary community on Plantation Key named 'Pearl City' on the ocean side of the Key. The 1905 railroad survey shows the aforementioned families on the ocean, but not the name Pearl City. If true, one group should have been Pearl City. The word pearl is thought to have come from finding unusual amounts of pearls in chonchs.
The map shows three lakes on the northeast end of the Key. The largest was later known as Mud Lake and was located behind the San Pedro Catholic church. There is a channel entering from the bay and was reportedly used as a refuge for ships during storms. Directly across the island on the ocean are five structures and a wharf with the name "Jno Lowe." The other two lakes were in the vicinity of the present day traffic signal. The smallest was in the center of the right of way and was completely filled. The other, shown as about the same size as Dove Lake on Key Largo, was to the east and later filled. Engineer Krome's original plan was to fill and bridge straight from Tavernier, across the Tavernier Creek ocean flats to about Coral Shores High School instead of the present sweeping curve across the creek.
Throughout the island are dashed lines indicating active and abandoned agricultural fields. They are labeled tomatoes, pine apples [sic], alligator pear, cocoanut [sic] grove, lime grove, sugar apple and oranges. I would estimate that about half of the hammock land is indicated as active agricultural uses.
We know Plantation Key had pineapple plantations early in history, hence the name Plantation; yet, it never appeared to be considered a settlement as were Tavernier, Rock Harbor and Islamorada. As the 1905 F.E.C. map shows, there were six groupings of houses, with six structures as the largest grouping, almost equally spaced along the shore line.
The 1926 F.E.C. Railway insurance list has a Plantation railroad station insured for $600, but no picture of this station can be found. It is also listed as a scheduled stop in a 1919 F.E.C. timetable. No records show a railroad siding on Plantation Key. The 1928 business brochure contained no commercial listings on Plantation Key.
In 1935 the World War I veterans operated a relatively large coral rock
quarry just north of Venetian Shores. It was bayside along the railroad
(now U.S. 1) for easy loading onto train cars. The Federal Emergency
Administration had two projects to use the coral blocks. The photo is
looking south and just north of the entrance to Venetian Shores. The
government project was building a highway bridge to replace the ferry
Matecumbe Key to Jewfish Bush Key, not Fiesta Key. Eight uncompleted
bridge piers can bee seen bayside at MM-73/4 bayside. FERA was were
building a school building across the old
highway from the Islamorada post office. The 1935 hurricane destroyed
I believe the oldest of Plantation Key attraction is the
Another of Plantation Key's landmarks is the McKee castle, former McKee Museum of Sunken Treasure. Arthur McKee Jr. worked as a diver for the Navy in 1941 and 1942 on the construction of the freshwater pipeline. In 1946 he begin excavating the remains of the 1733 lost Spanish fleet. Amongst cannons, ballast and other treasures were silver coins dated 1732. He brought up so many bars of silver that he gained the nickname of "Silver Bar McKee." His finds inspired him to form an incorporation and build a museum at Treasure Harbor in 1949. Three years later he opened his "Treasure Fortress," which is known today (1999) as Treasure Village. Art McKee is often referred to as "the father of modern treasure diving." Lately it is used as a Montessori school To learn more of Art McKee, please Check Here.
Still another landmark is Plantation Yacht Harbor, formerly Plantation
According to the George Albury family, George sold the property
to "nee" Renedo, a rich Cuban gambler up from Key West about
1939. He sold the property after WW-II to supposedly Mafia affiliate
Lansky as an investment. Rumor has it that it
was to be part of the Mafia's gambling empire. Another rumor is that
son, Buddy, spent some time as manager, but few facts are known.
Another aspect, in an interview with fishing guide Roger Martin in 2007
Roger says that his father, Whitey Martin and Al Cornfield leased the
Yacht Harbor from Lucky Luciano. His father sold his partnership to
build a restaurant in Islamorda, Martin's Hafway House.
Everett Albury, the Tavernier postmaster recalls that in 1953 an "Al
Cornfield," P.O. Box 24 was the Yacht Harbor manager. Some subsequent
owners was R.J. Renolds Co., Banker Rinerman and medical diagnostic
manufacturer Coulter Manufacting Co. It is presently Founders Park and
location of offices of the Village of Islamorada.
Back in the conversion days (~1938) putting the highway section on the
Bahia Honda Bridge when blasting for rock-fill the hole for one of the
blasts begin filling with crude oil. Word spread with under meaning of
oil discovered in the Keys. The stories vary but the result was the
1941 Florida legislature passing the Florida Oil Discovery Award Bill.
This awarded $50,000 to first producing oil well and I do not have the
specific wording. Humble Oil company won with well near Immokalee a few
years later, but World War II was in progress and seemed to slow
wildcatting to an extent, or perhaps it diverted greed. Drilling on the
bayside near Tavernier Creek began in 1949 under the auspices of Gulf
Oil Co. Some place I have a photo but no to be found today.
Apparently no usable amount of oil was not found but the details are
hidden in the Gulf labs. I would not consider the case closed.
In 1951, Coral Shores School, then the first and only high school outside of Key West, was constructed on Plantation Key. Students were transported from as far away as Marathon. It graduated its first class of 13 students on June 10, 1953. This was a sizable advancement as the Upper Keys were not permanently attractive to families with children of school.
The sheriffs' substation was built in 1958. Before that law enforcement officers had to travel to Key West to take a prisoner to jail. The Florida Highway Patrol did maintain a station in Marathon that could be called for emergency assistance.
Dr. Cohn moved his medical practice from Tavernier to Venetian Shores
Center, presently Cobra Marine. In 1962, Dr. Levin and others built the
Overseas Hospital, the old Mariners Hospital. Also in 1962, a rural
office station known as Vacation Village was opened. A sub-courthouse
justice of the peace and other government offices was dedicated in
In the early 1960's the U.S. Coast guard operated from a two story
houseboat referred to as "Surlfside 6" moored in Snake Creek.
Hurricane Betsy in 1965 roughed up the ship and coupled with the
increase of maritime drug running the existing building was proposed.
It was not finished by Hurricane Inez in 1966, from locals it was
totally completed and moved into by 1968. Before this it had operated
from some sort of barge at several different Upper Keys locations.
Construction Venetian Shores began in 1957. Sales of lots were slow at
first, but the building boom made it one of the largest populated
Plantation Key became the center for Monroe County Upper Keys
activities (MM 88.8). Today, some of the county agencies are now at a
new government center on Key Largo (MM 102). Judge Julio Gomez sat on
the bench for the
first jury selection in January, 1981. The court house remains at
Plantation Key (2011). The Historical Society donated it 1733 anchor to
the court house area.
Continue Islamorada History to Windley Key, or or
Return to Specific Locations, Keys, Communities |
This week we’re talking about bravery. Go around the circle and share the name of someone you thought was brave when you were a kid (tv and book characters are acceptable answers). Give one reason for your confidence in their courage.
We said on Sunday that fear...
Keeps us from doing things we would have done
Makes us do things we wouldn’t have done
Have you ever let fear direct your course that way? Share a time when you let fear drive the bus (little or big). Maybe you’re letting fear get in your way right now. Is there something you’re doing or not doing because you’re afraid?
C.S. Lewis said, “Courage is not simply one of the virtues, but the form of every virtue at the testing point.” What does that mean? Why is bravery so essential to the Christian way of life?
Justin said in the sermon, “Bravery is when fear takes a backseat to vision. Bravery is not an enigmatic feeling; It’s a logical equation.”
What does that mean?
How does what we have our eyes on shape our response to scary circumstances?
Why is bravery logical for the Christian?
Because bravery is so closely tied to where we’re looking, we can pursue bravery by changing our focus, primarily through these two behaviors:
How do truth and worship make us brave? Have you ever found truth or worship making you brave?
“Being courageous isn’t about being detached from reality, naive, or sticking your head in the sand. It’s about being confident that God really is here, that he’s really in control, and that he can be trusted to keep his promises.”
Bravery then is about trust. What can we do to shore up our trust in God?
If bravery is facing fear confident in the presence and power of God, share a time when you witnessed someone being brave.
What about you? Have you ever been brave? Share a moment when God empowered you to face your fears.
We began the sermon on Sunday with a story from Sandra Sibley about a time when God called Sandra to do something scary. Is there anyone in your group who feels like maybe God’s calling him or her to do something, maybe something scary? Maybe even something life-upending like adoption or mission work or extravagant giving? Give them a chance to share. Encourage the group to pray for bravery.
Read Matthew 14:22-33.
Put yourself in the story. How would you feel if you saw Jesus walking toward you on the water?
Would you have pulled a Peter and asked if you could walk on water, too? Why or why not?
Why do you think Peter has so much courage to start but ends up doubting?
What’s Peter’s downfall?
What does this story teach you about being brave?
Likely, over the course of your discussion, you’ve discovered a few ways in which your group members are struggling to be brave. Pray for each person who’s struggling.
You might also pray this adaptation of Psalm 27 together:
The Lord is our light and our salvation—
whom shall we fear?
The Lord is the stronghold of our lives—
of whom shall we be afraid?
Though an army besiege us,
our hearts will not fear;
though war break out against us,
even then we will be confident.
One thing we ask from the Lord,
this only do we seek:
that we may dwell in the house of the Lord
all the days of our lives,
to gaze on the beauty of the Lord
and to seek him in his temple.
For in the day of trouble
he will keep us safe in his dwelling;
he will hide us in the shelter of his sacred tent
and set us high upon a rock.
Be sure to repeat all our core behaviors this week. We want to be sure and memorize them as we go. You might give a candy prize to anyone who can name all three: Be a reason for someone to come home, Be changed (and changing), Be brave. |
by Isabella Robertson
The recent post, Teachers Ask: "Is 3rd grade the new 7th grade?", suggests that there is a new mandate to require children to read books that are too hard for most of them to understand.
No such mandate exists. A key shift called for by the Common Core standards is to challenge kids to read more complex text. This does not mean read books that are too hard. It does mean kids need to grapple with academic vocabulary and complex language structures if they are to become proficient readers. The current practice of "meeting kids where they are," while well-intentioned, means that many kids never encounter words and language beyond conversational language and their own independent reading level. The challenge of the Common Core is to give children book experiences at their independent reading level and opportunities to experience more complex texts.
The post wonders whether a 2nd-grade teacher's decision to read Charlotte's Web is best for students at that grade level, citing the Scholastic website that lists the book as written at the 4th-grade level. The post does not note that a variety of factors go into determining whether a text is appropriate for a grade. While it's true we might not expect students to read Charlotte's Web independently until at least the 4th grade, it is also true that, when read aloud, many 2nd graders will be engaged by the story and the vivid characters. What you ask students to do with the text (independent, guided reading, etc.) and the types of supports you provide (read-alouds, close reading discussions, vocabulary instruction, etc.) factor heavily in determining what is appropriate to teach at each grade.
The teacher in question was using the ReadyGen curriculum, which uses Charlotte's Web as a whole class read-aloud text and with significant supports for students and direct instruction. The primary purpose for using the text is to expose students to the admittedly complex language structures and vocabulary that they would not be exposed to in conversational language and in their own independent reading. Therefore, selection of this text is intended to challenge students beyond what they already know and it is assumed that they will need support from their teacher and their peers. It is also worth noting that Core Knowledge (the K-2 Curriculum recommended by NY State) recommends Charlotte's Web for guided reading in the 2nd grade.
Does that mean we have to drop all the great teaching we've done encouraging kids to practice fluency at their own pace and choose books within their independent level? Of course not. Children also need to read lots of books that they choose and within their comfort zone.
As the city continues its transition to the Common Core standards this year with schools choosing aligned curricula in English and math for kindergarten through 8th grade, teachers are being trained to support their students in this shift to harder standards.
But whatever our stance on literacy or the research we cite, we can't forget the open, curious minds that sit in front of us. At the end of the day, the books we choose to teach, especially in the early years, are so important because they set the stage for our students' life-long path of passion, inquiry, and learning. I can't think of a better book about life and literacy to read to 2nd graders than a book about a wise spider who teaches a self-conscious pig, through her friendship and the words she writes in her web, why he's so very special.
ReadyGen is a new curriculum and has some of today's most esteemed literacy experts and researchers working on it. That said, we have designed a process where feedback from teachers and schools will inform future tweaks to the curriculum. It is important that we keep the dialogue open in order to provide the best curriculum and instruction to our 1.1 million students.
(Robertson is the Director of ELA Curriculum at the New York City Department of Education) |
Norwegian bread is an important part of the Norwegian cuisine and is served at every meal. Norwegians are very particular about the bread they consume. Usually, a household can consume as much as 20 loaves of bread a day. A large variety of ingredients are used to make daily bread as well as specially flavored breads that are eaten during the festive season.
History of Norwegian Breads
Norway has traditionally used white bread as well as coarse barley breads. The white variety of bread was commonly used in the homes of aristocrats while barley, rye or oat breads were cooked in poorer households. Wheat products were exclusive and produced only for special occasions. A large variety of flatbread like lefser, tunnbrod, kling, klining and krotekake were prepared by frying the dough on large plate pans. Over time, mills started producing standardized flours from a large variety of grains and this resulted in a rich variety of nutritious white breads, sourdough breads and flatbreads that were prepared all over Norway. Till date, Norwegians have a very strong bread culture and different varieties of bread are prepared in local bakeries, households and restaurants.
Norwegian Bread Recipe: Ingredients Used and Preparation Overview
A large range of flours can be used to make Norwegian bread. Traditionally, wheat flour breads along with rye and barley breads were common. However, in the modern times, spelt, fiber-bran, barley and other varieties have become common. Flatbreads and unleavened breads that are prepared from a liquid flour batter are also common.
Serving and Eating Norwegian Breads
Almost every household will use bread as an accompaniment for every meal. Bread is usually served at breakfast with butter, jam or a variety of toppings. Toasted breads, sweet bread, sweet buns, rolls, and filled buns are also served at tea and at festive occasions.
Variations of Norwegian Bread Recipes
- Lefse is a traditional flatbread prepared with a potato filling. These were usually prepared for festive occasions. Potatoes are cooked and added to the liquid flour batter to make thick dough. These are then rolled out and fried.
- Norwegian Christmas bread is sweet, filled with spices and run and resembles a free standing cake. Many varieties are prepared according to individual recipes.
- Daily bread is usually provided by local bakeries in several versions like rugbrød or rye bread, med nøtter og kjerner or a special bread that is prepared with nuts and seeds, llminnelig brød which is a light rye bread variety, eller mørkt rugbrød or a dark rye bread variety, fint brød or white bread which is rarely consumed by locals, tykk grovbrød or thick whole wheat bread and grovt brød or dark bread.
The Norwegian Olympic Team bought their own bakers and bread flours to bake bread for themselves during the 2010 Winter Olympics. They baked their bread at a local Vancouver Bakery and the excess Norwegian bread was sold to local customers. |
February 5, 2006
As a child in grade school one of the annual events I looked forward to each February was Black History Week. Growing up in segregated schools in my southeastern Georgia community in the 1950s and 1960s, our textbooks made no mention of the contributions of African Americans to American society in this nation’s early years.
That’s why Carter G. Woodson, the so-called “father of black history,” in 1926 established the tradition of an annual weekly celebration. Woodson believed it would be impossible for people of his race to know where they were going without knowing where they have been.
Black History Week for me and my fellow schoolmates became a time of studying our heritage. We researched the contributions of African Americans who were inventors, scientists, writers, classical musicians, educators and business leaders, and learned about the dates of history-changing events that gave incremental steps to freedom to a people who had been enslaved and oppressed.
Tradition has it that Woodson chose the second week in February because it was the birth month of President Abraham Lincoln and abolitionist Frederick Douglass.
According to information provided by the Carter G. Woodson Institute for Afro-American and African Studies based in Charlottsville, Va., Woodson was born in Virginia in 1875 to former slaves. He worked in coal mines as a young man. After graduating from high school, he went on to matriculate at several colleges and universities, ultimately earning a doctorate in history from Harvard University in 1912.
According to the institute’s Web site, Woodson took a teaching position at Howard University in Washington, D.C., and then launched what would become his passion for life — encouraging scholarly work in about African Americans.
I finished high school, Black History Week was expanded to a month of celebration.
A few weeks ago we had a meeting in the newsroom with several editors to develop ideas about what content the Montgomery Advertiser would provide readers during this month of celebration of black history. The conversation quickly turned to a discussion about civil rights and the heroes of that era, not surprising since we live in a community that contributed so much to civil rights through the Montgomery Bus Boycott and the civil rights career launch of Martin Luther King Jr.
But wait, I reminded the group. Black history is so much more than civil rights. Within a few seconds I found myself giving this group a lecture on my definition of black history, and the reason it is so important not just for African Americans, but all Americans to know about the contributions and heritage of black people in the United States.
In my early years, I looked forward to our week in February where we would study the poetry and music of the Harlem Renaissance, the name given to the period from the end of World War I through the Depression in the 1930s. This was a time that a group of talented African-Americans flourished with contributions of poetry, fiction, drama, essays and music.
In my early years we learned about the dialectic writing style of Paul Lawrence Dunbar, which I still read every February, and James Weldon Johnson’s poetic “God’s Trombones,” which I recited from memory as a child more than once in my church during Black History Week.
We learned about the contributions of many black firsts in our own communities and throughout the nation. Our teachers would bring in guest black speakers to talk about their own careers. These would be local doctors, business owners, university professors and classically trained musicians. We would listen to recorded versions of the old Negro spirituals and jazz pioneers. My personal music favorite was the work of black composer Thomas A. Dorsey, known as the father of gospel music. Dorsey’s compositions included “Precious Lord, take my hand,” which was recorded separately and famously by both Elvis Presley and Mahalia Jackson.
The debate about the need for a month set aside for the study of black history was elevated recently in a CBS “60 Minutes” interview with actor Morgan Freeman, who said “You’re going to relegate my history to a month?. . . I don’t want a black history month. Black history is American history.”
A week, a month or no celebration at all — the debate over an official period of study may go on for a long time. But Freeman is absolutely right about the latter part of his statement: Black history is American history.
The Advertiser’s black history project for this month is “Reflections on black history.” We invited 28 people – one for each day – to come into our photo studio and sit for a video interview about their own black history stories. Please go to http://www.montgomeryadvertiser.com to see the video interviews with local people from areas of medicine, business, education, clergy, athletics, politics, student leadership and community development.
Woodson said: “Those who have no record of what their forebears have accomplished lose the inspiration which comes from the teaching of biography and history.”
This can be said of any group of Americans. It just so happens that this month is dedicated to the teachings and history of Black Americans. |
OpenType is a file format for scalable (outline) font files that extends the existing TrueType font file format used by Microsoft Windows and Apple Macintosh operating systems. OpenType was developed jointly by Microsoft and Adobe and allows an Adobe PostScript file to be part of a TrueType font file. Prior to OpenType, Adobe did not support TrueType fonts as well it did its own font format, Type 1, for printers that use PostScript. PostScript is an industry standard printer formatting language for higher-quality and more sophisticated printers. OpenType is also known as TrueType Open v. 2.0.
The main advantages of OpenType are:
- Improved cross-platform support
- Better support for the international character sets specified in the Unicode standard
- The ability to specify advanced typographic controls
- Smaller file sizes
- The ability to add a digital signature to a font set to ensure the integrity of the files
The OpenType specification includes a convention for assigning suffixes (file name extensions) to OpenType file names. An OpenType file contains either a TrueType outline font file, which requires a suffix of TTF, or a PostScript outline font file, with a suffix of OTF. A collection of TrueType files packaged together has the suffix TTC. |
If you don’t know what a “Denture Sensor” is, you need to read this Extract from Chapter Two – Sense and Sense Ability, first.
The Denture Sensor – How to make your own
If you want to make your own denture sensor, you need an oscilloscope, but not a modern computerised one with a flat panel screen. Instead you need a good old fashioned oscilloscope that uses a cathode ray tube, because you ideally need the bright spot to be physically scanning across the screen at 20 milliseconds per division (200 milliseconds full scale).
Today’s oscilloscopes digitise the signals, and store them prior to displaying them on a computer screen. The benefits are enormous, flicker is eliminated and there are almost infinite possibilities to perform signal processing on the data prior to displaying it on the screen, for example as a frequency spectrum, or with additional data. However, as there is no bright spot scanning across our field of view, the “denture sensor” effect will not be seen.
So assuming you have your oscilloscope set to scan continuously at 20 ms/div, you now need to view this from a distance, the further away, the larger the amplitude of the apparent signal waveform.
You will also need a dummy sensor to reinforce the illusion. Almost anything will suffice provided it has a piece of electrical cable to connect it to the oscilloscope. Of course it does nothing, but it helps to convince the observer that something is being sensed externally.
When subjects have bought in to the illusion, they find it surprisingly difficult to see the reality. When I unplugged the cable to show subjects that there was no signal going into the oscilloscope, I expected that they would immediately realize that there was no sensor, but instead they would often look round the back of the ‘scope for another hidden cable.
Firstly, this works best in a science environment, because it whets people’s expectations. Next, before wheeling in a new subject, you need to thoroughly familiarise yourself with the following, or there is a good chance you will only create confusion: If you click your own teeth, you will see a waveform, as your own eyeballs are bouncing, but no-one else will see it. Similarly when another subject clicks their teeth, you see nothing, but you have to pretend that you do in fact see the same as they do. Equally when you click your own teeth you have to pretend that you see nothing (because that is what the other person sees).
It gets much more complicated when there are others in the room, and success depends on all the others being familiar with the above, and prepared to go along with the ruse. This is likely to be true if they have all previously been taken in by the illusion. I found that previous subjects are often very enthusiastic to see new “victims”, sometimes too enthusiastic as they forget the rules above, and confuse everyone. It is just easier to make this work when only you and the new subject are in the room.
You can have fun with exploring what causes the waveform to vary in magnitude: The apparent amplitude increases linearly with distance from the screen, which is counter intuitive (assuming that the dummy “sensor” is located adjacent to the screen). Those with a scientific background would would have expected it to decrease inversely as the square of the distance.
The perceived signal falls to zero when the head is tilted to the left or right at 90 degrees, as the direction of the eyeball bounce is then along the direction of the scanning bright spot.
The perceived signal inverts when the subject inverts their head (most entertaining when you persuade the subject to turn round and look at the screen from between their legs).
Lastly you see a similar waveform if you just thump the top of your head with your hand.
Now you just need to find some innocent bystanders, and have some fun! |
From Our MagazinesAmerica's Civil War American History Armchair General Aviation History British Heritage Civil War Times MHQ Military History Vietnam Wild West World War II
More On The WebsiteClassifieds Partner Links Civil War Sesquicentennial
Our History MagazinesOrder America's Civil War Order American History Order Aviation History Order British Heritage Order Civil War Times Order Military History Order MHQ Order Vietnam Order Wild West Order World War II Order Armchair General
Subscriber ServicesOrder a Subscription Give a Gift Renew Get Subscription Help
HistoryNetShop.comStore Home Books Book Series 2012 Calendars DVDs PC Wargames Action Figures Audio Collections Videos Gift Ideas Magazine Subscriptions Magazine Back Issues Magazine Special Issues Magazine Slip Cases
'And with the wolf in retreat, not only did the coyote population bloom in the American West, in the 1920s the coyote began an unprecedented and historic expansion of its range—eastward across the Mississippi'
Editor's note: This article earned author Dan Flores his third Western Heritage (Wrangler) Award for outstanding magazine article from the National Cowboy & Western Heritage Museum. It originally appeared in the April 2013 Wild West, and marks our sixth Wrangler Award.
Autumn 1804 looms large in the natural history of the American West and, indeed, in the history of Western science. While ascending the Missouri River in what is now Nebraska and South Dakota, American explorers Meriwether Lewis and William Clark described for science most of the diagnostic species that made the West so unique. On August 23, encouraged by President Thomas Jefferson to "collect" wildlife not found back East, the party downed the first bison most of them had ever seen. By September 7 they had bagged their first prairie dogs, or "ground rats," in Clark's rather less-flattering description. A week later Clark killed a "Buck Goat of this Countrey…more like the Antilope or Gazelle of Africa than any other Species of Goat." That was, of course, the pronghorn. Three days later expedition member John Colter shot "a Curious kind of Deer of a Dark Gray Colr…the ears large & long." Thus did the mule deer come to the notice of science.
The next day, somewhere in the vicinity of present-day Chamberlain, S.D., one more American original emerged from the wilds of the Great Plains, soon to arrest the attention of scientists in Philadelphia, Paris, London and Stockholm. For most of that month the party had reported seeing what they had assumed to be a kind of fox. The more they observed these sleek, beautiful canids, however, the less foxlike they seemed. So on the morning of September 18 Clark finally decided to collect one. With the animal lying in the grass before him, the explorer was mystified by its ambiguity—"about the Sise of a Gray fox," yet neither a fox nor the gray wolf of Europe and the East. Clark finally decided to call the creature a prairie wolf. He then went on to correct his journal: "What has been taken heretofore for the Fox was those wolves, and no Foxes has been seen."
This account of the discovery of the American coyote, while common in the biological literature, cannot stand as the creation story for what has become, two centuries later, America's most widely observed wild predator. Like the other animals Lewis and Clark "discovered," coyotes had hardly been invisible to the inhabitants of the West over the previous 15,000 years. Nor had they escaped the notice of French traders traversing the Plains since the early 1700s, or Spanish colonists in New Mexico and California, who had even borrowed the Nahautl (Uto-Aztecan) name cóyotl to describe the animal.
As Jefferson's explorers neither wrote up a scientific description nor proffered a Latin binomial for their 1804 coyote, they did not become its official discoverers even in Western science. That honor fell to Thomas Say, naturalist on Stephen Long's 1819–20 expedition to the Rockies, who in 1823 officially described the "type specimen" of the prairie wolf from a Nebraska coyote he trapped with a bobcat as bait. His binomial, Canis latrans ("barking dog"), has been the recognized scientific name ever since.
William Clark's 1804 description of his "prairie wolf" does, however, tantalize us in three particular respects. First, this animal, unlike the gray wolf, was unknown to Anglo Americans. Thus they had no preconceptions about coyotes. Second, Clark and compatriots found the coyote biologically ambiguous. Was it a fox? A wolf? Something else? That ambiguity has since played a role in the coyote's story. Finally, 19th-century Anglo Americans had to get halfway across the continent, to the Great Plains, before they ever saw a coyote. That becomes most interesting, given the modern story.
That the coyote plays such a significant role in the ancient religions of North America is a testament to how powerfully it captured the human imagination. But to religion and history add the sciences as critical to understanding why we can't turn our eyes from the coyote. There are sound scientific reasons, readily expressed through religion and history, for why we have subconsciously intuited so much human nature from coyote nature. The coyote, then, is perhaps the best American totem animal of our continental historical experience, past and especially present.
How so? Consider coyote evolution. The coyote as a distinct species is less than 2 million years old and may be as young as 300,000 years. In fact, the coyote's relative youth is the first of its many similarities with humans. We're also a young species, theoretically emerging out of an earlier "hominid soup" in Africa some 200,000 years ago. As a family the Canidae are older, evolving in North America 40 million years ago and spreading across the globe about 5 million years ago. Ancestors of the gray wolf (Canis lupus), particularly, became cosmopolitan, eventually colonizing almost the entire planet.
The coyote, however, did not emerge directly from the lineage of the world traveler gray wolf but claims more indigenous, North American roots. The best nursery candidate is the red wolf of the mid-South, whose original habitat stretched from Florida to west Texas and north to the Ohio River. As naturalist E. Raymond Hall wrote of the red wolf, it has a "smaller size and more slender build" than the much more widespread gray wolf. Its nose is sharper and longer than the gray wolf's, its footpads are smaller, and its "general coloration [is] more tawny." While the red wolf remained a creature of the forests and swamps of the American South, somehow its descendant, the coyote, became the jackal of the American prairies and deserts. It's a track similar to the one our ancestors followed to the African savannahs.
The advantages may have been similar for both coyotes and human beings. During the Pleistocene epoch, the extensive savannahs were where most of the action was. In America, elephants, giant bison, wild horses and a diverse bestiary of smaller animals flocked to the Great Plains. Perhaps spawning the smaller, quicker coyote enabled North American canids to compete in a situation with many opportunities but also many larger carnivores like dire wolves, saber-toothed cats, short-faced bears—and, eventually, gray wolves, returning to their evolutionary homeland.
The paleontological record suggests that Pleistocene coyotes had to be especially creative adapters, and that, too, has had consequences. About the time that extreme climate stresses (thought to have been caused by a number of volcanic eruptions on the island of Sumatra some 70,000 years ago) led our ancestors to transform their cultural lives, in what author-scientist Jared Diamond has termed our "great leap forward," coyotes were acquiring some of the traits that made them unique, resilient and successful in North America.
Like humans, who are intensely social but whom anthropologists describe as having developed a unique kind of social life—"fission-fusion societies"—coyotes became the rare predator to do the same. Fission-fusion adaptability grants unusual flexibility to individuals, who can be either social or solitary, depending on the circumstances. The gray wolf, which specialized as a pack animal to pursue large prey, is not a fission-fusion carnivore. Indeed, that would become a near-fatal flaw in wolves trying to survive in the modern age. Most other predators are either solitary or social, not both.
Humans and coyotes are exceptions. Our successes stem from our plasticity. Coyotes can be solitary hunters, focusing on the kinds of small prey an individual animal can capture. They can also band together as pack animals when prey like deer call for cooperation. Such adaptation made them, like us, opportunists able to thrive in a range of situations. Adaptation enabled coyotes to survive 20th-century America's war on predators when wolves could not.
This adaptation seemingly traces its origins to the Pleistocene. Coyotes then were distinct from the animal Lewis and Clark encountered on their trek to the Pacific Ocean in 1804. Their skulls and jaws were thicker, their teeth wider, most likely because their initial response to life on the American Plains was to pursue larger prey in packs. This was, unfortunately, a niche gray wolves also occupied. So in the wake of the Pleistocene extinctions of 10,000 years ago, when scores of animal species on the Plains disappeared, competition between gray wolves and coyotes intensified. The genius of the coyote was to back out and switch to the strategy of individual effort. Wolves remained big—5- to 6-foot-long pack hunters weighing 80 to 120 pounds. Coyotes became 3- to 4-foot-long, 30- to 40-pound solitary foragers for small game, even omnivores. Fission-fusion at work.
Through the years Coyotes have developed an array of other traits worth noting. Like domesticated dogs, as well as humans, coyote pups require a lengthy maturing process to learn skills and critical information about the world from their mothers and fathers. The social life of canids is also similar to ours on many levels, even incorporating a census of sorts. Coyotes become mated pairs whose average litter size is 5.7 pups, but they seem to have an autogenic mechanism that allows them to assess the ecological possibilities around them. If they sense plentiful resources they produce larger litters, or vice versa. Their classic yodeling howl, that iconic sound of the starry-skied West heard so often in motion pictures as well as in reality, has many functions, but one is assessing the size of the surrounding coyote population.
American Indians' ready identification with the social lives of coyotes prompted ubiquitous "Old Man Coyote" traditions in North America. Ten thousand years ago North American Indians could choose from scores of animal candidates for their deity figures. But for those living in the American West, something about the coyote captured their imaginations. As they, too, moved West, American explorers, settlers, government officials and literary figures also found the coyote worthy of special attention—but often with very different ends in mind.
Our evolutionary background as hunters fuels a certain human fascination with other predators, but we long ago recognized them as danger and competition. Given our Old World experiences with wolves, we were suspicious of coyotes from the first. While they seemed too small to arouse fear, they were without doubt competitors, especially with regard to our domestic livestock. Over polite conversation in the churches, saloons and ranch houses of the 19th-century West, no North American predator escaped general excoriation. But for intriguing reasons, coyotes struck everyone as particularly vile. With no ingrained mythology and scant knowledge of the Indian concepts of a coyote deity, we found the species ripe for original interpretation. And for a half-century after 1872 a very unflattering one emerged.
It was Mark Twain's description of the coyote in his 1872 book Roughing It that perhaps saddled the animal with an infamous reputation that only grew worse with time. "The coyote is a long, slim, sick and sorry looking skeleton," the satirist wrote, "with a gray wolf-skin stretched over it, a tolerable bushy tail that forever sags down with a despairing expression of forsakenness and misery, a furtive and evil eye, and a long, sharp face, with slightly lifted lip and exposed teeth. He has a general slinking expression all over. The coyote is a living, breathing allegory of Want."
Wanting meant becoming a target. Strychnine, first manufactured domestically in the 1830s, had by the 1850s become a regular commodity at Western trading posts. As a result, predator pelts entered the international fur trade that decade. The commercial buffalo harvest of the 1860s–80s created boom conditions for Great Plains canids but also inaugurated the campaign of extermination against them. The real target was the wolf, but strychnine did not discriminate: A single poisoned bison carcass in Kansas yielded 13 wolves, 15 coyotes and 40 skunks. No one knows the exact toll of collateral damage, but naturalist George Bird Grinnell estimated that wolfers killed hundreds of thousands of coyotes on the Great Plains in those years.
Gone was the Indian deity who created the world. Observing the same animal, Americans saw a sick, despairing, forsaken, miserable creature to which they ascribed traits of both cunning and cruelty. Articles by such popular writer-naturalists as Ernest Ingersoll and Edwin Sabin described coyotes as "contemptible" and "especially perverse." Their howls were "eerie" and "blood-stilling," even defiant. Coyotes supposedly lacked "higher morals" and were "cowardly to the last degree." Exploring ideas for commercial gain from coyotes, a 1920 article in Scientific American asserted that coyotes were not worth the price of the ammunition to shoot them, then added the ultimate insult for the age: The coyote, the writer avowed, was the "original Bolshevik." These writers presumably missed the implications of both Old Man Coyote and Darwinism's "animal in the mirror." At the very least they failed to appreciate a point made by one of their colleagues, who declared, "If we are only a little higher than the dog, we may as well make the dog out to be as fine a fellow as possible."
Eradication of such an unsavory animal seemed the logical next step, and a century ago everyone was on the bandwagon. Writer-naturalist John Burroughs argued that predators "certainly needed killing." William Temple Hornaday—the conservationist credited with saving the last bison and who led the charge to replace market hunting with sport hunting—considered "firearms, dogs, traps and strychnine thoroughly legitimate weapons of destruction. For such animals no halfway measures suffice." Not even John Muir, who found coyotes "beautiful" and "graceful," came to the defense of predators. With packets of strychnine available in every hardware store in America, it had become almost a patriotic duty to scatter a few and beat back the continent's wild predator horde.
By the 20th century, however, many Americans believed the extermination of animals like coyotes too big a task for individual effort. It also seemed too important a matter for livestock associations or state bounty programs. Coyotes, in particular, seemed practically impossible even to thin out. No, the extermination of such predators called for experts in mass killing.
If ever there was a poster child for the stereotypical government agency that lingers even when the tides of both science and public opinion threaten to drown it, it was the Bureau of Biological Survey. The bureau's roots lay in the 1880s; until 1905 its mission was to conduct a nationwide survey of North American flora and fauna. But doing pure science threatened it with extinction every time appropriations votes came up. Western stockmen particularly blamed the federal government's new public lands system—national forests and national parks—for creating a system of refuges for predators fleeing eradication on the open plains. In its search for an economic mission, the bureau, under director Vernon Bailey, positioned itself as the expert on the "problem of predators."
The first large congressional appropriations went to the bureau in 1914, to be used "on the national forests and the public domain in destroying wolves, coyotes and other animals injurious to agriculture and animal husbandry." Within two years the bureau had hired 300 hunters across the West to wage this federally mandated war on predators. It then pressed Congress to allow it also to accept funding from stockmen's associations and state legislatures. Meanwhile, the bureau's PR office assured hunters that its project of destroying predators would produce bumper populations of game animals, bringing new allies to the cause.
As poisoning, not shooting, proved the quickest way to kill wolves and coyotes en masse, the bureau built an Eradication Methods Laboratory in Albuquerque to produce strychnine tablets in volume. In 1921 it relocated the lab to Denver, where it would perfect a witches' brew of ever more efficient and deadly poisons. Hunters first engaged in "pre-baiting"—strewing cubes of fat and meat across the countryside to habituate coyotes to the food source. Poison bait stations went in next. Stanley Young, a field hunter who became director of the bureau in 1921, found that using strychnine it was possible to kill 350 coyotes in just 10 days. At his bait stations, he found every dead coyote frozen in a signature strychnine convulsion, their tails sticking straight out as if they'd been electrocuted.
Señor Coyote's turn had come. While federal hunters initially concentrated on the wolves so loathed by stock associations, by 1923 wolf populations had diminished such that the average federal hunt seldom tallied more than a single wolf a year. Yet in Colorado the bureau set out 31,255 poison baits in 1923.
Truth be told, the bureau's arguments for making coyotes public enemy No. 1 may not have been mere propaganda. An ecological revolution was under way across North America. As the bureau had all but eradicated the keystone predator, the gray wolf, the coyote exercised its ancient fission-fusion adaptability, some forming packs to hunt larger prey—including sheep and calves. And with the wolf in retreat, not only did the coyote population bloom in the American West, in the 1920s the coyote began an unprecedented and historic expansion of its range—eastward across the Mississippi River, where it gradually filled the wolf's vacant niche in the East and South.
With the bureau's Denver lab cranking out strychnine, its hunters by 1924 had set out 3,567,000 poison baits across the West in what amounted to a scorched-earth policy against coyotes. In that decade the bureau on average poisoned 35,000 coyotes a year. But the coyote, it turned out, was not as easily erased as the wolf, whose pack-based social ties had doomed it. Like Old Man Coyote of Indian tradition, the real coyote seemed impossible to kill off. Even as newspapers such as Denver's Rocky Mountain News ran stories headlined U.S. AGENTS STALK 'DESPERADOES' OF ANIMAL WORLD THRU DESERTS AND OVER MOUNTAIN RANGES OF WEST, somehow, in its clash with the lowly, slinking, immoral coyote, the bureau could not win the war of civilization.
And unexpectedly, coyotes began to attract champions across the nation. At its annual meeting in 1924 the American Society of Mammalogists debated whether predators served essential functions in nature, and whether American policy was tragically wrong in pressing for their eradication. Scientific luminaries such as Joseph Grinnell, E. Raymond Hall, Olaus Murie and Aldo Leopold demonstrated with their field studies that, lacking predators, the natural world often swung precipitously to new and often very fragile paradigms.
The reaction of the bureau to this mission-threatening input from the scientific community was to double down on denials of a role for predators and propose a shocking final solution. "Large predatory mammals, destructive to livestock and to game, no longer have a place in our advancing civilization," bureau representative E.A. Goldman thundered. Ignoring the accumulating science, in 1928 the bureau offered up its faunal endgame. If Congress would fund the bureau at $10 million for a decade, it would wipe out coyotes—"the archpredator of our time"—once and for all.
The proposed 10-year plan for coyote eradication was the final straw for many scientists and ecologists. One of them, Murie, employed with the bureau as a wildlife biologist since 1920, was known for his conviction that scientists must above all be ethical. Now Goldman tasked him to study coyotes, hoping to buttress the bureau's position. In his report Murie evaluated "the factions interested in [the] coyote question," including an emerging group he called "the nature lovers." Murie argued that the latter faction might actually represent a state of human evolutionary enlightenment. As he put it, "I firmly believe that it is working against the best interests of humanity to…ridicule those who see beauty in a coyote's howl."
Regardless, in 1931 Congress passed the Animal Damage Control Act, appropriating $1 million a year for 10 years for the bureau to pursue the eradication of coyotes—the "gangsters of the animal kingdom," in the media's phrase. The bureau pursued its coyote mission relentlessly, and well beyond a single decade. World War II prompted explosion of knowledge about chemicals, and in 1946 the bureau offered up thallium(I) sulfate as an improved predacide. Its advantage over strychnine was that poisoned coyotes would not alarm other coyotes; thallium sulfate killed them slowly, often causing their hair to fall out first. The lab rolled out a second new poison, sodium fluoroacetate, or Compound 1080, which brought the bureau closer to its goal, sometimes approaching local coyote extirpation. The bureau pursued a third technique, the "humane coyote getter," to close the deal. It featured an upright tube capped by a scented cloth coyotes found difficult to resist. When an animal approached, the device fired a mist of sodium cyanide directly into its face.
But wasn't overconfidence often the downfall of Old Man Coyote's plans to change the world? The new poisons did kill untold numbers of coyotes, yet the species not only survived, but also expanded its range. Unlike wolves, coyotes are fertile by a year old. Poisoned to scarcity, they simply had larger litters. Employing their fission-fusion adaptability, they then turned to a broader array of prey, particularly the massive rodent population. They readily hunted as loners or pairs, making them harder to wipe out. And without question they took refuge in the huge American public lands, which thanks to the scientists had been off-limits to bureau hunters since 1931.
So the coyote held on, and meanwhile the cultural pendulum began to swing. Rachel Carson's pivotal 1962 book, Silent Spring, dramatically changed the way many Americans regarded poisons. By then scientists had published sufficient work on the role of predators to change how many people felt about them, too. And in the 1960s and 1970s the science of ecology and the environmental movement created a whole new appreciation for species' innate right to exist. Surfing this wave, Richard Nixon not only banned the federal use of poisons for predator control in 1972, but also supported the Endangered Species Act of 1973, one of the most important and controversial environmental laws in U.S. history.
A glance over the decades since might lead one to believe little has changed for coyotes in America. That would be a mistake. Like so many policies, coyote control has become a marker of politics and the culture wars. Nixon's poison ban did not survive the Reagan years. And while the Endangered Species Act protects coyotes from extermination, in 1985 Congress moved Animal Damage Control from the Fish and Wildlife Service to the Department of Agriculture and renamed it Wildlife Services. Thus, on behalf of agriculture, federal coyote control continues, and between 2006 and 2011 Wildlife Services' hunters culled 512,710 coyotes nationwide.
The coyote's response to all this pressure has been remarkable. In the 1920s people began spotting the animal in places it had never before inhabited. In 1949 a Wisconsin biologist collected a coyote on the Apostle Islands. Within another two years marginal records of coyotes had cropped up in Indiana, Illinois and 200 miles east of the Great Lakes. With some confusion a 1955 work on mammal distributions noted coyote sightings in Virginia, West Virginia, Tennessee, the Carolinas, Georgia, Alabama and Mississippi.
Then this former denizen of the desolate Great Plains did something even more astonishing. Confronted with a continent transformed by humans, it adopted man as a lifestyle. The coyote went urban. Since 1940 most American cities, from Los Angeles to New York, have recorded resident coyotes. Studying this urban coyote phenomenon, biologist Stanley Gehrt was surprised to discover that hundreds of coyotes were roaming the streets and alleyways of Chicago. Indeed, by the early 21st century the most common large wild animal most urban Americans had ever encountered was a coyote.
A final demonstration of the coyote's smarts and adaptability is the best evidence yet that this American original is truly our totem animal—not just for ancient America but for our age as well. In a striking nod to Lewis and Clark's puzzlement over the animal's identity in 1804, coyotes are now mirroring our own multicultural patterns in modern America. Even as we rapidly become a nation of blended ethnicities, coyotes are blending canid populations in the wild. What scientists call a "canis soup" is their version of our "melting pot." Careful genetic work shows that by interbreeding with remnant gray and red wolves (and assorted dogs), the last 75 to 140 generations of coyotes have thoroughly mixed wild canids in the East. Remnant Eastern gray wolves are now 40 percent coyote—hybrids known as "coywolves." Red wolves, from which coyotes may have separated a half-million years ago, are now 75 percent coyote.
In the Southwestern United States, where Anglo-Hispanic intermarriage grows by the decade, the vernacular term for the offspring of such unions is, predictably enough, "coyote." And that, in the way of so much of coyote history, merely confirms the logic: The American original, almost by default, has all along been the best candidate for a North American animal deity that we possess.
Dan Flores divides his time between New Mexico and Montana and teaches at the University of Montana in Missoula. His Coyote America: The Coyote in Continental Culture and History is forthcoming. Suggested for further reading: The Clever Coyote, by Stanley P. Young and Hartley H.T. Jackson; Predatory Bureaucracy: The Extermination of Wolves and the Transformation of the West, by Michael J. Robinson; and A Coyote Reader, by William Bright.
2 Responses to “2014 Wrangler: Coyote, An American Original”
Leave a Reply
What is HistoryNet?
The HistoryNet.com is brought to you by Weider History, the world's largest publisher of history magazines. HistoryNet.com contains daily features, photo galleries and over 5,000 articles originally published in our various magazines.
If you are interested in a specific history subject, try searching our archives, you are bound to find something to pique your interest.
From Our Magazines |
About the Museum
T-34 TANK HISTORY MUSEUM
T-34 Tank History Museum is located at the 36th kilometer of the highway leading to the town of Dmitrov. This place is of historic significance to the history of tank engineering. V.D.Mendeleyev, one of the first Russian tank inventors, worked in these parts of the Moscow Region. The first Russian heavy tank designed by N.N.Lebedenko was tested near Dmitrov. On December 6, 1941, right from the point where the museum now stands, the T-34s of a separate tank battalion started their counterattack against the nazis – this was the most important stage of the Battle for Moscow. After the War well-known tank engineers and tankmen, such as P.S.Antonov, V.M.Badanov, A.A.Burdeyny, S.A.Ivanov, N.A.Kucherenko, A.M.Parchinsky and others lived in the nearby dachas.
In 1976 Larissa Vassilieva, a well-known poet and writer, standing at the deathbed of her farther Nickolai Kucherenko, one of T-34 designers, promised him to write a book about the creation of the legendary combat vehicle. Her persistent research and numerous meetings with the veterans – tank builders and tankmen – resulted in the release of the “Book about Father” in 1983. Public response to the release of this book was so great that literally bags of letters from people who had been privy to the creation of Т-34 were coming to her. These people shared facts, reminiscences, photographs, and documents with her. Semyon Geychenko, Director of Puskin’s Museumin in Mikhailovskoye, after seeing Mrs. Vassilieva’s mail, recommended her to set up a museum, at first, in her own dacha.
The unofficial museum created by Larissa Vassilieva on 26 square meters of her dacha opened on May 2, 1985. So many people came to the opening ceremony that the floorboards were about to break. Fortunately, it did not happen. The museum soon became popular both inside and outside Russia. New letters, parcels, packages kept on coming to the museum. The size and the amateur status of the museum wee no longer in line with the uniqueness of its collection.
In 2000 Mrs. Vassilieva forwarded to Yuri Luzhkov, Mayor of Moscow, and Boris Gromov, Governor of Moscow Region, a proposal to consider the establishment of an official museum dedicated to the history of Т-34 tank. In 2001 the construction of the Museum commenced at the 37th kilometer of Dmitrovskoye Highway. In less than one year – on the 60th anniversary of the beginning of the Battle of Moscow – the new Museum opened as a municipal institution of the Town of Lobnya.
Federal and municipal agencies, institutions, enterprises; public associations from Moscow, Moscow Region, Lobnya, Dogloprudny, Mytischi, Nizhny Tagil and Kharkov (Ukraine), as well as the Main Army Tank-Automotive Command of the RF Defense Ministry took part in the setting up of the Museum’s first exposition.
Now the Museum displays exhibits from private archives of L.N.Vassilieva, E.S.Katukova, widow of M.E.Katukov, Marshal of the Armed Forces, Т.М.Koshkina, daughter of M.I.Koshkin, the Chief Designer of T-34, I.G.Zheltov, a well-known tank historian, veterans and commanders of the Great Patriotic War.
The Museum became very popular in the first few years of its existence and also became an official venue of memorial meetings held by the Governments of Moscow and Moscow Region. It is visited by members of the diplomatic corps, foreign delegations, students and schoolchildren form various regions of Russia and CIS countries.
In 2005 the Museum’s status was changed. It became a cultural institution founded by:
— on behalf and under the instructions of the Government of Moscow – Culture Departament of the City of Moscow;
— on behalf and under the instructions of the Government of Moscow Region – Ministry of Culture of Moscow Region;
— on behalf of the Municipality of the Town of Lobnya of Moscow Region – Administration of the Town of Lobnya of Moscow Region;
— Atlantis — XXI Century Regional Cultural and Educational Association.
In 2011 in pursuance of the federal laws of the Russian Federation the Museum became the State-Financed Cultural Institution of Moscow founded by the City of Moscow represented by the Department of Culture of the City of Moscow.
The general concept of the Museum can be outlined as follows. The Museum demonstrates the process of the creation of the tank and its unique engine, discloses the biographies of the people who created the tank and whose names were kept secret for many years. The Museum shows hero tankmen and their heroism in WWII.
The Museum is the first to describe the “ancestors” of Т-34 – BT-2, BТ-5, BТ-7, BТ-7М tanks – and the specific work done by their creators.
The Museum is the first to reflect the strategic role of Т-34 in the Battle of Moscow.
The Museum is the first to undertake a comparative analysis of medium tanks from various countries.
The Museum is the first to trace the “ancestry” of Т-34 and its modifications.
The Museum is the first to display the “geography” of Т-34 which fought in different continents and countries.
The Museum has a vast collection of quotations about Т-34 and its role in WWII. |
After completing the solar window analysis, you still need to plan for routing conduit, grounding conductors, and placing the balance-of-system components (inverters, disconnects, and combiner boxes). A thorough inspection of the existing electrical panel includes documenting the enclosure make and model, as well as verifying additional breaker space, and checking the main breaker size and bus bar ratings. The service equipment ratings will be used in system design calculations to determine allowable PV backfeed capacity and the associated breakers needed for interconnection. Ensuring adequate breaker space avoids expensive surprises later, like needing to upgrade the service panel.
Planning for Code-compliant conduit routing requires considering equipment placement, the mechanical integrity of equipment mounting and conductor runs, aesthetics, local regulations, and climate. Part IV: Wiring Methods, Article 690.31 of the 2011 National Electrical Code (NEC) dictates the type, placement, routing, and marking of conduit. Because of the higher temperatures commonly encountered on roofs, the details of conduit routing can affect system design due to required derating of conductor ampacity.
Identifying grounding components of the existing AC electrical system is another important step of the site survey. The location of the existing grounding electrode conductor (GEC) and grounding electrode (often a ground rod) will inform decisions for routing the PV system grounding conductor(s) to interconnect the two systems. In some cases, the inverter will have a GEC that must be connected to the building’s existing grounding electrode or GEC. Depending on the system, the PV array may also have a GEC that must be connected to the grounding system. Planning these routes will help ensure Code-compliant installation.
Inverter and disconnect placement involves satisfying Code regulations that apply to the working space around the equipment, weather considerations, and aesthetics. Disconnect locations must be accessible and installed within height limitations. In cold climates, some inverter models need to be installed indoors to keep them within their operating temperature range. Inverters placed outdoors should avoid south or west orientations as the intense sun may cause the inverter to derate its power output to protect internal components from excessive heat damage. Direct solar exposure can also burn out the LCD screen, which includes state of operation information, energy production values, and potential error messages.
Analyzing the building’s loads—and researching measures for improving the overall efficiency—is another important part of the site evaluation. Shrinking a building’s loads can often result in a smaller PV system, resulting in PV system savings that are greater than the efficiency investments. Lighting and refrigeration are two of the easier places to start with efficiency upgrades—incandescent bulbs and old refrigerators are prime candidates for replacement. Insulation and other weatherization measures can also make a significant impact on electricity usage in homes with electricity-based space heating.
Jeff Tobe is a PV curriculum developer and instructor at Solar Energy International (SEI). He has been instrumental in the development of SEI’s state-of-the-art PV lab training facility in Paonia, Colorado, and spearheads renewable projects for indigenous communities in the United States. He is an ISPQ-certified PV Instructor, has a NABCEP certification in Technical Sales, and is a NABCEP-certified PV Installation Professional.
Magnetic declination finder • bit.ly/CalcDeclination
PV-ready home checklist • bit.ly/PVHomeChecklist
PV system production estimator (PVWatts) • bit.ly/PVWattsV1
Solmetric roof azimuth tool • bit.ly/SolmTools
Solar Site Evaluation Training & Certification:
Solmetric • bit.ly/SolmTraining
MREA • midwestrenew.org |
For Patients and Caregivers
Implications for the Care of Patients
One of the consequences of having a near death experience is that people are often left with a very positive effect that makes them less materialistic, less afraid of death and more altruistic. This positive transformation can often last for decades. Although, these effects are undoubtedly mediated by changes in the expression of genes and specific chemicals in the brain, no one yet knows how.
The discovery of these changes does not in any way take away from the nature of the experience and its significance, but could also allow doctors to discover novel ways to treat psychological and psychiatric illnesses by allowing doctors to instill the positive effects of near death experiences in those who have not had them. After discovering the brain signals that are involved with the positive transformational effects of NDEs, doctors could potentially design drugs that would stimulate the same areas of the brain and get the same effect in people who have lost hope and become apathetic, thus recreating the positive transformational effects of NDE. There has been enormous progress recently in the study of the behavioural changes and the dynamic changes that take place in the genes and chemical changes in the human brain in response to different behavioural states. Significant and ever-evolving biochemical technologies now make it possible to study the activities of thousands of genes at the same time.
Of course, another benefit may be that once we discover the actual nature of the mind we may well discover alternative means of treating its illnesses. Current medical treatment is focused largely on chemical treatment, however this only works to a limited extent. If we discover that there is a separate component that is of a different scientific nature from chemicals then we may be able to also discover ways to manipulate it directly.
Mailpoint 810, Level F, Southampton General Hospital, Tremona Road, Southampton, Hampshire SO16 6YD, United Kingdom. Tel: +44 (0) 2380 001016 |
Shirin Ebadi, an Iranian lawyer fighting for the rights of women, accepted the Nobel Peace Prize on Wednesday, calling her selection for the award an “inspiration” to women around the world.
“Undoubtedly, my selection will be an inspiration to the masses of women who are striving to realize their rights, not only in Iran, but throughout the region–rights taken away from them through the passage of history,” Ebadi said at the awards ceremony in Oslo, Norway.
“This selection will make women in Iran, and much further afield, believe in themselves. Women constitute half of the population of every country,” she continued. “To disregard women and bar them from active participation in political, social, economic and cultural life would in fact be tantamount to depriving the entire population of every society of half its capability.”
“The patriarchal culture and the discrimination against women, particularly in the Islamic countries, cannot continue forever.”
The speech drew an enthusiastic response from those at the ceremony and from viewers around the world. On the Muslim Web site, Muslim WakeUp!, one reader wrote, “For the human rights activists from an Islamic background, this should be the ‘I have a dream . . .’ (Martin Luther King) speech that should inspire the Islamic human rights movement to a new level of commitment and effectiveness!”
Some in the U.S. were critical of her speech for its pointed challenge of the Iraq war, while others praised her for her equally strong comments about the intolerance of free speech and women’s rights throughout the Arab region.
She ended her speech with a plea for a peaceful future: “If the 21st century wishes to free itself from the cycle of violence, acts of terror and war, and avoidrepetition of the experience of the 20th century–that most disaster-ridden century of humankind, there is no other way except by understanding and putting into practice every human right for all mankind, irrespective of race, gender, faith, nationality or social status.”
The National Association for Female Executives Tuesday released a survey indicating that on average, women’s wages across 21 fields lag far behind men’s. According to the survey, from 1991-2001, the wage gap between men and women closed by less than 2 percent–at this rate, women’s wages will draw even with men’s by the year 2123, or 120 years from now.
Women in sales make $30,000 less than men per year; women in accounting, advertising, law and public relations earn approximately $20,000 less than men per year; female journalists make $9,000 less than their male colleagues and women working full-time, year-round earn on average 76 percent of what a man brings home, working a similar schedule.
Betty Spence, president of the association, said the wage gap will hit baby boomer women the hardest. “If you think the wage gap’s bad now, just wait,” she says. “Women live longer than men, so we need more retirement savings. But we earn less than men do, so it’s harder to save.”
Spence added that Congress has not taken the proper steps to legislate against the type wage discrepancies present in the workplace.
“In jobs which are identical, the unexplained wage gap can only be attributed to the subtle discrimination that women face in the workplace,” Spence told Women’s eNews.
— Carline Bennett. |
Skip to content
Scrabble Word Finder
Definition for the word Versifiers.
a writer who composes rhymes; a maker of poor verses (usually used as terms of contempt for minor or inferior poets)
Is Versifiers a Valid Scrabble Word?
Versifiers is a valid Scrabble word.
Scrabble Point Value of Versifiers: |
How do I learn to scuba dive?
Becoming a scuba diver is a wonderful adventure! Scuba certification includes three phases:
1. Knowledge Development
During the first phase of your scuba lessons, you’ll learn the basic principles of scuba diving such as
- What to consider when planning dives.
- How to choose the right scuba gear for you.
- Underwater signals and other diving procedures.
You’ll learn this valuable information by reading it in the PADI Open Water Diver Manual or by using the tablet version – PADI Open Water Diver Touch™, or online with PADI eLearning®. At the end of each chapter, you’ll answer questions about the material to ensure you understand it. Along the way, let your PADI Instructor know if there is anything you don’t understand. At the end of the course, you’ll take a final exam that ensures you have thorough knowledge of scuba diving basics.
You’ll also watch videos that preview the scuba skills you’ll practice in a swimming pool or pool-like environment. In addition to the video, your instructor will demonstrate each skill for you.
2. Confined Water Dives
This is what it’s all about – diving. You’ll develop basic scuba skills in a pool or in confined water – a body of water with pool-like conditions, such as off a calm beach. The basic scuba skills you learn during your certification course will help you become familiar with your scuba gear and become an underwater explorer. Some of the essential skills you learn include:
- Setting up your scuba gear.
- How to get water out of your mask.
- Entering and exiting the water.
- Buoyancy control.
- Basic underwater navigation.
- Safety procedures.
You’ll practice these skills with an instructor until you’re comfortable. When you’re ready, it’s time for your underwater adventure to begin at an open water dive site.
3. Open Water Dives
After your confined water dives, you’ll head to “open water,” where you and your instructor will make four dives, usually over two days. On these dives you’ll get to explore the underwater world. You’ll apply the skills you learned in confined water while enjoying what the local environment has to offer. Most student divers complete these dives close to home, but there is an option for finishing your training while on holiday. Your PADI Instructor can explain how you can be referred to another PADI Instructor in a different location.
How long does it take to get certified?
The PADI Open Water Diver course is flexible and performance based, which means that your PADI dive shop can offer a wide variety of schedules, organized according to how fast you progress. It’s possible to complete your confined and open water dives in three or four days by completing the knowledge development portion online via PADI eLearning, or other home study options offered by your local dive shop or resort.
Your PADI Instructor will focus on helping you become a confident and comfortable diver, not on how long it takes. You earn your certification based on demonstrating you know what you need to know and can do what you need to do. This means that you progress at your own pace – faster or slower depending upon the time you need – to become a competent scuba diver.
How much do scuba lessons cost?
Compared with other popular adventure sports and outdoor activities, learning to scuba dive isn’t expensive. For example, you can expect to pay about the same as you would for:
- a full day of surfing lessons.
- a weekend of rock climbing lessons.
- a weekend of kayaking lessons.
- a weekend of fly-fishing lessons.
- about three hours of private golf lessons.
- about three hours of private water skiing lessons.
- one amazing night out at the pub!
Learning to scuba dive is a great value when you consider that you learn to dive under the guidance and attention of a highly trained, experienced professional – your PADI Scuba Instructor. What’s more, you receive a certification to scuba dive at the end of a PADI Open Water Diver course (few other activities can offer that).
From the first day, scuba diving starts transforming your life with new experiences you can share with friends. And you can do it almost anywhere there is water. Start learning online and get ready to take your first breaths underwater! For specific costs, ask at the PADI Dive Center or Resort where you’d like to get certified. All PADI Dive Centers and Resorts are independently owned and operated, and prices can vary depending on location, class size and other factors.
Some questions you may want to ask are:
- Are the course materials included in the price?
- What personal dive equipment am I required to have?
- Is rental gear included?
- Are there any additional fees such as a boat fee or certification fee?
- How many student divers will be in the course?
- Where will open water training dives take place? |
We invite you, and grant our full permission for you to use the Aries graphics/images below on your pinterest page(s).
Although astrology itself originates in Babylon, it is the Egyptians who are credited with first associating the ram with the Aries constellation and zodiac sign. The exact reason that ram has come to symbolize the sign of Aries remains elusive. Although the correlations between this headstrong and charging symbol of the ram and the characteristics of the zodiac sign are obvious.
In Greek mythology, the Aries ram is known for rescuing the twins Phrixus and Helle. Phrixus and Helle were the children of King Athamas and the goddess Nephele. Their stepmother was about to have them executed when a ram of golden fleece swept down from above and rescued them. Helle eventually fell from the ram and drown, but Phrixus lived and sacrificed the Ram to Zeus. The ram became the constellation of Aries, and his "golden fleece" became the impossible quest of Jason and the Argonauts.
The Aries glyph clearly represents the curled horns of the great ram as well. |
HENRY REYNOLDS. Australia Day or dying in a ditch for January 26.Jan 26, 2020
Australia Day divides rather than unites the community which we presume is the key reason for having a national day in the first place.
It is clear that a substantial majority of Australians want to have a national day when they can celebrate both our history and our way of life. Which day is chosen is less important. Even among those who are presently in favour of January 26 many are not sure why that day has been sanctified. But it is equally clear that there is a substantial minority which will fight desperately to retain the status quo despite the inescapable evidence that every year opposition grows. The dissident case has been clearly articulated. But the reasons for clinging so tenaciously to the 26th are less apparent. There is obviously much more at stake than meets the eye. An outsider would say the passion is misplaced, that to continue with a day that is now so divisive is counter- productive. It divides rather than unites the community which we presume is the key reason for having a national day in the first place.
The conservatives, it seems, are willing to die in a ditch for January 26th. They see it as an important battle in the fighting retreat of the Anglo-Australians who fear that the historic ties with the old homeland are withering away. That concern is unexceptional but irritating for the rest of us because it is premised on the idea that uncritical anglophilia is an essential part of Australian patriotism. But even more perplexing is the belief that the most appropriate way to commemorate the historic ties with Britain is to remind us all both about what happened in 1788 and what Britain itself was like at the time.
Some of the defenders of the day seem to think that many of our most valued customs and institutions arrived with and were unpacked by Arthur Phillip, things like the rule of law and the so called Westminster system. But the Britain of the late C18th was governed by a tiny, grossly rich oligarchy of the aristocracy and the landed gentry. The representative institutions had been created to allow the landed elite to share power with the Crown. Less than 3% of the population of England and Wales were represented in the parliament and an even smaller percentage in Scotland. The rule of law meant laws above all drafted to protect the property of the elite from the Crown above and the great bulk of the population below. The convicts, our founding mothers and fathers, had been wrenched from their neighbourhoods, their friends and family and their homeland overwhelmingly for petty theft. Property was more precious in the common law than life itself. And in 1788 Britain was still a major practitioner in and beneficiary of the slave trade. What, we might reasonably ask, do our Anglo-Australians find so appealing in all this? Perhaps when they romanticise C18th Britain they see visions of Gainsborough’s morning walk painted the year before the First Fleet set sail.
But that is only a small part of the infamy which the British brought with them in 1788. Phillip carried in his dispatch case his official instructions, formally read on 7th of February, which contained the prospective death sentence for thousands of Aborigines. The egregious nature of the British behaviour was for so long overlooked it needs some explanation. There was no recognition of either the sovereignty or the property rights of the First Nation over the eastern half of the continent. This departed radically from what had taken place in North America for at least a hundred years. It had no justification whatsoever in the international law of the C18th. In 1791 Jeremy Bentham remarked that the failure to conclude treaties in Australia was a fatal mistake that would never be remedied. Without the capacity to negotiate legal agreements the only resolution available was armed conflict as was seen in Phillip’s decision in December 1791 to send out the first punitive expedition in order ‘ to convince them of our superiority and to infuse an universal terror.’ What a truly terrible portent that was.
Sovereignty was one thing , property was quite another. And here the British behaviour was even more extreme. The Crown expropriated the homelands of the First Nations over a vast area involving people who would not see their first white man for many years to come .Historically this astonishing land grab was explained, if not justified, by the assertion that the Aborigines merely ranged over the land but were never in permanent occupation of any specific place. A specious argument of course and it all fell to pieces in 1992 when in the Mabo judgement the High Court declared that in 1788 the First Nations were both the owners and occupiers of their traditional lands. After that only one interpretation was possible. In 1788 the British Crown expropriated half a continent without any reparation. And the Aborigines had legally become British subjects at precisely the same time they were being robbed. Nothing could be more contrary to the central tenets of the common law which from as far back as Magna Carta had protected the property of the subjects from what was termed the inundation of the prerogative. It is hard to find comparable cases of the outright, instant pillage of private property. Lenin’s expropriation of all property in 1917 might be the closest example or the dispossession of Jewish landowners across many parts of Central Europe in the 1940’s.
One can only wonder how conservative Australians want every year to remind us of these infamous events. They were clearly far from Britain’s best moments. To make matters worse they adopt a pose of moral indignity when increasing numbers of us want to have another day to reflect on our shared history. And it is much more than an issue for the indigenous community. We should all be outraged about what happened at Sydney Cove in that short period between 20th January and the 7th of February. The most charitable interpretation we can make of those culture warriors who are determined to die in a ditch to defend the indefensible is that they don’t really know much about Australian history. |
|Team America: F- Yeah!!|
|Locke: a goofy looking dude|
|Hume rocking a sweet 'do|
Hume believed that all knowledge should come from experience or logical deduction. Religion cannot be proven by either method. But importantly, he did believe that where religion failed, nature nevertheless provided us with the good sense to make our way in the world. Our human natures provide us with the moral compass to behave reasonably towards one another. This idea that humans have a "built-in" sense of justice, altruism, and good behavior is supported by both evidence and intuition.
Locke was Hume's contemporary. Locke's ideas were so revolutionary at the time that he made nations tremble, and yet today they seem so ingrained in us that we don't even question them. To me, that is the ultimate testament and power of a great idea. He proclaimed that humans have something called "inalienable" rights. We are born with certain liberties like the right to own property, freedom of expression and religion. These are rights which can never be granted by some king or ruler, they are "natural." Along with Rousseau and later Kant, these Enlightenment philosophers stated that the very purpose of government was to "serve the citizens"! Rule was not granted by divine right or by superior strength, rather it was given by the will of those governed. This was the birth of the concept of the "Social Contract"--that a government existed only within the framework of a "contract" to the society it oversees.
|Not just ink and paper|
"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are life, liberty and the pursuit of happiness. That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed. That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn that mankind are more disposed to suffer, while evils are sufferable than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."
What hope and naked optimism it symbolizes for our human race! It is truly a masterpiece of the Enlightenment, the first genuine instance of a Social Contract. In a tragic twist of irony, David Hume passed away that same year: 1776.
|Guillotine: not just a WWF move|
"How consoling for the philosopher who laments the errors, the crimes, the injustices which still pollute the Earth and of which he is often the victim, is this view of the human race, emancipated from its shackles, released from the empire of fate and from that of the enemies of its progress, advancing with a firm and sure step along the path of truth, virtue, and happiness."
I imagined Antoine laying in his cell facing death, somehow still having faith in us. Perhaps it is a good thing he was not around to witness the World Wars, genocides, nuclear bombings, and terrorism. The Age of the Enlightenment was forever destroyed in the pointless trench warfare of WWI, where about millions of terrified soldiers were annihiliated by the new invention of the machine gun. Somehow, despite it all, I still share Antoine's hope. Someone (for once Google failed me) once said that humans are good. It is humanity that is evil. What is meant by this of course is that the average citizen is a decent human being, but when they mass as a populace they relinquish tremendous authority to a few individuals at the top, who inevitably become corrupted by this power.
How many socialist revolutionaries who promised wealth and equality to the poor came to power only to stagnate into corrupt dictators? The list is too long, from Lenin to Castro to Mubarak. Yet today, the power of the internet and social media has allowed individuals greater access and opportunity then ever before to break through censorship and bureaucracy. It is more difficult than ever for governments to deceive and bully their own people. Thus perhaps, just maybe, we are entering a new post-modern age. An age that might make Antoine smile. |
ABOUT THE RULE OF LAW
Although it was a 19th century British jurist, Albert Venn Dicey, who coined the phrase “rule of law” the concept is an ancient one. The philosopher, Aristotle, said “Law should govern.”
“The rule of law is the underlying framework of rules and rights that make prosperous and fair societies possible. The rule of law is a system in which no one, including government, is above the law; where laws protect fundamental rights; and where justice is accessible to all.”
RULE OF LAW AND CIVIL SOCIETY
The history of liberty, as the American jurist Felix Frankfurter noted, is largely synonymous with the history of fidelity to the rule of law. Without just and binding laws, society devolves into authoritarianism or anarchy, sweeping aside the institutions that would otherwise protect ordinary people from capricious rulers or unreasoning mobs.
This fundamental principle is often overlooked. When Western leaders and journalists speak of brutal regimes, they talk of repression and of corruption and of the need to spread democracy. Yet democracy has never taken root where the rule of law is honored in the breech. Without it, there is no foundation for free and fair elections, much less basic human rights. There is also no bedrock on which to build a civil society. Denied equal justice before the law, ordinary people turn inward or, if outward, on each other. Even economic relations flounder in the absence of the rule of law.
One person who recognizes the rule of law’s centrality is Beatrice Mtetwa. Her arena is Zimbabwe but her message is universal: the rule of law is the foundation for the advancement of democracy, human rights, social harmony, and economic development.
Jestina Mukoko is director of the Zimbabwe Peace Project who was abducted and tortured by the Mugabe regime. For the first three weeks of her 89-day detention, her whereabouts were unknown and many feared she had been killed.
Elias Mudzuri is the first member of the opposition party, the Movement for Democratic Change, to be elected mayor ofHarare, Zimbabwe’s capital city. Within a year of his election, he was arrested and beaten by Mugabe’s police.Four months later, the Mugabe government locked him out of the mayor’s office.
In Zimbabwe, the rule of law has been, “mutilated,” according to Beatrice Mtetwa. The country’s constitution has been amended 17 times, laws are selectively intrepreted depending on one’s political affiliation, and judges often rule to support the agenda of Zanu-PF, Robert Mugabe’s ruling party. Human rights abuses are rampant and often occur without consequence. |
2020 turning into 2021 means new years resolutions for students following the tradition of the New Years. However, some of these goals never make it past January or February.
Ashlee Robbins, Snow College sophomore, shares her previous and this year’s goals when saying, “Last year I set a goal to read the Book of Mormon and I did and then I set a goal to work out 5 times a week and I did that till the end of summer and then stopped. This year I set a goal to set more goals and to drink more water and become flexible.”
According to Dr. Charles Herrick, Chair of Psychiatry, Nuvance Health, in his article “Why we make (and break) New Year’s resolutions, and 4 tips to help you achieve your goals’ he writes, “Research shows that as many as 50 percent of adults in the United States make New Year’s resolutions, but fewer than 10 percent keep them for more than a few months.”
Dr. Charles Herrick goes into three different psychological related issues people have when it comes to keeping goals;”difficulty breaking old habits, focusing on specific outcomes, and problems with purpose.”
A new goal insists on new behavior or new habits. Breaking old habits is the key to creating new ones and achieving a goal.
While it is taught that having specific goals are important, looking for specific outcomes will hinder your ability to reach an end goal. Celebrate the little success all the way to help stay motivated.
Student’s lives are filled with things like social life, homework, or sleep. If a goal is not more important than an individual’s daily needs than purpose will be lost when prioritizing.
Despite the challenges of setting goals, Sadie Arnold, Snow College student states, “In the past, I’ve made very standard resolutions, like working out a few times a week, or eating better, or even getting eight hours of sleep. Usually I do pretty well within them too but I can’t say that I’ve ever gone one full year staying completely consistent. This year I’ve actually decided to do something a little different. My resolution for this year is to be a better person than I was the day before. To be a little kinder, more loving, more empathetic, and more positive. I hope to fulfill my resolution for this year because it’s something I know I can do as well as make me a better person.”
With January gone, look for personal ways to help stay motivated and keep the new year goals that have been set. |
(Seattle Times) What does going back to school mean? It means new clothes, new notebooks, new teachers and new friends. And it means homework.
During the school year, kids have a lot to do. After-school sports, music lessons and doing things with friends and family all take up time. Then there’s that history assignment to finish – and the math problems to solve, and the spelling words to memorize. Sometimes it feels like there’s no time left just to do nothing.
Even though there are so many demands on kids’ time during the school year, they do manage to squeeze in lots and lots of hours of one particular activity, experts say. That activity can get in the way of your homework, your friendships, your time with your family. And it can keep you from getting the exercise you need.
What is it? Watching TV.
Studies have shown that kids who are successful in school watch less TV than kids who do poorly. You don’t have to be Einstein to figure out why. It’s hard to get your homework done or to get enough sleep if you’re up until 11 every night watching cop shows.
In addition, many experts worry that seeing all the violence that’s shown on TV can disturb young children. It can make them more aggressive than they night be otherwise. It can make them think that fighting or using force is an acceptable way to solve problems.
Educators worry because many kids spend as much time watching TV as they do in school. In 1987, a fourth-grade teacher in Hutchinson, Minn., decided to do something about it. Pat Marker had heard about a boy in New Jersey who went for one whole year without watching TV at all. Marker didn’t expect the kids he taught to do that. But he challenged his students to turn off the tube for 30 school nights. Nineteen kids did it. Marker called them the “TV Busters” and held a party for them.
From there, Marker’s idea grew. The next year, 101 kids became “TV Busters.” In 1989, more than 750 kids in several different elementary schools took part in the program. In 1990, Marker expects even more kids in Minnesota schools to become “Busters.”
If you’re a Buster, you don’t have to give up TV altogether. But you agree to keep the set turned off on school nights (Monday through Thursday) for 20 nights. There are exceptions: You can watch the Discovery channel, the news, or public television – but you have to have your parents’ permission to watch those shows. On weekends, you can watch anything you want to.
TV busters fill out daily slips reporting on what they do each night. Parents have to sign the slips each night. At the end of the five-week program, kids earn prizes.
Marker says his mission is not to wipe out TV watching entirely. But he’d like kids to become TV viewers who choose to watch, not just viewers who turn on the set and stare at whatever’s there.
Without TV, what are you supposed to do at night? Marker has some suggestions:
— Read a book.
— Talk to your parents.
— Read the newspaper.
— Listen to the radio.
— Play with friends.
— Try a new recipe.
— Draw a picture.
You probably can think of other nontelevision projects yourself.
Studies have shown that when families limit TV time, good things happen. Kids spend more time with the adults in the family – and do more helping out around the house. Kids read more, play more imaginative games, spend more time outdoors and get more exercise.
What are your family rules for TV watching? Do you limit the number of hours the TV is turned on? Do you read the TV listings and make choices about what to watch and what to skip? The Center for Media and Values in Los Angeles suggests that families plan TV program selections in advance each week. The center also advises parents to watch TV with their kids – and to talk over what they see.
Television isn’t all bad, of course. There are lots of great shows. By watching TV, you can find out what’s going on in the world. You can learn about science, nature and art. And watching TV can be an activity that families share. The trick is to make sure you control the TV – not the other way around.
Tips for parents: For more information about Minnesota elementary schoolteacher Pat Marker’s “TV Buster” program, you can write to him at Park Elementary School, 100 Glen St. S., Hutchinson, Minn. 55350. Teachers can order a starter kit containing a description of the program by sending $2 to cover postage and handling.
Worried that your kids will whine, “There’s nothing to do,” when you turn off the tube? Arm yourself with “The Kidfun Activity Book” by Sharla Feldscher and Susan Lieberman (Harper & Row; $6.95). The book lists 250 easy activities for kids aged 2 1/2 to 8. All of the projects can be done with stuff you have around the house.
(Copyright 1990, Catherine O’Neill)
“How and Why” by Catherine O’Neill appears Mondays in the Scene section of The Times.
Monday, September 10, 1990 – Page updated at 12:00 AM
`TV Busters’ Cut Down On Tube Time
By Catherine O’neill |
The boats are sometimes called vogue canoes (or bogue in Caiçara pronunciation), vogue being the term for paddling, the stroke or rhythm of paddling, or the paddler who calls the stroke. Smaller caiçara canoes, like those shown in my previous post, are usually built from softwoods like guaperuvu (Schizolodium parahybum), while larger ones – up to 40 feet long! – make use of more rot-resistant woods like jequitibá , and oars (paddles?) and other components are made of jacatirão (Tibouchina pulchra), massaranduba (Mimusops brasiliensis) and caixeta (Tabebuia cassinoides).
The rowing canoes of this size are propelled by a team of several paddlers, using even sailing gears, when it has a mast fixed on the front of the vessel. As the vogue canoe has no keel, the sails (which could reach the number three) are used only with winds from the stern of the vessel.
People could spend a week to go and return to Santos, depending on the conditions of the ocean and the winds. Most of the farming production and the cachaça (sugar cane
rum) of the northern coast was shipped by this type of vessel.
From the 1920s, the vogue canoes began to be moved by motors.
It's interesting that these boats, which are reportedly very unstable, were used for coastal freight carrying, and under sail. The strikingly colorful paint schemes, as shown above and in the previous post, seem to be characteristic of the craft. For more nice photos like the one above, and text in Portuguese, see this page from the Oceanographic Institute of the University of São Paulo.
Addition to previous post: photos were taken by Fernando Costa |
Synthetic drugs, also known as designer drugs, are chemically created and designed to mimic the effects of other well-known substances. Since they are typically created in clandestine labs, however, and the manufacturing processes and ingredient are not regulated, they can be some of the most dangerous drugs in the world.
Despite the fact that many of these drugs can cause psychotic episodes, paranoia, aggression, and even suicidal or homicidal tendencies, synthetic drug use is increasing. Although extensive efforts have been made to combat the invasion of these drugs throughout the United States and many other countries, these synthetics are often so addictive that people continue to use them despite the damage they cause. In a 2016 poll, more than 95 percent of emergency room physicians reported that the number of individuals that they had treated for the effects of synthetics had either remained the same or increased between 2014 and 2015. Almost 90 percent said they had seen a variety of violent acts associated with the use of synthetic drugs.
Types of Synthetic Drugs
As the war against synthetic drugs rages on, new- and sometimes even more dangerous- versions are being introduced into communities all over the world. There are currently more than 200 synthetic drug compounds that have been identified, and over 90 synthetic marijuana compounds. Some of the more common synthetic drug compounds include:
- Synthetic Marijuana: Also known as K2, Spice, and other names, synthetic marijuana compounds are designed to produce many of the same effects as regular marijuana. Instead, users report that the effects are often much stronger and have a faster onset. These compounds have reportedly caused numerous physical health conditions as well as psychological problems. Recent studies indicate that about 11 percent of high school students have used K2 or Spice in the last year.
- Synthetic Cathinones: More commonly referred to as “bath salts”, these drugs are actually designed to mimic the effects of methamphetamine or cocaine. Not to be confused with the bath salt products people use for bathing, people typically use these drugs by snorting, swallowing, injecting, or smoking the crystal-like powder. In addition to strokes and heart attacks, synthetic cathinones can cause psychosis and violent behavior that can lead to suicide and criminal charges like assault or murder.
- Synthetic LSD: Known as “n-Bomb” or “Smiles”, these drugs cause hallucinations and paranoia similar to LSD. Their use has caused fatalities in recent years. |
Trademark is any design, word or phrase that uniquely identifies your company's goods or services. Trademark rights attach when you are the first to use the mark in commerce, or when you register a mark with your state or federal trademark office. Registration bolsters trademark protection and allows the holder to sue infringers in federal court. Actively policing a trademark is necessary to ensure it is not deemed invalid.
Trademark rights can last forever, as long as you continue to use the mark in connection with goods or services in commerce. Courts deem a trademark to be lost through abandonment if the holder does not use the trademark for three consecutive years. Actively managing trademarks to ensure they are publicly used on an ongoing or periodic basis can prevent the trademark from being canceled due to non-use.
A trademark can be lost due to genericity, or the process of becoming generic over time, if the owner doesn't promptly object to people using the mark as an ordinary verb or noun. Terms like "thermos," "aspirin," and "cellophane" were once corporate trademarks, but lost their trademark status once the terms passed into the general public lexicon. Courts include the degree to which a trademark owner has policed her trademark as a factor considered when determining whether trademark protection should be voided due to genericity.
Failing to police your trademark can result in losing the right to bring a lawsuit for infringement against someone who is using a similar mark. Delay in filing infringement lawsuits when you are aware someone is using your trademark gives rise to a legal concept known as "laches," which effectively means that you are locked out of asserting your rights for failure to act in a timely fashion. Courts consider the level of diligence you exercised in protecting your trademark as one element considered when determining whether you are precluded from prevailing in an infringement lawsuit.
Economic Losses and Damages
Failing to adequately police your trademark can result in a loss of business income, as consumers become less able to distinguish your products from those of your competitors. Failure to actively promote and protect your trademark can also result in an inability to secure damages in trademark enforcement lawsuits based on dilution -- using a similar trademark on different products that diminishes the distinctive quality of the mark. To secure damages in a dilution suit, the trademark holder must demonstrate their mark was famous by showing how the mark was extensively used and advertised.
References & Resources
- U.S.Patent and Trademark Office: Trademark, Copyright or Patent?
- Harvard University: Overview of Trademark Law
- Steptoe and Johnson LLP: Trademark Enforcement
- Scott and Scott, LLP: The Doctrine of Laches Can Make Trademark Enforcement a Tricky Business
- International Trademark Association: Trademark Portfolio Management Strategies
- BitLaw: Trademark Dilution
- Brand X Pictures/Brand X Pictures/Getty Images |
|Does this frighten you?|
|This is a picture of the Crab Nebula, which is the remnant of a
super-nova that exploded in 1054.
Astronomer David Morrison, Senior scientist with the NASA Lunar Science Institute, coined the term 'cosmophobia'1 after answering questions at the NASA "Ask an Astrobiologist" page. He defined it as "An unreasoning fear of the cosmos", and created a short list of items that people are worried about.
A presentation at the Astronomical Society of the Pacific's annual meeting in Tuscon in August 2012 was titled "Doomsday 2012 and Cosmophobia: Challenges and Opportunities for Science Communication" and is available for viewing via NASA's website.
This site grew out of the 2012hoax website, at the end of 2012. It was felt that despite the fact that 2012 had ended without the various predictions of doom and destruction the resources gathered under the 2012hoax website would still be necessary in the future. Many of the predictions made about 2012 originated well before 2012, and would continue to be claimed well after 2012.
This site will deal with various claims that invoke 'cosmophobia', where the fear factor is pumped up in claims in order to make something fairly mundane sound sinister and threatening. In addition to claims made about astronomy, we will also look into claims touching on other fields of science such as geology and vulcanology. We will approach all claims from a perspective of skeptical inquiry. The claimant must provide evidence that supports their claims, and extraordinary claims will require extraordinary evidence. |
The most basic thing to know about the ketogenic diet is that it gets the body burning fats for fuel instead of carbohydrates (when followed properly). But how? Let’s break it down:
Burning Fat for Energy
When the average person eats a meal rich in carbs, their body takes those carbs and converts them to glucose for fuel. Insulin is then made to move that glucose into the bloodstream. Glucose is the body’s primary source of energy when carbohydrates are present.
However, things are different on keto. On the ketogenic diet, your carbohydrate intake is kept very low—so when those carbs aren’t present, your body must utilize another form of energy to keep things ticking.
That’s where fats come in. In the absence of carbs, the liver takes fatty acids in the body and converts them to ketone bodies, also known as ketones, as an energy source. This process is known as ketosis, and the goal for those on the ketogenic diet is to enter ketosis.
Contrary to popular belief, ketosis has been around for a very longtime. Man has evolved eating a high-fat, high-protein diet, with the average life expectancy during the Paleolithic period of those past infancy being around 60-70 years of age - which is pretty astonishing considering they had no medicine, or antibiotics etc.
In recent times, ketosis was brought back and used to prevent epilepsy in children. But since then, it’s been utilized for all sorts of reasons. Some of the best and most popular benefits of the ketogenic diet include: |
The methods and means that exist for effective crisis management have become largely inadequate for dealing with some of the catastrophic natural disasters that many countries around the world have been forced to cope with. From the destructive forces of tsunamis in Japan, to the crippling effects of earthquakes that decimated the country of Haiti, assistance came in large part as a result of social media platforms. From the ability to locate missing children, to the efficacy with which they can orchestrate the delivery of essential supplies, many social media platforms have served as the backbone for efforts in providing aid to these ravaged countries. Still, concerns surrounding the reliability of validity of information disseminated in this manner cause many to assert that gravitating towards crisis management policy to this effect is a terrible mistake. Additionally, costs associated with such a shift must be taken into consideration as providing mobile broadband support on a large scale could represent a significant expenditure, even for government financed entities. Ultimately, it seems the bulk of research into social media integration as a means of more effective crisis management presents strong arguments for such shifts in policy.
The twenty-first century affords society myriad opportunities that simply were not available to the masses 10 or 15 year ago. More importantly, the onset and fire-sweeping popularity of many social-media websites such as MySpace, and later Facebook, Twitter, Tumblr, and Reddit, have exponentially impacted the speeds and avenues via which people can communicate with one another. No longer must individuals run to a pay phone and deposit quarters for only a few brief minutes of conversation with loved ones or colleagues. Rather, modern cell phones and other wi-fi enabled devices provide people the opportunity to contact anyone, anywhere in the world, at any time, day or night. While these advances might have inadvertently spawned an entire subgroup of introverted individuals who, rather than socializing in bars or at other local gatherings, would prefer to remain in the solace of their home, the world at their fingertips, such is not the topic of this paper. Instead, this paper examines how the ever-increasingly streamlined processes of broadband communication via cellular networks and the Internet have completely transformed how societies communicate. Moreover, the significance of improvements in the mechanisms and ease with which smartphones provide broadband communications, with respect to many of the most popular social media websites, has a tremendous bearing on the management of emergency situations. In particular, social media platforms provide two significant advantages in the relay of information when compared to their more traditional counterparts.
Historical methods of crisis management have remained relatively constant throughout the past few decades. Inasmuch as they were structured, the management policies that have pervaded crisis response literature in past years have focused on a few key points. Foremost among the recommendations from experts in the field was the importance of “optimizing access to information”, although this often proved difficult simply as a matter of technological limitation (Adrot & Moriceau 2013). More recently, those in the field of crisis management have emphasized how more readily available, up-to-date, content access can significantly enhance to the efficacy of an organization’s disaster management policy (Adrot & Moriceau 2013). Not necessarily by design, many organizations have recently acknowledged improvements to their policies from the integration of various social media platforms and other public forums of expression.
Enter Social Media. Social media platforms, perhaps more than any other medium, have some distinct advantages in the mass transmission and dissemination of information to the public. One advantage of breaking a news story via platforms like YouTube or Twitter is the almost immediate, and sometimes overwhelming, response often generated from users around the world. For example, events like the genocide in Darfur went largely unnoticed by the general public until celebrity George Clooney and his father smuggled cameras into the region and began posting videos to YouTube. Despite having begun in 2003, the horrors in the Darfur region of Sudan were not widely publicized by the mainstream media in the United States. And when the 3/11 earthquake smashed the shores of Japan, it was through Twitter messages that many of the breaking updates were communicated, with tweets using the word ‘earthquake’ totaling more than 246,000 by the end of the day, Friday (Global citizens 2011). These scenarios demonstrate some of the most relevant benefits of social media platforms as they pertain to handling crises: when utilized correctly, user-driven websites like YouTube and Twitter have the uncanny ability to create widespread awareness of situations that might otherwise never see the light of day. However, such platforms may yet possess an even more valuable contribution to society in the arena of crisis management.
More so than even the ability to generate awareness of crises around the globe, social media platforms greatly accelerate the mechanisms associated with traditional news broadcasting. For example, 30 years ago breaking news was first reported to a news organization from an anonymous caller, or what have you, and then transmitted from the news organization to nearby journalists, assuming they could be located or contacted at all. If there were no affiliates of the news organization nearby, journalists were driven in or flown in to report on the situation. Of course, this was a somewhat lengthy process because once on scene, camera crews still had to setup the necessary equipment and establish connections before the public could be informed on whatever events were transpiring. But with the advent of twitter, a picture taken with a camera phone, along with a heading of 140 characters or less, could be instantaneously translated into ‘news’ in a matter of seconds. One article comments how in recent years, Twitter has emerged a source of news broadcasting that represents the potential for offering detailed, real-time data in times of disaster that is simply beyond the realm of possibility for the more conventional procedures in journalism (Rogstadius et al. 2013). Furthermore, it has been noted that the brevity inherent in Twitter ‘tweets’ compels the user to compose messages that are focused on the most pertinent information and avoid unnecessary fluff (Schultz, Utz, & Göritz 2011). And while in the past, a news station’s number of content subscribers limited the number of people that they could reach, the only constraint to reaching more people on social media websites today is the quality of a user’s, or in this case of news station’s, content. As such, when news of something like the Boston Marathon attack hits social media websites, the response is nothing short of overwhelming, often generating millions of page views and subsequent transmissions in only a matter of hours. In the end, it is these factors of speed and awareness that make crisis management via social media platforms a superior form of management. During times of crisis, people need facts and constant updates, and they need them quickly. In this regard, there are few options for speedily and efficiently communicating major world events that compare with the capabilities of social media platforms.
Benefits of Social Media Integration. The surge in popularity of social media websites like Twitter has contributed infinitely more to society than mere IPO profits or smart opportunities for growth investments. In times of crisis, the delays that result from getting word of recent developments, relaying the information to newsrooms, and finally broadcasting it on television are often far too inadequate to stay abreast of the updates as they come in. As such, social media websites often represent the quickest avenue via which news agencies can quickly and efficiently keep their viewers up to date on any breaking news. In fact, one article from Mnookin and Qu reported one journalist as stating that following the Boston Marathon attack, the ensuing manhunt and updates as to the progress of the search were provided to the public almost exclusively through the journalist’s twitter account (2013). Moreover, the article states that despite the journalist’s experience of having worked in nearly every kind of print outlet, as well as having written for blogs, webzines, and newsweeklies, he felt that the events which transpired in Boston ultimately demonstrated that in certain circumstances, social media simply has no rival in terms of its ability to efficiently and seamlessly update a large audience on breaking news developments (Mnookin & Qu 2013). Still, traditional journalism has its place as another piece from Editor and Publisher relates that when events like this are taking place, old-fashioned newspapers cannot afford to prioritize one method of coverage over the next. The article goes on to assert that coverage via social media platforms is just as important as formal, on the scene interviews and other traditional forms of journalism, even when the latter are not necessarily on par with the time-values of the former (K. 2013). Even before the tragedy of the Boston Marathon though, there were multiple large-scale incidents throughout the world that were largely made public as a result of updates from social-media websites.
The 2010 Earthquake in Haiti represented some of the most innovative strategies in which social media avenues were utilized to facilitate the delivery of essential supplies in the aftermath of the disaster. Specifically, mobile-based texting services were employed to not only bolster the possibility of trapped or stranded individuals finding the means via which to communicate their distress, but also in terms of generating donations to aid in the cleanup of the disaster. In particular, the 4636-texting service, created by Ushahidi.com, was pivotal in the efficient and timely delivery of necessary supplies to local treatment centers, as well as in regard to tracking down individuals who were rendered immobile as a result of the earthquake. One article notes that the texting service operated at such high levels of efficiency that one Haitian clinic received fuel for its generator only 20 minutes after having texted 4636 for help (Mullins 2010). Unfortunately, the social media integration with respect to the crisis in Haiti was not without its mishaps. One such rumor that began to circulate in the days immediately following the quake was that UPS would ship any package under 50 pounds to Haiti for free (Oh, Kwon & Rao 2010). Similar rumors then began to emerge articulating that airlines were also willing to fly, free of charge, any medical personnel who wished to volunteer their services in assisting Haitian medical staff (Oh, Kwon & Rao 2010). Still, while such instances illustrate the potential for the spread of erroneous information, many would argue that the concrete benefits stemming from programs like 4636 far outweigh the potential misunderstandings that might arise between social media followers and airline or parcel companies. Interestingly, the possibility of an earthquake presents an ideal scenario through which to examine many other potential benefits of social media utilization.
A prime example of the benefits stemming from the incorporation of social media outlets during a crisis lie in an examination of what might happen if an earthquake of similar magnitude were ever to strike a major U.S. city. While many people might find themselves trapped beneath the debris of previously standing structures or simply unable to call for help because there is no one around, it is likely that while mobile telephone networks would likely be jammed, most would still be able to get a message out for help in the form of a twitter message or Facebook post (Dawson, Hill & Bank 2013). In fact, multiple studies even went as far as to conclude that because of the widespread success the average person experiences using Twitter during emergency crises, a government priority moving forward should focus on improved integration of social media platforms for crisis management situations (Helsloot & Groenendaal 2013, Ruggiero & Vos 2013). Perhaps in response to such suggestions, the U.S. military decided to expand its communication horizons. In 2010, the Navy, in conjunction with the Department of Defense, contracted San Diego State University to experiment with “coordinated information sharing tools, techniques, and procedures…”a program now known as X24 that has since been implemented in a number of matters of national security (Lundquist 2011). Still, Palen et al. reiterate the imperative that traditional crisis management systems not be completely abandoned, and that a blending of conventional and social media-based management directives is the optimal approach to integrating social media in times of crisis (Palen et al. 2010). Clearly though, it seems a disconnect exists between society’s and corporations’ understandings of the impact of social media integration during such times.
Perhaps the most overlooked aspect of crisis management with regards to social media platforms is the idea that not only do they serve as a means of relaying information from within an organization to the masses, but that it is also highly valuable as a means of channeling information from the masses to those in the journalism industry. As one article puts it, it is important to remember that social media is a two-way road, capable of serving as a means for both outward transmissions of information as well as for receptions of information (Jin, Fisher & Austin 2011). So, while many organizations seem to have adapted quite well to the process of publishing news updates via social media avenues, many have yet to fully utilize the aggregating capabilities of such platforms as relates to information from multiple sources. In analyzing the dynamics of social media platforms though, it is apparent that such platforms are valuable in that they offer the unique combination of information flows from a wide variety of people in a wide variety of places, all of which culminates in a single, organized stream of data.
Another often-overlooked component of the world of social media that might significantly improve the management of crises is the use of wikis. Unlike Twitter or Facebook accounts that allow only one user to post updates and information to his or her account, Wikis allow multiple user posts that other users see as a single fluid collaboration rather than multiple posts from multiple users. More specifically, Phillipe Borremans explains that wikis are simply websites that allows multiple individuals to make edits and revisions via simple word processing programs, all in a secure environment (Borremans 2010). While at first glance it might seem that wikis have only a fraction of the appeal of other social media platforms, in terms of access to a large audience, the fact that multiple users—and by extension, multiple sources of information—can all collaborate and update a single web page, the overall concept of aggregating multiple information streams into a single location tends to hold. In that regard, wikis have the potential to be just as useful as other social media platforms when tragic, catastrophic events threaten the livelihood of large portions of the population.
Ancillary Benefits. Still, even events that may not merit the attention of international journalists still have the ability of garnering the attention of millions through social media platforms. Just a few years ago in early 2011, Twitter activity was largely responsible for the reuniting of missing 16-year old Faisal Fri with is family in India after only three hours of being reported as missing (Smith 2011). According to the article, the boys name and a picture were uploaded to Twitter with the instructions to contact his father (Smith 2011). Even though neither Faisal nor anyone in his circle of friends or family had any contacts in the celebrity or show business world, the tweet to find a missing boy in India actually reached the top of Twitter’s Top Tweet list after a plethora or re-tweets. Other research has concluded that schools might find Twitter particularly efficient when attempting to reach alumni or inform a large number of people regarding potentially tragic situations taking place at the institution, or concerning events that have already transpired, such as the death of a student (Garran 2013). Again, while these situations do not necessarily represent the management of large-scale crises, they nonetheless convey the usefulness of taking advantage of the mass users of social media platforms.
Moreover, websites like Facebook and Twitter have been employed during crisis situations that may not present as much widespread danger to the general public as earthquakes or civil wars, but which still represent a direct threat to the well being of people’s lives. In 2008 for example, a Berkeley photographer detained in Egypt for illegally photographing a protest near Cairo was eventually released after tweeting that he had been arrested to his followers, who then forwarded the information to the university (Perkins 2010). The following year, a pair of girls who found themselves “trapped in a storm sewer” were able to get help by updating the statuses of their Facebook profiles (Perkins 2010). Again, while the systemic danger of such situations in these instances was far less than that associated with more traditional threats to a population’s safety, they still illustrate the benefits that social media integration can provide when incorporated into crisis situations.
An interesting side-effect of the recent trend towards turning to social media websites in an effort to better get a handle on the publicity of crisis situations is the effect that such outpourings can have on those whose responsibility it is to manage such situations. The flooding in 2010 that plagued the state of Queensland in Australia illustrated some of the ancillary effects of social media platforms with respect to how the inflow of information can affect the management decisions and priorities of those in charge. An article from Bussy and Paterson commented on the impacts that public sentiment had on the media outlets in the region, concluding that, rather than the media influencing the agenda of the public, the public was able to influence the agenda of the media using Twitter to aim their discourse at public figures like Premier Anna Bligh and Prime Minister Julia Gillard (Bussy & Paterson 2012). What is most remarkable about the manner in which these events transpired was not that the public was able to sway the agenda of the mainstream media—though this a rather significant accomplishment in and of itself—but that they had done so not with official legislation proposals or petitions with thousands of signatures, but simply by voicing their concerns on a free social media platform. However, as has already been briefly discussed, the incorporation of social media into crisis management policies does present certain problems inherent to the technology.
Disadvantages. Unfortunately, there are instances where social media tends to cloud the situation at hand, rather than providing clarity or promoting any kind of efficient communication. Perhaps the most recent example of this kind of mishap occurred in the days immediately following the bombing of the Boston Marathon when the perpetrator, Dzhokhar Tsarnaev, was able to temporarily allude authorities after the social-media website Reddit mistakenly identified another individual, missing college student Sunil Tripathi, as the bomber (Hodson 2013). Reddit is a website that lets registered users submit links to news stories that other users then vote ‘up’ or ‘down’ to determine the link’s ranking on the news home page. However, after the bombing of the Boston Marathon, it served as a means of obstructing justice when its users misidentified the individual, they believed was responsible for the attack. While this is one of only a handful of instances where social media worked against the efforts of law enforcement and other concerned citizens, it still highlights a considerable risk of implementing such unorthodox mechanisms of crisis management, despite the well-intentioned efforts of the users responsible for the ordeal.
In assuring that social media platforms are properly utilized there is another component that must be addressed. In order to avoid some of the mistakes associated with social media misuse during the Boston Marathon attack, Veil, Buehner and Palenchar in their 2011 article elaborated on 11 steps administrations should adhere to when employing social media platforms during times of crisis (Veil, Buehner & Palenchar 2011). Among them, taking measures to ensure that only the most credible sources are shared or followed, as well as understanding that social media is neither a Panacea nor a novel means of communication are some of the most important things to take into consideration in determining whether or not to utilize such methods of communication (119). Other research commented on the managing capabilities inherent in social media platforms, as speedy updates via Twitter can serve as a means of relaying mass instructions, or adjustments to previous posts, in addition to providing more efficient means of news coverage (Veil & Ojeda 2010). This notion was corroborated in an article from Schmidt and Chase that noted the importance of organizations monitoring social media feeds for any information that is incorrect or otherwise incomplete as concerns their organization (Schmidt & Chase 2013). While access to the perspectives of millions of individuals regarding crisis developments can be invaluable, there are certain drawbacks in relation to the factual nature of such information that necessitate investigation.
Additionally, while the benefits of social media implementation can be far-reaching, there also exists a distinct possibility that employing such avenues of communication might backfire, and should such consequences materialize, the damages can be quite catastrophic. Put frankly, one article articulates that in the digital world, bad news travels fast, so once a news story breaks on the web there can be challenges in maintaining control of the situation, especially if the information is inaccurate (Boeri 2013). In China in 2012 for example, a fire that killed ten people was touted as having a much higher death toll when users of Weibo flooded the social media website with speculation about the validity of such claims (Denis-Remis, Lebraty & Phillipe 2013). Elaborating on this dynamic though, Boeri suggests that organizations implement a RACI matrix concerning social media integration, where people are identified as Responsible, Accountable, Consulted, and Informed in relation to a given crisis, as well as concerning the implications of opting to exploit social media platforms (Boeri 2013). The premise behind such programs is that many times, suggestions for implementing various forms of social media websites in the handling, maintenance, or resolution of a given crisis situation are often provided without any substantial evidence as to their efficacy. Because social media is simply “in” at this juncture in the 21st century, recommendations might be issued on the basis that ‘eveyone is using it’, rather than providing concrete, evidence-backed research confirming or disaffirming the potential for improvement of incorporating such means of communication. This is neither an appropriate suggestion in professional settings nor a respectable one when such matters pertain to the well being of hundreds or potentially even thousands or tens of thousands of people’s lives.
Ultimately, the efficacy, efficiency, and applicability of social media platforms in relation to the management of crises is a discussion that is far reaching and not quite yet definitive concerning the net benefits or drawbacks of such policies. While many of the benefits of implementing a management strategy that takes advantage of social media platforms have been herein elaborated on, there are many facets of such a process that must be better examined to determine whether advantages outweigh potential costs, both from a managerial perspective as well as from a monetary standpoint. While indeed many of the aforementioned platforms are free to users around the world, there are costs associated with implementing such platforms on a company-wide, statewide, or national scale.
Additionally, further research should explore the possibility of implementing social media websites into the structure of crisis management processes with respect to how it might ultimately affect the efficacy and economic stability of organizations. For example, while there are few who can contend with the benefits of integrating social media platforms like Twitter into crisis management processes, many questions to what degree such implementations should be integrated. Whether such platforms should replace the primary methods for handling crisis situations or simply compliment the existing structures is a question that has yet to be determined. Furthermore, the costs associated with providing members or volunteers mobile cellular means of communication might represent a cost to that is simply infeasible for organizations like The Red Cross or F.E.M.A, even despite their national funding. Ultimately though, research is strongly inclined towards a more mainstream integration of social media platforms to aid in the management of crisis situations on local, national, and worldwide arenas.
Adrot, A., & Moriceau, J. (2013). Introducing Performativity to Crisis Management Theory: An Illustration from the 2003 French Heat Wave Crisis Response. Journal of Contingencies & Crisis Management, 21(1), 26-44. doi:10.1111/1468-5973.12011
BOERI, R. (2013). Preparing for the Next Social Media Crisis. Econtent, 36(6), 25.
Borremans, P. (2010). Ready for anything. Communication World, 27(4), 31-33.
Bussy, N., & Paterson, A. (2012). Crisis leadership styles-Bligh versus Gillard: a content analysis of Twitter posts on the Queensland floods. Journal of Public Affairs (14723891),12(4), 326-332. doi:10.1002/pa.1428
Dawson, D., Hill, S., & Bank, R. (2013). Use Social Media for Crises. U.S. Naval Institute Proceedings, 139(10), 77-81.
Denis-Remis, C., Lebraty, J., & Philippe, H. (2013). The 2008 Anti- French Demonstrations in China: Learning from a Social Media Crisis. Journal of Contingencies & Crisis Management, 21(1), 45-55. doi:10.1111/1468-5973.12010
Garran, C. (2013). A death at school: What school leaders should do. Phi Delta Kappan, 95(4), 18-22.
Global citizens, marketers rely on social media after Japanese quake. (2011). Advertising Age, 82(11), 2-21.
Helsloot, I. & Groenendaal, J. (2013). Twitter: an underutilized potential during sudden crises? Journal of Contingencies and Crisis Management, 21 (3), pp. 178--183.
Hodson, H. (2013). NOWHERE TO HIDE. New Scientist, 218(2914), 8-9.
Jin, Yan, Brooke Fisher Liu and Lucinda L. Austin. "Examining the Role of Social Media in Effective Crisis Management: The Responses Effects of Crisis Origin, Information Form, and Source on Publics' Crisis Responses." Communication Research, 41. 1 (2014): 74-90. Print.
K., A. A. (2013, May). When tragedy strikes, reporting shines. Editor & Publisher. p. 4.
Lundquist, E. (2011). Crisis Tool. Sea Power, 54(2), 10-14.
MNOOKIN, S., & QU, H. (2013). ORGANIZE THE NOISE. (Cover story). Nieman Reports, 67(1), 26-30.
Mullins, J. (2010). How crowdsourcing has helped in Haiti. New Scientist, 205(2745), 8-9.
Oh, O., Kwon, K. H. & Rao, H. R. (2010). An exploration of social media in extreme events: rumor theory and twitter during the haiti earthquake 2010.
Palen, L., Starbird, K., Vieweg, S., & Hughes, A. (2010). Twitter-based Information Distribution during the 2009 Red River Valley Flood Threat. Bulletin of The American Society for Information Science & Technology, 36(5), 13-17.
Perkins, B. (2010). Social Media to the Rescue. Computerworld, 44(17), 16.
Rogstadius, J., M. Vukovic, C.A. Teixeira, V. Kostakos, E. Karapanos and J.A. Laredo. "CrisisTracker: Crowdsourced social media curation for disaster awareness." 57. 5 (2013): 4:1-4:13. Web.http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6601695&isnumber=6601632.
Ruggiero, A. & Vos, M. (2013). Terrorism communication: characteristics and emerging perspectives in the scientific literature 2002--2011. Journal of Contingencies and Crisis Management, 21 (3), pp. 153--166.
Schmidt, O. S., & Chase, D. L. (2013). Communicating inside and out. Communication World, 30(9), 14-18.
Schultz, F., Utz, S., & Göritz, A. (2011). Is the medium the message? Perceptions of and reactions to crisis communication via twitter, blogs and traditional media. Public relations review, 37(1), 20-27.
Smith, C. (2014). Twitter helps find missing child--in just three hours. [online] Retrieved from: http://www.huffingtonpost.com/2011/04/07/twitter-finds-missing-child-faisal-fri_n_846416.html [Accessed: 8 Mar 2014].
Veil, S. R., Buehner, T., & Palenchar, M. J. (2011). A Work-In-Process Literature Review: Incorporating Social Media in Risk and Crisis Communication. Journal of Contingencies & Crisis Management, 19(2), 110-122. doi:10.1111/j.1468-5973.2011.00639.x
Veil, S. R., & Ojeda, F. (2010). Establishing Media Partnerships in Crisis Response. Communication Studies, 61(4), 412-429. doi:10.1080/10510974.2010.491336 |
You get into a discussion with a friend, and he tells you about all the new technology his company has installed, or worse yet, he has installed at his residence. He starts throwing around a bunch of tech terms and acronyms, and you have no idea what he is talking about. You feel… well, stupid.
Well, hopefully, we can help you get back on track with this little guide. We can’t cover everything, but hopefully we’ll give you enough of the basics to avoid that “deer in the headlights” look (and your embarrassment 🙂
Let’s start with the basics. (This is very basic, but hopefully will provide a good foundation).
What is the Internet?
In 1960, J.C.R. Licklider envisioned a network of computers could share data simultaneously. The concept was picked up by the U.S. Defense Department, and a branch called DARPA hired him to get the ball rolling.
During the 60’s and 70’s, many different kinds of computer networks were developed, but there was no consistent way for very large groups of computers to communicate. So, DARPA teamed up with researchers at Stanford University and created something called TCP/IP.
What is TCP/IP?
It is a communications protocol. Think of it like the protocol we use to make a telephone call – first we dial a unique set of numbers, the telephone on the other end rings, someone answers the phone, and a communications link is established.
The same thing has to be done for the internet to function. Millions of “calls” have to be made every second, and the computer being “called” has to answer in order for communication (sharing) to commence.
A brilliant man named Vincent Serf wrote the “Specification of Internet Transmission Control Program”, which eventually became the protocol known as TCP/IP.
Was that the birth of the Internet?
Not as we know it today.
Initially, most computer networks were private. Data was routinely transferred within these private networks, and sometimes people outside these networks were also allowed data access with specials credentials (use names, passwords, etc.).
By the 1980’s, however, many public networks had been created – usually by computer enthusiasts – and people started organizing data for easy data retrieval (search engines, directories, etc.). And, of course, the first internet entrepreneurs found out money could be made. The genie had been released 🙂
What is broadband?
Broadband is a generic term that describes having an on-ramp to the information superhighway, and how many lanes that on-ramp has.
Before you can connect to the internet, you need come sort of connection. Most residential connections are in the form of dial-up, ISDN, DSL, or cable; with each having progressively more data capacity.
Commercial entities generally require even more capacity, and therefore have access to plans that provide greater “bandwidth” (or increased “broadband”).
What is ethernet?
When a group of computers are connected together in a “local area network” (or LAN), the connection is called an ethernet. Ether is the name coined at one time to describe the medium in which light travels. Robert Mecalfe, one of the developers of network protocols, thought the name sounded cool.
ethernets can be configured with either cables connecting one computer to another, or with some form of wireless transmission (or “wifi”). The latter is much more true to the original idea of “ether”.
If you are connected to the internet via DSL or cable modem, you are part of a LAN (between your computer and your router).
What is a modem?
Initially, most people connected to the Internet using “dial-up”. This was just like making a phone call – first your computer called a special phone number, the computer at the other end answered, and communication was established.
However, there was a problem. Phone lines in those days were analog, and computers speak digitally. There had to be something in place to “translate” digital information to analog and back again. A device that “modulates” and “de-modulates” (MoDem) allowed the computers to talk over regular phone lines.
Eventually, phone companies started installing digital phone lines in order to eliminate this step, and to increase communication speeds dramatically.
What is a router?
This has nothing to do with wood. A router is a device that attaches between your computer and the internet connection, and makes sure what is sent or received gets to the correct destination.
You could think of it like a telephone switching station. A call comes in directed at a certain target telephone number, and the switching station re-directs it to the right receiving telephone. Sometimes the switching takes place multiple times until the intended phone is reached.
The same thing occurs over the internet. Data is transmitted in “chunks” called “packets” from one IP address to another. It is the Job of the router to make sure the packets arrive at the right place at the right time.
A broadband router can also send and receive data for more than one computer at a network IP address. This is also called a “hub”.
What is an IP address?
It is the unique identifier of your computer, and anyone else’s computer for that matter. IP addresses are similar to phone numbers in that they have segments that aid routers in their Job of re-transmitting data.
An IP address looks something like ‘123.456.78.910’. Each part has a specific meaning that all routers “know”.
What is VOIP?
VOIP is a term that means “Voice over Internet Protocol”. It is a telephone device that is essentially the reverse of a modem – it takes an analog signal (your voice), makes it digital, and then returns it back to analog at the destination.
We’ve come full circle with VOIP. Instead of worrying about how to transmit digital data over old-fashioned analog lines, now we worry about how to transmit analog data over digital lines. Funny, huh?
What is a T1 line?
Pretty much the ultimate internet connection.
It is a high speed internet connection that uses “fiber optics” instead of wiring. It is capable of transmitting many, many times the data, in digitized form, as standard copper wiring.
If a copper line carries 30,000 bits of data, a fiber optic line can be measured in the millions of bits. It also has the capability to carry multiple transmissions simultaneously. This is how a single voice line can be used for both voice and digital transmissions.
How can I find the best internet setup for me?
A number of companies have cropped up over the years who provide help for Consumers and businesses seeking the best connection solutions. The best ones are, of course, internet based 🙂
And example of one such company is “T1 Texas”, a broadband search engine located in Houston Texas. While they are Texas based, they do offer their services nationwide. |
Inflammation of Appendix is known as Appendicitis.
Appendicitis is one of the causes of serious belly pain. It happens when the appendix, a part of the large intestine, becomes infected and inflamed.
Appendicitis is most common in people between the ages of 10 and 30, although it can occur at any age.
Common symptoms of appendicitis include:
- Pain in the belly. The pain may begin around the belly button.
- Pain in the belly that gets stronger and moves below the belly button to the lower right side.
- Pain that does not go away and gets worse when the person moves, walks, or coughs.
- Pain in any part of the belly or on the side.
- Nausea, throwing up, and not wanting to eat.
- Constipation, back pain, and a slight fever.
- A general feeling of being sick, and a pain that is hard to describe.
If the inflamed appendix is not surgically removed and the infection gets worse, the wall of the appendix can break open (rupture). This spreads infection into the belly area, causing peritonitis. Peritonitis is a serious condition that, in rare cases, can lead to death.
Appendix may perforate & pus spreads into the whole of abdomen if, surgery is not done on time.
Emergency removal of Appendix ( Appendisectomy / Appendectomy) which maybe performed by open or laparoscopic approach. Recovery time is 2-3 days after laparoscopic surgery and about 7-10 days after open surgery
It is performed under general anaesthesia making small key holes in the abdomen through which the telescope and thin & long instruments are introduced and surgery is done by seeing inside of the abdomen on a TV monitor and diseased appendix is removed
Pain after Appendectomy (Laparoscopic) is mild while after open surgery is moderate |
As if the public debate about global warming wasn't complex enough, a new field in climate research is coming of age, grabbing media attention and spawning seemingly contradictory headlines.
The work, called attribution research, doesn't challenge the scientific consensus that climate change is happening. Instead, it strives to understand the regional effects of global warming by determining whether increased greenhouse gas levels did—or didn't—cause a particular weather event. But the findings can be confusing. For instance, scientists say that climate change made Hurricane Sandy worse, but that it had nothing to do with historic floods in Thailand. Warming probably didn't cause this year's severe winter storm, Nemo, but it may have supercharged it. It caused some droughts, but not others.
Adding to the confusion is a trend that worries some experts: People on both sides of the climate divide tend to promote only those attribution studies that support their beliefs. Whether a conscious decision or not, this selective use of research is further polarizing the national conversation on climate change, experts told InsideClimate News.
"When a new study comes out, it should be informing our understanding of the topic," said Gretchen Goldman, an analyst at the Union of Concerned Scientists who studies how research is used to inform policy decisions. "But the reverse is happening. People who have predetermined opinions about climate change are only searching for information that supports their views."
The treatment of two stories published by the Associated Press last month, less than a day apart, illustrates the trend.
The first, titled "Global Warming Didn't Cause Big U.S. Drought," was about a report by five federal agencies, led by the National Oceanic and Atmospheric Administration, which concluded that climate change didn't cause the 2012 drought. The second, "Greenhouse Gases Make High Temps Hotter in China," covered work by Chinese and Canadian researchers that found the highest temperatures in China have been made worse by global warming.
Both articles were written by Seth Borenstein, a respected science journalist. Both studies underwent a rigorous scientific process and peer review. Neither study challenges the consensus that the earth is warming because of human activities.
"Attribution research is about the details of climate change, not whether it is happening," said Martin Hoerling, a research meteorologist at NOAA and co-author of the drought study. "The warming of the planet is well founded in evidence. We aren't arguing otherwise."
However, in the days following the articles' publication, each side in the climate debate promoted the story that best fit their argument.
Global warming skeptics blogged and tweeted the drought findings as evidence that climate change isn't happening. The skeptic site Watts Up With That, run by meteorologist Anthony Watts, said the research "makes it pretty clear all the hype about last summer's drought was nothing but that: hype." Conservative blogger and skeptic Tory Aardvark wrote that "pesky natural variations are back and they always ruin a good warmist fear story."
Advocates of climate policy took a different approach: They largely ignored the study or drew attention to its flaws.
Joe Romm, a senior fellow at the Center for American Progress and editor of the site Climate Progress, wrote that the report is "needlessly confusing, scientifically problematic, and already leading to misleading headlines."
Bill McKibben's 350.org campaign, a grassroots group pushing for drastic emissions reductions, did not tweet about the drought research or mention it on its website, although McKibben said the omission wasn't a conscious one. "What goes up on [Twitter] isn't the subject of a lot of fevered and close debate," he wrote in an email.
The China story created a similar divide.
Environmental groups used it as an example of runaway global warming. Conservation International, a nonprofit environmental organization, tweeted "When people say greenhouse gases put our climate on steroids, this is what they mean." McKibben's group tweeted, "China beginning to feel heat from warmer planet," with a link to Borenstein’s story.
Watts Up With That and other climate skeptic sites largely stayed silent about the China research, though the skeptic site JunkScience said the findings were "based on ClimatePlayStation (i.e., modeling)."
Watts, editor of Watts Up With That, declined to comment for this story.
Just a handful of news organizations, including Time, Salon, and the Daily Climate, covered both research papers.
With no federal energy and climate policy in the United States, both sides of the climate debate are working hard to gain supporters. Anthony Leiserowitz, director of the Yale Project on Climate Change Communication, called this cherry-picking "a natural human tendency." Whether done consciously or unconsciously, however, it can be "dangerous" for scientific issues like global warming that have major policy implications, he said.
"The public and policymakers can use these seemingly convenient arguments to deny the existence of the problem altogether," he said. "Clearly that constrains the nation's and world's ability to take action."
What Is Attribution Research?
Interest in attribution research has ramped up in the past few years as scientists shift their focus to understanding what the regional effects of climate change will be, particularly on flooding, heat waves, droughts, hurricanes, tornadoes and blizzards.
To determine whether climate change caused a particular weather event, attribution researchers look at the specific conditions—things like temperature and moisture—in which the weather event formed, and at the factors that increased or decreased its intensity as it traveled. They also model whether the event could have formed in any other conditions, such as in a climate with lower or higher greenhouse gases.
Because each weather event is unique, the findings are never uniform, making them ripe for picking by both sides of the climate conversation.
Hoerling, of NOAA, said the misuse of the research is "frustrating" and "saddening."
"As scientists, we try to be as clear as we can, using nuanced language to be transparent about what we found and any uncertainties," Hoerling said. "But this nuance gets torn apart ... Blogs and information providers wreak havoc on it."
Several experts said skeptics need to understand that attribution research doesn't undermine the scientific consensus that greenhouse gases have increased due to fossil-fuel burning and other human activities, and that they're causing the climate to warm. Rather, the research tries to decipher exactly how global warming is affecting weather.
At the same time, they said, advocates for climate action need to realize that all attribution research—including studies that conclude global warming didn't cause an extreme weather event—are important to the climate conversation.
Selectively choosing findings goes against the scientific process, in which conclusions are not arrived at lightly or are based on one study, said Max Boykoff, a science policy expert at the University of Colorado-Boulder who researches how climate change is covered in the media. Choosing a single study to definitively argue for or against climate change is "a dangerous route to take," he said.
"We need to remain open to new evidence, especially right now," said Boykoff. "This cherry-picking does the opposite."
But Brad Johnson, campaign director for Forecast the Facts, a group pushing for the use of accurate information about climate change, doesn't see cherry-picking as a problem. "Advocates aren't going to talk about things that aren't problems, but that doesn't mean they are trying to deceive the public," he said. "It is an entirely reasonable thing to do... [Storms attributed to climate change] are examples of the moral and ethical decisions we have to make because we've changed the weather."
Leiserowitz said the emergence of attribution research places lots of responsibility on media. Journalists can't forget to remind their readers that the new findings don't undermine the scientific consensus of climate change.
"The media's job has always fundamentally been to portray what's new," he said. "Unfortunately this often means it doesn't talk about what's old and established. Readers need to be reminded that [attribution research] is about a side argument, not the basic facts of climate change."
Hoerling, the NOAA scientist, raised the question of whether this young field of climate research should even be used in the public debate, at least for now.
"People are aware of things like droughts and hurricanes, but aren't so cognizant of glacial retreat or rising sea level—so somewhere along the way, there was a decision to build a campaign to frame this issue in events that people see [using attribution research]," Hoerling said. "It has been a mess. The climate story is being represented in a way that is extremely confusing for the average person to know what is going on. If someone had asked me, I would have told them to use a different strategy." |
WASHINGTON — A moratorium on new uranium mining around the Grand Canyon expires in six weeks, and the Interior Department is under pressure from conservation groups and mining companies over what to do about it.
Conservation groups want to stop more uranium mining near the majestic Grand Canyon, a part of the American landscape that's been protected since the late 19th century and is known worldwide for its stunning vistas. Uranium mining companies already have rights on public lands in the area that the decision wouldn't affect. They're eager to expand to feed a growing demand for fuel for nuclear power in many parts of the world.
The decision will come just after Germany announced plans to close its nuclear plants and shift to more renewable energy sources. Elsewhere, however, the use of nuclear power is growing, and the price of uranium has risen in recent years. Opponents of expanded mining say the uranium wouldn't necessarily boost American energy independence because an expansion of the nuclear industry has been blocked by high prices and because many of the companies that want to mine near the canyon are foreign companies that would export the uranium.
Interior Secretary Ken Salazar has a July 21 deadline, when the two-year moratorium he imposed on new uranium mining on 1 million acres around Grand Canyon National Park expires. He must decide whether to ban new uranium mining there for 20 years or open up new mining on all or part of it. If he does nothing, the whole area would open again to new claims. Under an 1872 law, companies that can show valid claims have a right to mine on public land.
Conservation groups are pressing the administration to halt the mining. Mining companies are pushing it to lift the moratorium, arguing that there's no proof of environmental damage from uranium contamination.
At stake are dozens of claims that could be validated and grandfathered in, said Roger Clark, the air and energy director of the Grand Canyon Trust. Under the 1872 law, "once they have valid claims, that's private property and really there's no stopping it," he said.
An advertisement titled "Don't undermine the Grand Canyon" is scheduled this week in The New York Times that includes a letter from 50 public figures, including actors Robert Redford and Edward Norton, Phoenix Mayor Phil Gordon and biologist Thomas Lovejoy, who drew attention to tropical deforestation in the 1970s and has advised U.S. administrations since Ronald Reagan's.
The letter, addressed to President Barack Obama, urges him to extend the moratorium on the entire area for 20 years. The ad was paid for by the Pew Environment Group.
Pew recently reported that the number of claims increased by 2,000 percent from 2005 to 2010 and that hundreds of those claims are controlled by foreign interests, including Russia's state-owned nuclear energy company and a state-owned South Korean utility.
"What hangs in the balance is not just the Grand Canyon's splendor for future generations, but important wildlife habitat and the health of the Colorado River, which provides drinking water to millions," the newspaper ad says.
One concern of Pew and other groups that oppose expanded uranium claims is the possibility that the Interior Department could try a stopgap measure, such as offering a new short-term moratorium with a new rationale.
"If there's any environmental protection the administration should stand for, it's protecting the Grand Canyon," said Jane Danowitz, the Pew Environment Group's director of U.S. public lands policy.
Others said they'd heard rumors that the administration somehow would postpone a decision.
Ron Hochstein, the CEO of Denison Mines, a Canadian company with three operations near the Grand Canyon that already have permits and wouldn't be affected by the decision, said an environmental impact statement showed there'd be no impact from mining and therefore the government should open the area to new claims. Denison mines uranium in Arizona and Utah.
The National Mining Association opposes any moratorium on new mining claims near the Grand Canyon. In official comments, it said that making the lands around the park off limits to new claims would be an "overreaching effort to protect the (Grand Canyon National Park) from vague and unsubstantiated threats outside the park boundaries."
Conservation groups, however, challenge the conclusions of the draft environmental impact statement, saying that, among other things, it failed to calculate a worst-case scenario.
Hochstein said he didn't expect a decision soon. He said it was possible that the Interior Department might try to get another temporary moratorium because it hadn't finished the final version of the environmental impact statement.
Dennis Godfrey, a spokesman at the department's Bureau of Land Management office in Arizona, said his agency had to evaluate 294,000 comments and wasn't finished yet. He said he didn't know when a decision was likely.
Of particular concern to environmental groups are the underground aquifers that feed seeps and springs in the Grand Canyon.
There's no way to guarantee that uranium mining wouldn't contaminate the aquifers, and if that happened it would be impossible to clean up, said Taylor McKinnon, public lands campaigns director for the Center for Biological Diversity, another group that's pushing to stop new uranium claims.
"The question at hand is really one of risk," McKinnon said. "Are we willing to risk the aquifers that provide the vast majority of the Grand Canyon's surface water?"
ON THE WEB
MORE FROM MCCLATCHY |
Coventry & the Blitz
The city was bombed many times during the Second World War by the Nazi German Air Force. The most devastating of these blitzes occurred on the evening of 14 November 1940.
In one night, more than 4,000 homes in Coventry were destroyed, along with around three quarters of the city's factories. There was barely an undamaged building left in the city centre. Two hospitals, two churches and a police station were also among the damaged buildings. Approximately 600 people were killed (the precise death toll has never been established) and more than 1,000 were injured.
Click here for memories... |
Helping with Homework
The help links below are tailored to your need. Helping with homework
is difficult. Even if the parent is conversant with relevant mathematical
ideas, the goal of helping the student become self-reliant is elusive.
To successfully help with homework, parents must find ways to encourage
persistence and reasoning, to build on what students already understand,
and help them clarify their thinking.
Comparison with Conventional Homework Assignments
This page provides information on the goals of the homework tasks in
the Core-Plus Mathematics texts.
Questions to Ask Your Student
These are general questions that will help students focus on tasks. The
questions are provided in English and Spanish.
Using the Math Toolkit
Information on the how students build and use a personal resource of
examples, summaries, definitions, and theorems and more.
Each page provides an overview of a unit including the major learning
objectives and the solutions to the final unit Summarize the Mathematics
questions available in the student text. The unit summary responses should
be similar to those your student has in his or her notes. Select by course
and unit from the menu below.
Selected Homework Tasks
As you talk with your student about what he/she has learned in class,
you are an active part of the learning process. You are one of the "knowledgeable
experts" in your student's universe. By helping your student think about
mathematics, you are part of the process that researchers tell us enhances
achievement and develops the ability to learn independently. Try to:
provide hints or ask questions when helping with homework, without
taking away all the gains to be made from the student's individual
encourage your student to reflect on what was recently learned,
ask questions that encourage your student to explain concepts.
Choose by course and unit to view sample solutions. You will need to
have access to the student text for the tasks. |
Before Breakfast: Jeremiah 18:4
October 9, 2018
” And the vessel that he made of clay was marred in the hand of the potter: so he made it again another vessel, as seemed good to the potter to make it.”
A potter usually works on clay to make it in the form, shape and structure that he desires it to be-to make it become a useful and valuable object.
God was about giving Jeremiah a message which he had to figuratively learn from the workshop of a potter!
He saw the Potter kneading the clay over the wheel to bring out the best shape, form and structure in it as he deemed it fit.
In the process of making a ‘pot’ from the clay, the potter had to ‘crush’ the clay and re-shappen it to make it come out at it’s best before the maker.(Potter).
The lesson to be learnt from this analogy is that, as the clay is to the potter so we are to God our creator.
He has the power to ‘mould’ and transform us to the ‘shape’ He desires us to be.
(See Isaiah 45:9)
It is therefore of necessity to remain humble and submissive before Him to work on us and ‘mould’ us to conform to the image of His glory so as to become a worthy and useful ‘tool’ before Him. |
This green frog has rough skin, a back that tends to sag with age, and enlarged eardrums on male specimens. Like the Leopard Frog, it has paired vocal sacs and does not grow extremely large. It is usually darker in color, with blurred dark dorsal spots. Some larger specimens develop a light green net-like pattern. Dorsolateral folds are visible in some individuals and the belly is white, with the eyes turned slightly upwards. The feet are fully webbed, as this frog is more aquatic than most of its cousins.
The males have a unique call like that of someone knocking on a door, usually given three times in a row. It can sometimes be sped up to sound like a dull purr.
These frogs like to be in water, often around lily pads. One popular site at the Saint John's Arboretum is near the footbridge on Stumpf Lake, where a few males can call from the small “islands” in the swampy area in the lake. |
Grain reserves worldwide have fallen to their lowest level in 30 years. Population continues to mushroom. Bumper harvests this year probably will meet demand, but only barely.
This week the Food and Agriculture Organization of the United Nations (FAO) is meeting in Rome with officials of some 120 nations. The top item on their agenda: food security. The world, some experts suggest, is teetering on the brink of a global food crisis.
But don't be surprised if their warnings go unheeded. Leaders heard similar forecasts three decades ago and dodged the danger. Can they do so again?
The numbers are not encouraging.
On the demand side, the FAO estimates that some 842 million people worldwide were undernourished in 1999-2001. Although that number was falling in the first half of the 1990s, it has grown since then by 18 million in poor countries and by 9 million in those nations moving from communism to market systems.
While the FAO's goal is to halve the number of hungry people in the world by 2015, more than three-fourths of 122 developing and in-transition countries "are either lagging behind or not on course to attain the goal," according to an assessment of world food-security for the Rome gathering.
"We are worried," says Margarita Flores, secretary of the FAO's Committee on World Food Security.
Meanwhile, 76 million people a year are added to today's population of 6.2 billion. By midcentury, there could be 9 billion mouths to feed.
The supply side is, if anything, more dismal. The world's grain harvests have for four years fallen short of consumption, says Lester Brown, president of the Earth Policy Institute, a Washington think tank. These shortfalls have pulled down the world's grain reserves to only 59 days of consumption, the lowest level in 30 years. The FAO figures the world should have 70 days of grain supply left after each harvest, or supply becomes shaky.
Fortunately, this year's grain harvest is shaping up to be superb, thanks to excellent weather in most of the grain-producing regions. The crops of wheat, corn, and rice are up 20 to 30 percent; the soybean crop has doubled. "Yet even with this exceptional crop, we were not able to boost stocks," says Mr. Brown. This bumper crop was "just about enough to satisfy world consumption."
So if excellent harvests give way to normal ones, world food reserves could become dangerously slim.
Thirty years ago, the picture looked much the same. The Club of Rome published "Limits to Growth," a book that, among other things, saw a combination of population growth and limited farmland leading to widespread hunger. The book didn't specify when that would happen, but it was widely interpreted as a warning of imminent danger.
Then, widespread famine was averted, partly because of big boosts in production in key areas, such as the United States, where farmers were urged to plant "fence-row to fence-row," and Asia, where the "Green Revolution" introduced new, far more productive varieties of grain. Within 10 years, the world was drowning in farm surpluses instead of facing shortages. The Club of Rome report was consigned to the dustbin of Malthusian miscalculations.
Will similar forces save the world from hunger a second time?
Unfortunately, no new higher-yield grains are in the offing, Brown points out. And arable land in many nations is shrinking, not growing.
To boost food output, the FAO's Mrs. Flores wants more spending to bring the latest farming technologies to small farmers, the people most in danger of hunger.
Brown would like to see greater efforts to encourage birth control in developing nations, where almost all population growth will be occurring. He would also like to see a "global full-court press" to have farmers raise their productivity in the use of water. And he wants the world to tackle global warming more seriously, since a 1 degree C rise in the average temperature cuts grain yields 10 percent.
Brown has long been accused of being an alarmist, the boy crying "Wolf!" when there was no wolf. "I hope they [the accusers] are right," he says.
But even that folk tale suggests it's dangerous to get too complacent. Eventually, the wolf came and ate the boy. |
Study reveals genetic details behind springtails’ winter survival
Instead of chopping firewood and pulling out the mittens to prepare for chilly winter days, the Arctic springtail hunkers down and dries itself out. A study published online July 21 in BMC Genomics identifies some of the genes that allow for the millimeters-long arthropod’s extreme wintering stunt.
When temperatures drop below freezing, Arctic springtails (Megaphorura arctica) lose a massive amount of water and shrivel into little husks. In this way — a method called cryoprotective dehydration — the critters ride out harsh winter |
Java is a software platform, which was created by Sun Microsystems in the year 1994. This software platform provides a system for developing a variety of software applications. Java also helps in deploying these software applications in a cross-platform computing environment. It is used in a wide variety of computing platforms from embedded devices to mobile phones to enterprise servers and even supercomputers. Learn Java 8 at IIHT, the most renowned IT training institution. Get quality training from certified trainers and also get complete industry exposure and hands on experience.
Get prepared for globally recognized Certifications
150+ centres spread over 20+ countries
State-of-the-art Infrastructure based on latest technologies
Get trained from industry-experts
Based on ITIMS, Social, Mobility, Analytics and Cloud
Dedicated Placement Cell for IIHT students
JAVA 8 is one of our Programmes under the category of ‘s’ in iSMAC (IT-IMS, Social, Mobility, Analytics, and Cloud).
Since last 15 years, Java Platform has been the number one platform in almost all respects. It has grown from Java 1.0 in 1995 to Java 8.0 today. Java 8.0 is also called as Java SE 8.0 Platform. The Java Enterprise Edition (Java EE platform) is also one of the most sought-after technology platform for developing web and Enterprise Applications, and the current version is Java EE 7.
Considering the need of the industry, IIHT is offering a Job-oriented programme in JAVA 8 that comprises of three levels. Core Java, this program helps in laying a solid foundation on the most important concept in the field of information technologies today. At the intermediate level, this program further strengthens the candidate’s knowledge and skills in terms of the advanced concepts of Java. At the advanced level, this program imparts knowledge and skills in terms of web application development.
– Java 8.0 also known as Java SE 8.0 Platform is the latest and most powerful version of Java
– Java is used in a wide variety of computing platforms from extremely low memory devices to supercomputer
– Java Enterprise Edition (Java EE platform) is also one of the most sought-after technology platform for developing Desktop, Web and Enterprise Applications
– Java 8 enables developers to create applications—faster and easier—for business environments and the Internet of Things (IoT).
-Java 8 facilitates improved developer productivity through reduced code.
i. Core Java – Learn fundamentals of Java Programming Language features, Java Object Orientation features, Processing Inputs and Outputs using Java, Developing Networking Applications in Java, Strings and java.io API and many other important aspects.
ii. Advanced Java– Learn advanced features and aspects of Java Programming Platform like Threads and Multi-threading, Generics, Lambda
expressions, Collections Framework and a whole bunch of Java Utilities such as Logging, Regular Expressions etc.
iii. Web Java– Learn to develop web and Internet oriented applications using the web java platform and also learn important features such as Servlets, JavaServer Pages (JSP), JSP Standard Tag Library (JSTL) and related technologies.
This course helps candidates to prepare for Certifications in Java Technology
CORE JAVA COURSE CONTENTS
JAVA PROGRAMMING FUNDAMENTALS
Java is a programming language. It is a computing platform that was released by Sun Microsystems in 1995. There are lots of applications and websites that run only if Java is installed. Moreover several such applications and websites are created every day. Java is in demand since it is fast, secure, and reliable. You will find Java in laptops to data centres, game consoles to scientific supercomputers, cell phones to the Internet, it is everywhere! This course will give you knowledge on how computer applications work and teach you to write your own applications. It will help you to learn computational thinking, which is a fundamental approach to solving real-world problems.
ENUMERATIONS, AUTOBOXING AND ANNOTATIONS
Enumerations are nothing but the new features that are added in the java. These features help the programmers to achieve compatibility as they are supported by the common languages. In simple words enumeration can be defined as the list of the named constants. Autoboxing is used to get the value that is associated to a given object, through type conversion. It may either be in an implicit form or explicit form. In java, the Annotation type declarations are just like the normal interface declarations. Learn everything about Enumerations, Autoboxing and Annotations at IIHT.
AWT AND SWING
The Abstract Window Toolkit (AWT) is a widget toolkit. To understand better, it is Java’s original platform-dependent windowing, graphics, and user-interface widget toolkit. The Abstract Window Toolkit precedes Swing. The AWT is part of the Java Foundation Classes (JFC), which is the standard Application Programming Interface that provides a graphical user interface (GUI) for a Java program. Swing on the other hand is a GUI widget toolkit for Java. It is part of Oracle’s Java Foundation Classes (JFC), which is an Application Programming Interface for providing a graphical user interface (GUI) for Java programs. Study all about the Abstract Window Toolkit and Swing at IIHT.
OBJECT ORIENTATION IN JAVA
Object Orientation Programming can be called a design philosophy. One of the benefits of Object-Oriented Programming (OOP) is that it uses varied sets of programming languages and doesn’t rely only on the old procedural programming languages. It can be defined as a programming paradigm, which is based on the concept of “objects”. These objects may contain data that comes in the form of fields, which are often known as attributes. There are codes that come in the form of procedures and are known as methods. OOP helps to design computer programs. These programs are made out of objects that interact with one another Learn everything about Object oriented programming from our certified trainers.
CORE JAVA APIS
As per the concept of computer programming, an Application Programming Interface (API) can be defined as a set of subroutine that includes definitions, protocols, and tools for building application software. API’s are definite methods of communication between different software components. A good API provides all the building blocks that make it easier for the programmers to develop a computer program. There are two types of Java Programming Language Application Programming Interfaces (APIs). One is the official CORE Java API and other is optional APIs that can be downloaded separately.Learn everything about Core Java Application Programming Interface from certified trainers at IIHT.
Networking is connectivity. Java Networking can be defined as a concept of connecting two or more computing devices together. The purpose of which is to share resources. Java socket programming is used to share data between different computing devices. Java Networking is very important and has two major advantages. One it is used for sharing resources and the other major benefit is to centralise software management. Receive detailed knowledge regarding Java Networking from the best faculty at IIHT.
ERRORS AND EXCEPTIONS IN JAVA
An exception can be defined as an occurrence that breaks the normal flow of execution in a programme. There are different ways of handling an exception depending on whether it is hardware or a software exception. Hardware exceptions can be handled seamlessly and the execution can resume where it was interrupted. Whereas, handling software exception is complicated. The procedure involves error checking that doesn’t interrupt the program flow, but later does explicit checks for contingencies reported. Programmers design software that have inbuilt error reporting features. These features help to collect details that may be helpful in fixing the problem, and display those details on the screen, or store them to a file. Learn everything about Errors and Exceptions in Java in this programme.
INPUT / OUTPUT IN JAVA
As per computing, input/output or I/O is explained as the communication between an information processing system, which means a computer and the consumer or yet another information processing system. Inputs are nothing but the signals or data that is received by the system and outputs are the signals or data, which are sent from it. Java I/O (Input and Output) can be explained as a procedure to process the input and produce the output. Java makes use of the concept of stream, in order to make the Input/output operation fast. Learn in depth about I/O in Java at IIHT.
ADVANCED JAVA COURSE CONTENTS
MULTI-THREADED JAVA APPLICATIONS
According to computer science, a thread of execution can be explained as the smallest sequence of programmed instructions, which can be managed independently. Let’s say it can be managed by a scheduler and is typically a part of the operating system. When it comes to threads and processes, the implementation differs between operating systems, but in most of the cases a thread is a component of a process. Did you know? That both Java programming language and Java virtual machine (JVM) were designed to support concurrent programming. Most importantly, the execution part of this programming takes place in the context of threads.
If you consider computing based on the Java Platform, then JavaBeans are nothing but classes that encapsulate many objects into a single object, this single object also being the bean. This technology was named as ‘Bean’ so as to encompass a standard, which aimed at creating reusable software components for Java. Java Beans can be serialized. They have a zero-argument constructor, and they also allow access to properties using getter and setter methods. Get to know everything about Java Beans in our instructor led sessions at IIHT.
Generics are explained as a facility of generic programming that was added to the Java programming language. The purpose of Generics was to extend Java’s type system. The intention was to allow “a type or method to operate on objects of various types while providing compile-time type safety.” The Java collections framework supports generics, in order to specify the type of objects stored in a collection instance. Generic Java was created in 1998, by Gilad Bracha, Martin Odersky, David Stoutamire and Philip Wadler. It is an extension to the Java language to support generic types and was incorporated in Java with the addition of wild cards.
CONNECTING TO DATABASES USING JDBC
Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java. It determines how a client may access a database. Java Database Connectivity can be defined as a Java based data access technology, which is also used for Java database connectivity. This technology is a part of the Java Standard Edition platform, from the Oracle Corporation. Learn to connect to databases using JDBC at IIHT.
THE COLLECTIONS FRAMEWORK
The Java collections framework (JCF) can be explained as a set of classes and interfaces, which implement commonly reusable collection data structures. Even though referred to as a framework, the Java collections framework (JCF) works in a manner of a library. It provides both interfaces, which define various collections and classes that implement them. Collections are nothing but objects that store other objects. Understand the Java collections framework in depth from the industry mapped curriculum at IIHT, the most renowned IT training institution.
WEB JAVA COURSE CONTENTS
A servlet is a Java programming language class that is used to extend the capabilities of servers that host applications accessed by means of a request-response programming model. Although servlets can respond to any type of request, they are commonly used to extend the applications hosted by web servers. Servlet technology is used to create a web application (resides at server side and generates dynamic web page).
JSP STANDARD TAG LIBRARIES
The Java Server Pages Standard Tag Library (JSTL) is a part of the Java EE Web application development platform. It extends the JSP specification, as it adds a tag library of JSP tags for common tasks. The Java Server Pages Standard Tag Library was designed under the Java Community Process (JCP) as Java Specification Request (JSR) 52. The most important task of JSTL is to provide an effective way, in order to embed logic within a JSP page and also without using the embedded Java code directly. Learn JSFTL at the most renowned IT training institute and get quality training from IIHT certified trainers.
JavaServer Pages (JSP) is a technology used to develop interactive Web pages. JSP was developed by Sun Microsystems and is an improved version of Java servlets. JSP may be developed in a simplified manner and has a wide range of applications. As with most server-based technologies, JSP separates business logic from the presentation layer.
INTRODUCTION TO JAVA SERVER FACES (JSF)TECHNOLOGY
The Java Server Faces (JSF) technology is a Java specification, which is used for building component-based user interfaces. These user interfaces are designed for web applications. The Java Server Faces (JSF) technology was formalized as a standard through the Java Community Process, as it is a part of the Java Platform, Enterprise Edition. It is also an MVC web framework that makes it easier to construct user interfaces (UI) for server-based applications. Learn JSF at the most renowned IT training institute and get quality training from IIHT certified trainers.
SECURING WEB JAVA APPLICATIONS
The Java platform provides a number of features, which are designed for improving the security of Java applications. One of the features includes enforcing runtime constraints, which is done by using the Java Virtual Machine (JVM). The Java Virtual Machine is a security manager. Learn to secure the Web Java Applications. Attend instructor led training and practical sessions at IIHT and get complete knowledge along with hands on experience.
A web service is defined as a service, which is offered by an electronic device to another electronic device, to communicate with each other. This communication takes place via the World Wide Web. Did you know? That the web technology such as HTTP was originally designed for only human-to-machine communication. But today, it is utilized for machine-to-machine communication as well. The web service provides an object-oriented web-based interface to a database server, which later provides a user interface to the end user. Hence, one can also say that a web service is a software system that is designed to support interoperable machine-to-machine interaction over a network. |
Earlier this year, an Italian surgeon announced that he’ll be attempting the world’s first human head transplant, that despite the hurdles, a human head may actually be attached onto another person’s body in two years. This week, a donor was introduced, but according to at least one expert, this man might be facing something that’s “worse than death.”
It started in 2013, when Sergio Canavero of the Turin Advanced Neuromodulation Group proposed the idea of using surgery to extend the lives of people with degenerated muscles and nerves or cancer-permeated organs, New Scientist reports. Canavero summarized the 36-hour procedure he plans to follow in Surgical Neurology International in February of this year. He also plans to launch the project at the annual American Academy of Neurological and Orthopaedic Surgeons meeting in Maryland this June. He’ll need a staff of 150 doctors and nurses.
Is it actually possible to fuse two spinal cords and stop the recipient’s body from rejecting the new head? Last century attempts with dogs and monkeys resulted in animals who survived for a few days, though a more recent mouse head transplant showed that it was basically possible. "I think we are now at a point when the technical aspects are all feasible," Canavero says.
After cooling the donor’s body and the recipient’s head, neck tissue is dissected, blood vessels are linked with tubes, and the spinal cords are cleanly severed, New Scientist explains. With the new head on the body, the ends of the spinal cords are fused together using a chemical that prompts fat in cell membranes to connect. Muscles and blood vessels will be sutured, and the patient will be kept comatose as electrodes stimulate the spinal cord. He calls it HEAVEN, for head anastomosis venture (anastomosis is the surgical connection of two parts).
This week, a volunteer was announced: 30-year-old Valery Spiridonov of Vladimir, Russia, who suffers from a rare genetic disorder called Werdnig-Hoffman muscle wasting disease. He wants the chance at a new body before he dies. “Am I afraid? Yes, of course I am. But it is not just very scary, but also very interesting,” Spiridonov tells Daily Mail. “You have to understand that I don't really have many choices... If I don't try this chance my fate will be very sad. With every year my state is getting worse.”
But according to Hunt Batjer of the American Association for Neurological Surgeons, even if the airway, spine, and major veins and arteries are put together, the spinal cord will be the real problem. "I would not wish this on anyone,” Batjer tells CNN. “I would not allow anyone to do it to me, there are a lot of things worse than death." For starters, the patient might not be able to move or breathe. And Arthur Caplan of New York University thinks Canavero is nuts. "Their bodies would end up being overwhelmed with different pathways and chemistry than they are used to and they'd go crazy,” he tells CNN. Also, the high levels of anti-rejection meds will poison the body, and who knows if the recipients will fully gain the function of their new parts. "It's not like you can unscrew your head and put it on someone else," Caplan adds.
Still, Canavero insists, “we can already do this.”
Update: the surgery has now been scheduled for 2017. |
People are quick to criticise political parties for ‘going negative’. Just a day into the official campaign, David Cameron was already defending himself from allegations about his party’s use of negative tactics. While the Conservatives have been the recipients of most of the accusations in the current election – particularly after Defence Secretary Michael Fallon’s personal remarks about Ed Miliband – one has only to look to Twitter to see that no party can credibly claim an entirely positive campaign.
The term ‘negative campaign’ is often used to refer to campaign messages that people deem derogatory, overly personal, or perhaps even untrue. However, a more sensible way to understand negative campaigning” is to use it as a description of political messages in which politicians are talking about their opponents. Discussing one’s opponent(s) can take many forms – including referring to their policy positions, qualifications, or previous record – but the content is almost always negative in the sense that it focuses on the weaknesses of the opponent. (Parties rarely talk about their opponents to praise them.) Figure 1 contains excerpts from two leaflets – one Labour (top) and one Conservative (bottom) – where the parties engage in negative appeals by attacking the policy positions of another party. In order to avoid negative messaging altogether parties would need discuss only their own merits and qualifications, with no mention of their opponent.
Figure 1. Negative Policy Appeals in Campaign Leaflets
Using a new dataset of more than 4,000 election leaflets allows us to look at the tone of the messages parties disseminated to voters in the run-up to the 2010 general election. Our dataset included leaflets from more than 500 constituencies in Scotland, England and Wales, though we limit the analysis to the Conservatives, Labour, and the Liberal Democrats as nearly 75 per cent of our leaflets belonged to these three parties. We coded each leaflet based on a number of dimensions, including the issues covered, the nature of the message, and the types of images used.
If we look at what parties say in their leaflets, negative campaigning is more common than parties might be willing to admit. Figure 2 displays the percentage of each parties’ leaflets that contained at least one negative message. The majority of the leaflets from all three parties contained negative appeals – that is, they attacked the policy positions, record, or qualifications of another party. The Liberal Democrats were most likely to criticise another party or an opposing candidate; more than 80 per cent of their leaflets contained a criticism of an opposing party or candidate. The Conservatives were moderately more positive, with 75 per cent of their leaflets containing negative appeals. Labour was the most positive of the three parties, although nearly 70 per cent of the party’s leaflets contained negative messages.
Figure 2. Percentage of Party Leaflets with a Negative Message
If we look at who the parties were attacking in their leaflets – keeping in mind that parties can attack multiple opponents in the same leaflet – we see that Labour and the Conservatives tended to target each other. Figure 3 shows the flow of negative attacks between the three parties. Fifty-nine per cent of Conservative leaflets contained an attack aimed at Labour, while 51 per cent of Labour’s leaflets included an attack on the Conservative Party. However, Labour was more likely to target the Liberal Democrats. Sixteen per cent of Labour’s leaflets included a negative message aimed at the Liberal Democrats, compared to only eight per cent of Conservative Party leaflets. In contrast, the Liberal Democrat’s attacked both of the two largest parties, with 52 per cent of their leaflets containing a message regarding Labour and 44 per cent containing an attack on the Conservative Party.
Figure 3. Party Targets of Negative Messaging
In the coming weeks we will explore how parties are using negative messages in their 2015 campaign leaflets. If the past is any measure of the future, we should be wary of any party who says they are running an entirely positive campaign.
Help us study parties’ campaign strategies in 2015 by uploading your election leaflets to Electionleaflets.org.
Caitlin Milazzo is an Assistant Professor in the School of Politics and International Relations at the University of Nottingham. The British Election Leaflet Project is a collaborative effort with Jesse Hammond (University of California, Davis). Research assistance is provided by Joshua Townsley (University of Nottingham). The project is supported by the Centre for British Politics at the University of Nottingham. |
Lithium comes from stellar explosions
Nova blast A large amount of lithium, one of the key elements in the chemical evolution of the cosmos, is produced by stellar explosions called novae.
The findings, reported in the journal Nature, provide the first direct evidence that lithium, which is used for lithium-ion batteries in computers, smart phones and eco-cars, is produced by stellar objects.
"Understanding the way lithium is produced, means we can now understand every process of elemental production in the universe," says the study's lead author Dr Akito Tajitsu of the National Astronomical Observatory of Japan.
A nova is an extremely bright thermonuclear explosion on the surface of a white dwarf, the slowly cooling core of a star like our Sun after its run out of hydrogen and helium fuel.
Because white dwarfs have long lives and can experience multiple nova events, it means the total production of lithium will be quite large over the history of the universe, says Tajitsu.
The origin of lithium and its production process have long been uncertain.
Together with hydrogen and helium, a small amount of lithium was generated directly through Big Bang nucleosynthesis and is now produced through collisions between cosmic ray particles and gas in the interstellar medium.
Chemical evolution models and observed lithium abundances in the Milky Way indicate at least half of all the lithium is produced in old bloated stars called red giants, in their successors known as asymptotic giant branch stars, and by novae.
But lithium is very fragile at the high temperatures found in stars, and so until now there's been little direct evidence to support the idea of novae being a major source of lithium.
On 16 August 2013, astronomers detected the first naked-eye nova since 2007.
Located in the northern constellation Delphinus, the nova was named V339 Delphini.
Tajitsu and colleagues used the Subaru Telescope in Hawaii to study chemical signatures produced by the light coming from the nova.
They detected strong signatures for radioactive beryllium-7 being blasted out during the nova explosion.
Beryllium-7 is an unstable isotope with a half life of 53 days.
As the beryllium-7 is blasted into cooler environments away from the white dwarf, it decays into the stable isotope lithium-7.
Until now, it's been difficult to understand how Lithium-7 could form and survive in extreme temperatures such as novae, says Dr Lilia Ferrario of the Australian National University who was not involved in the research.
The lithium survives because it forms away from the extreme heat of the nova explosion.
"This discovery helps solve that problem," says Ferrario
"It suggests that may be up to half of the lithium is produced during stellar evolution, which is a significant amount."
According to Ferrario, it's an important step in understanding the chemical evolution of the universe.
"This is very exciting, anything that can add to our knowledge of the origins of elements, what the universe is made of, and where we come from, is important," says Ferrario. |
A woman's touch
A hot topic at summits of global leaders over the past few years has been how the global community is doing in its efforts to meet the eight 2015 Millennium Development Goals (MDGs)—especially those that deal with poverty, hunger, health, education, and the environment. But little discussed is MDG3, which calls for redressing gender disparities and empowering women. The June 2007 issue of F&D spotlights gender equality, asking why it matters. We learn that not only is MDG3 a vital development objective but it is also key to achieving several others—such as universal primary education (MDG2), a reduction in under-5 mortality (MDG4), improvements in maternal health (MDG5), and a reduced possibility of contracting HIV/AIDS (MDG6). Moreover, greater gender equality can also help to reduce poverty (MDG1) and promote growth.
As for how countries are doing in meeting MDG3, we learn that there's reason to worry that the four official indicators being used to track progress are inadequate—a startling revelation given that there are only eight years left to meet the goal. And to the extent that progress can be tracked, the results aren't encouraging. One of the hardest-hit groups is the 30 million "excluded" girls, who aren't even enrolled in school. These girls face discrimination and indifference in their own countries because they come from ethnic minorities, isolated clans, and groups in which the majority language isn't predominant. One way for countries to pinpoint policies needed to reduce gender disparities is through gender budgeting, which involves the systematic examination of budget programs and policies for their impact on women. As "Budgeting with Women in Mind" explains, this effort to mainstream gender analysis into government policies has gained prominence in recent years.
* * * * *
Also in the June issue, we look at Asia—a star performer in the global economy—10 years after the Asian financial crisis. A series of articles explores what Asia needs to do to hold onto regained ground and become an ever-greater economic force. An IMF review focuses on two of the challenges facing the region: addressing worsening income inequality and learning to live with potentially unstable capital flows. From Korea, Un-Chan Chung, a former presidential candidate and professor at Seoul National University, calls for a "new social compact" if the globalized system is to achieve success in Korea—and perhaps in other Asian countries as well. And from Malaysia, Central Bank Governor Zeti Akhtar Aziz stresses that "Asia's increasing role in the global economy further reinforces the need for it to have a commensurate voice and representation in the international financial community." Finally, F&D explores the deepening involvement of Asia—especially China—with sub-Saharan Africa (SSA) on the trade, investment, and aid fronts. China is now SSA's single largest Asian trading partner and its fastest-growing trading destination. |
Published on May 2, 2016 in Dog Health
Dogs, cats and humans enjoy more time in the yard as spring emerges. There are several steps you can take to create a beautiful and pet friendly garden. Read on to learn more about the potential risks mulch and fertilizers may pose if you have pets.
Cocoa mulch- This waste product from chocolate manufacturing contains theobromine and caffeine. This product can be found in most major garden centers. Cocoa mulch has an attractive chocolate smell that entices dogs, however it is extremely toxic, and can be lethal. Symptoms of toxic ingestion include: vomiting, diarrhea, rapid heart rate, abdominal pain and seizures. Seek immediate treatment if you suspect your pet has ingested this substance.
Cedar and Pine Mulch- These products are safer choices, and do not usually contain any toxins. Be sure to purchase chips that do not contain oil or resin. You must still be careful that these wood chips do not become a choking hazard or bowel obstruction. Many dogs see these wood pieces and feel they must chew on them. The coarse texture can perforate a dog’s stomach lining if swallowed. Some dogs may also have an allergic reaction to wood chips such as rash, itching and skin irrigation.
Always supervise your pup if you are unsure how they will react to your new gardening project. When animals are a concerned, the best mulch is one that decomposes into the soil rapidly, giving the plants the nutrients they need, without having to sit on the soil for a long period of time. Please call Indian Peaks Veterinary Hosptial at, (303) 938-9474, if you have any questions or concerns. |
Introduction / History
The Mamboru people live on the northwestern coast of the island of Sumba just south of the island of Flores. Sumba is in the East Nusa Tenggara Province and part of the Nusa Tenggara chain of islands.Much of inteerior Sumba consists of extensive plateaus, with scattered, irregular hills, particularly in the western part. The climate is hot and dry. As a result, most of the population lives on the interior plateaus, where extensive grasslands support grazing and small scale agriculture.The Mamboru people are closely related to the Wanukaka, Lamboya and Anakalangu but their languages are mutually unintelligible. Language and culture are the primary differences between the people who live in east Sumba, the Kambera people, and those in west Sumba, the Mamboru and Waweya people. One early 20th century observer of the situation in Sumba (Witkamp) was greatly struck by limited knowledge of the island that could be expected of the ordinary Sumba person: Often the people had no names for peaks that were clearly in view and were ignorant also of the names of villages that were easily visible in the distance.
What Are Their Lives Like?
The livelihood of the Mamboru people is primarily a combination of small-scale farming and raising livestock. They also barter and trade for items they do not have. Their crops are mainly rice and corn. Recently they have used irrigation systems that bring water across the valleys for farming. The family leaders have the goal of collecting wealth in the manner of owning water buffalo and horses, as well as acquiring cloth and jewelry. Honor for Mamboru people can be earned by conducting traditional and religious ceremonies. During the ceremonies the entire family takes this opportunity to display their wealth. The traditional culture of the Mamboru people recognizes two divisions of society, tau kabihu (humans) and tau ata (slaves). These divisions determine one's land rights and place in society. The tau ata consist of prisoners of war and people who have broken traditional laws and are no longer considered part of the tau kabihu. These two classes of society are passed down from the parents to each new generation, and even today are a large factor is determining one's status in society.
What Are Their Beliefs?
The majority of the Mamboru people adhere to the belief system of their ancestors, which is animistic. They have stories and myths that have been passed down through the generations, which are often retold in night time gatherings. These stories and myths are about the history of the earth's creation, the origin of man (he was lowered from the heavens to a mountaintop), and how people were dispersed to different areas and formed the first clans. The Mamboru people carefully obey and follow their holy laws and have special religious ceremonies to guard the harmony between humans and spirits.
What Are Their Needs?
The Mamboru people need better physical and non-physical development. There is still a great need for schools and health clinics to be built in the area to improve their quality of life.
|Profile Source: PJRN - Indonesian National Research Network Copyrighted © Used with permission| |
At the University of Houston, professor Arturo Hernandez is mapping out how our brains learn different languages — like English and Spanish. I asked him about that.
“Si hablo otro idioma … what’s going on with my brain?”
“It depends so if you’re speaking a language you learned later in life, it’s very different to speak that you don’t speak normally as it is for someone who speaks a language that they’ve spoken since they were young.”
Hernandez says for people like him who’ve grown up speaking two different languages, he can look at images of their brains and see different kinds of activity.
“When you ask bilinguals to switch between each language, the brain areas that are active are similar to the ones when you ask people to switch between two different tasks.”
That backs up other research that suggests bilinguals are better at switching between other things in their daily lives.
Hernandez says when it comes to learning new vocabulary, there’s an interesting difference between people who are bilingual and others who speak just one language.
“The bilinguals actually learned these words faster and they used less brain to learn new words. So it suggests that bilinguals — the ones we tested — actually are expert word learners, because they have to learn so many labels, they’re actually better at learning new ones, which is interesting.”
Hernandez goes into this research and more in his new book called The Bilingual Brain. He hopes it will inspire teachers whose students are learning a second language. |
Revolutions in India
We all have heard about the "Green Revolution' that happened in India in the late 1960's. It was the increased production of agricultural products especially wheat, rice, cereals, pulses etc. Dr M.S Swaminathan, the genius, was the man behind this silent revolution. His efforts could make wonders in the Indian agricultural sector thereby making India self sufficient in the case of agricultural produce. Dr Swaminathan could bring this magic by the use of sophisticated machinery and high yielding varieties of seeds in the agricultural sector in lieu of our primitive and outmoded methods of cultivation.
Govt of India has taken steps to make 'revolutions' similar to green revolution in other fields of production also. These revolutions also aim at the increased production in the respective sector. What are they?
1. White Revolution: Milk and Dairy products
2. Blue Revolution: Fishing and marine products
3. Yellow revolution: Oil seeds/edible oil especially mustard, sunflower etc.
4. Pink Revolution: Prawns, onion
5. Rainbow Revolution: Fruits/breeding of ornamental fish
6. Brown Revolution: Cocoa/Leather
7. Black Revolution: Petroleum
8. Grey Revolution: Fertilizer
9. Red Revolution: Meat, tomato
10. Round Revolution: Potato
11. Golden Revolution: Honey, Horticulture
12. Golden fiber: Jute
13. Silver fiber: Cotton
14. Silver: Eggs (Poultry)
Dr.M.S.Swaminathan has recently called upon the farmers to increase productivity of the lands in a sustained manner. Productivity must be doubled or tripled instead of an annual single-digit increase. Along with the use of traditional wisdom, they must optimally adopt technological advancements in agriculture. Technological innovations will increase the productivity of different crops and this will lead to an evergreen revolution.
Its really helpful for competitive exams and here we could find all colour revlstns.
These are very useful can also add father of these revolutions which would be even more useful.
Can you please tell me more about black revolution . |
Why is Conservation important for the Environment?
Every natural ecosystem works in balance. An ecosystem is a community made up of all the living things in an area and the way they affect each other and the environment. If you remove or damage any part of the ecosystem, it has a ‘knock on’ effect on all other parts of the system.
Damage to habitats, such as that caused by deforestation, can have a disastrous effect, not only on the many species which live in that habitat, but also on the planet as a whole. Living trees help prevent climate change by removing carbon dioxide (CO2) from the atmosphere and locking it away it their wood, leaves and in the soil. Burning forests releases carbon, and removing trees increases the amount of CO2 left in the atmosphere, leading to global warming.
Trees and plants are also important for preventing the erosion of coastlines and for protecting against flooding, because their root systems hold the soil in place and they absorb excess water.
When an animal becomes endangered or extinct, this has effects on the plants and other animals in its ecosystem, due to a resulting change in the food chain. A carnivorous predator that hunts certain other animals might be necessary to prevent those animals from becoming too numerous and eating all the plants in one area. Even a tiny insect is a vital part of its ecosystem. Without bees and other pollinating insects, many plants that we rely on would not be able to reproduce, including those that we grow for food.
Conservation of our fuels and other minerals is also of vital importance to our environment. Many of these resources are non renewable, meaning that they will one day run out leaving none available for future generations. Fossil fuels, such as oil, coal and gas also release harmful gases when burned, leading to global warning and climate change. Mining for minerals also causes further damage to habitats.
Photo: David GilbertRead More: What are Some Current Methods of Conservation? |
As part of its commitment to sustainability and environmental leadership, Dairy Management Inc. has decided to commission and conduct a life cycle assessment (LCA) of the dairy fluid milk supply chain. An initial carbon footprint study is presently being carried out with the University of Arkansas Applied Sustainability Center, focusing exclusively on greenhouse gas (GHG) emissions and impacts.
The study proposed in the present offer complements this initial study by carrying out a full Life Cycle Assessment, covering a wide range of other environmental impact categories. In parallel, it will also carry out a Life Cycle Costing focused on evaluating the potential costs or cost savings associated with different potential measures to reduce environmental impacts.
Project goal and scope
Building upon the carbon footprint study, the "beyond carbon” LCA study of fluid milk aims to carry out a full LCA of fluid milk, also screening the associated Life Cycle Costing. This comprehensive study should set the basis for ISO compatible LCA studies in the dairy field, with a focus on the assessment of impacts directly related to dairy production. The study will especially focus on:
- The environmental impacts of water consumption at all stages of the life cycle and the implications as a function of regional water scarcity.
- The impacts of dairy milk production on human health and ecosystems, accounting for the latest developments in Life Cycle Toxicity Assessment, including eutrophication, an impact category of major relevance in agricultural production.
- The impacts associated with land use, assessing the role of dairy livestock on potential changes in land use, possibly differentiating between US and other regions.
- The modelling of Life Cycle Costs in parallel to Life Cycle Impacts, with a focus on the costs and costs savings of potential actions to reduce environmental emissions.
Functional unit and system boundaries
The functional unit will be one gallon of milk consumed by a US consumer. For the agricultural production of the life cycle, separate scenarios will be carried out for 2% fat milk and whole milk, accounting for the fat-corrected-milk approach to ensure consistency with the previous work on the carbon footprint; the rest of the life cycle (transportation, retail, refrigeration) will be related to the volume of milk
The production system encompasses the following activities performed in support of milk production and delivery: raw material extraction; energy extraction, precombustion and combustion; fertilizer and pesticide production; agricultural operations and direct field emissions; delivery, distribution and refrigeration; and product loss through the supply chain. We also plan to include an initial assessment of ingested residues in milk such as pesticides, antibiotics or cleaning agents.
According to ISO, a 1% cut-off rule based on mass, energy and overall impacts in each impact category will be applied either at midpoint or at damage level. This will be supported by sensitivity studies or expert judgment to determine any additional processes that may have been neglected. Available data below the 1% cut-off will be kept in the system unless they bring obvious biases or inconsistencies.
Allocation will be performed according to the ISO hierarchy. Allocation rules selected in the carbon footprint study will be considered in priority. Additional options will be considered and a sensitivity study will be carried out on the main option to determine the implications of allocation choices on impact results. |
The unit performs reliably, is menu driven for programming various PCR (Polymerase Chain Reaction) "recipes" (so you don't have to use a computer but there is free downloadable software that will let you do this and we provide the PIN diagram for making the cable). It cycles temperatures at 0.15 degree centigrade per minute. The difference in actual temperature (Process variable) from "control" temperature (Set variable) varies about 5 degree centigrade. That means we set the temperature at 5 degrees higher than the temperature we want to achieve. This is due to the bias in the thermocouple probe.
In a Nutshell: We use a piece of aluminum rod, drill a 1/4" hole in the center of one end for a cartridge heater and another hole near the rim of the same end for a thermocouple (temperature sensor). Additional holes in the same end of the rod are for sample tubes (0.2 ml eppendorf tubes).
This "heating block" is positioned on a small bracket over a PC cooling fan. Both are placed inside of a metal coffee cup. A commercial temperature controller ( available from Omega Engineering) is used to control the heating and cooling cycles. End of story.
It reaches and holds (soaks) at various temperatures and can also be used for "In situ" Hybridization protocols. It can be programmed from the face plate of the controller or connected to a computer by a serial cable. The control software is a free download.
Step 1: What Is a Thermocycler?
A thermocycler raises and lowers temperature. For molecular or DNA applications it needs to heat up to about 90-95 degrees centigrade. DNA which usually exists in double strands in a helix (like a spiral staircase) and at about 92 degrees centigrade the strands will break and fall apart.
The solution that the DNA sample is in has extra "bases" that will connect to the broken rungs of the ladder to make two new ladders. To do this part we need to cool down the sample to the point where "bases" can connect to the separated DNA strands. If you cycle through this temperature range from 20-30 times you can make millions of copies of the original DNA.
So in summary, a thermocycler can make a million copies of one original piece of DNA. These copies can then be used for other types of research. The prototype that we build can take 6 sample tubes (0.2 ml eppendorf tubes). There is room for one blank, the temperature probe and a central cartridge heater.
Learning sites that are excellent:
- DNA Extraction Online Tutorial
- Home DNA extarction of DNA (Instructables)
- PCR Song (must hear)
- PCR Protocols
Step 2: Completed Version of the Coffee Cup Thermocycler:
Parts List and links to sources:
6061 Aluminum Rod 1.5" round stock about 5" in length
Cartridge heater 1" length, 1/4" diam 80W
Temperature controller Omega.com CN8282-R1R2C2
Free Software for serial connection to computer
40 mm PC 110 volt cooling fan
- 4 foot extension cord, three prong, to cut off and use as power cord.
- Metal coffee cup and coffee can (your on your own here)
- Hand drill
- Tap for putting threads in the hole for the temperature probe #7 drill and 1/4-20 Tap.
- Basic tools (hammer, screw driver, pliers, wire cutters etc...)
Step 3: Make the Heating Head: Machinist and Hobbyist Approaches:
This aluminum rod is used to make the heating head.
A center hole 1/4" will be for the cartridge heater.
7 holes are drilled on the same end of the rod for the 6 sample tubes and one hole for the
thermocouple temperature probe. The hole for the temperature probe is made with a
#7 drill and a 1/4-20 tap to thread the 3/4" deep hole.
Step 4: Making the Coffee Cup Part of the Thermocycler:
We used a fly cutter to make the hole in the bottom of the coffee cup (mug).
Four smaller holes are for the feet that attach to the mounting holes on the fan that is
inside of the mug.
Mark the holes with the fan sitting on the outside of the mug.
Step 5: Wire the Controller:
Read the warning in the manual that comes with the temperature controller!
See the shop notes pages below that explain various aspects of the wiring.
Step 6: Performance:
The serial cable is connected to the controller.
The free downloaded software form Omega.com is used to write a recipe for the following tests.
The data is "logged" to data files that were imported into excel for graphing.
Pass - Hold at 50 degree centigrade up to 10 hours.
Pass - Hold at 92 degrees centigrade for 30 minutes.
Pass - Run menu (recipe) to go from RT (room temp) to 55 over 4 minutes; then
Loop 25 times: from 55 to 72 where you soak for 2 minutes, then raise temperature to
92 where you soak for 1 minute; then at end of the cycles hold at 55 degree
Step 7: Free Software
Free Software for serial connection to computer
Downloading the free Software from the Omega Engineering website lets
you control the "temperature controller" and quickly write complex "recipes" to
store into the unit and run at any time.
You don't need to use the serial cable since the unit can be programmed to
run recipes from the front panel, but it is a quick way
to test and optimize the temperature parameters while capturing the data to
a log file that you can import into excel for graphing.
The software also has a graph function but it is somewhat limited.
Step 8: Where Do We Go From Here:
- Swap out heating heads for Chromogenic In Situ Hybridization, slide holder
- Two sample heating block using ducted RC hobby fan
- Vented "Tray block" with 20 sample deck
- USB powered Micro PCR platform
- USB control using "Phidget" interface and incorporate two Peltier Junctions
- Micro-controller based (Parallax) controller for computer free 9 volt version
- Internet accessible interface using IOBridge
- Make a single sample "Pen based" version that runs off of a USB port.
Step 9: Disclaimer (fair Warning):
wear safety equipment related, but not limited to, the following:
1) Electrical currents that you should not play with.
2) Power-tools that you never read the instructions for.
3) Any tools that you never learned to use properly.
4) Anything that heats up, pinches, cuts, squeezes, flies off, carries electric current,
causes other types of traumatic, caustic, thermal injury or biological contamination.
5) This is a project for scientific teaching or field research and is NOT to be used
for diagnostic testing!
We are sharing our experience, NOT TELLING YOU WHAT TO DO.
If you choose to try this then - it is at your own risk!
- No really, we're not kidding about this.
Step 10: Project Overview:
Center for Parabiotics Research
Section: Prototype Applications - Research Projects
Application: Molecular Diagnosis and Medical Cytology
Technique: Rapid Prototyping for field research
Title: "Coffee-Cup" PCR Thermocylcer for field or teaching applications costing less than 350$ |
This syndrome is most often diagnosed in cases where two people live in close proximity and may be socially or physically isolated and have little interaction with other people.
According to the Wikipedia, folie à deux is a psychiatric curiosity:
"The current Diagnostic and Statistical Manual of Mental Disorders states that a person cannot be diagnosed as being delusional if the belief in question is one 'ordinarily accepted by other members of the person's culture or subculture.'
"It is not clear at what point a belief considered to be delusional escapes from the folie à . . . diagnostic category and becomes legitimate because of the number of people holding it. When a large number of people may come to believe obviously false and potentially distressing things based purely on hearsay, these beliefs are not considered to be clinical delusions by the psychiatric profession and are labelled instead as mass hysteria." |
Since a lot of investment is involved in investing in a property, it is always important to stay alert and wise. That’s because, a lot of complications can come up without any warning such as the likes of tax related issue. Therefore, it is important to know the different types of property ownership involved in related to a property.
- Sole Ownership – A property comprising of a single owner is what defines sole ownership. In such type of ownership, the property rights can be transferred from one individual to another with the set of documents and forms. For example; when the owner of a property dies, then the rights can be transferred to another person depending on the name mentioned on the will.
- Joint Tenancy –Any property comprising of 2 owners is called as joint tenancy. The owners of such a property may be in the form of husband and wife or even 2 business partners. This type of ownership is different when compared to sole ownership where the ownership of the property cannot be transferred in case one of the 2 passes away. In such kind of a scenario, it depends on the criteria mentioned on the will.
- Tenancy in Common –Any property comprising of more than 2 owners is called as tenancy in common. For example; a property comprising of 3 owners where one passes away, then the other 2 owners do not get the ownership of the property. It depends on the information mentioned on the document.
If you find in such kind of a scenario, then make sure to hire the best property development lawyers. |
Great PlainsRocky Mountains in the United States of America and Canada, covering the states of New Mexico, Texas, Oklahoma, Colorado, Kansas, Nebraska, Wyoming, Montana, South Dakota and North Dakota and the provinces of Saskatchewan and Alberta.
The region is arid and generally characterized by rangeland or marginal farmland. Generally it lies west of the 100th meridian, which roughly corresponds with the line west of which there is 20 inches (500 mm) of rainfall a year or less. About every 25 years the region is subject to drought and may be subject to devastating duststorms. The region roughly centered on the Oklahoma Panhandle, including southeastern Colorado, southwestern Kansas, the Texas Panhandle, and extreme northeastern New Mexico was known as the Dust Bowl during the late 1920s and early 1930s. The effect of the drought combined with the effects of the Great Depression, and many farmers were forced off the land thoughout the Great Plains. Another drought has struck the area in recent years.
The southern portion of the Great Plains lies over the Ogallala Aquifer, a vast underground layer of water-bearing strata dating from the last ice age. Center pivot irrigation is used extensively, but the aquifer is being depleted at a rate that is not sustainable.
Historically the Great Plains were the range of the bison and of the Great Plains culture of the Native American tribes of the Blackfeet, Crow, Sioux, Cheyenne, Arapaho, Comanche and others. The tribes of the Great Plains have been found to be the tallest people in the world during the late 1800s, based on 21st century analysis of data collected by Franz Boas for the World Columbian Exposition. Anthropometric historians usually equate the height of populations with their overall health and standard of living.
After the near-extinction of the buffalo and the removal of the Native Americans to Indian reservations, the Great Plains were devoted to ranching and were open range, that is, anyone was theoretically free to run cattle. In the spring and fall, roundups were held and the new calves were branded and the cattle sorted out for sale. Ranching began in Texas and gradually moved northward. Texas cattle were driven north to the railroad, especially to Dodge City, Kansas, then shipped eastward by rail. Many foreign, especially British, investors financed the great ranches of the era. Overstocking of the range and the terrible winter of 1886 eventually resulted in a disaster with many cattle starved and frozen. From then onward, ranchers generally turned to raising feed in order to winter their cattle over.
The Homestead Act of 1862 provided that a settler could claim up to 160 acres (650,000 m²) of land provided he lived on it for a period of years and cultivated it. This was later expanded to include a homestead of an entire section. Hundreds of thousands of Americans and immigrants proved up homesteads, sometimes building sod housess out of the very turf of their land. Many of them were not skilled dryland farmerss and failures were frequent. Germans from Russia who had previously farmed in similar circumstances in what is now Ukraine were marginally more successful than the average homesteader. The Dominion Lands act of 1871 served a similar function in Canada.
|Regions of United States|
|Census Bureau Regions|
|U.S. Midwest | U.S. Northeast | U.S. South | U.S. West|
|Non-Census Bureau Regions|
|East | Eastern Seaboard | Gulf States | Great Lakes States | Mid-Atlantic | Mountain States | New England | North | Pacific Northwest | Plains States | South Central States | Southeast | Southwest | Upper Midwest | West Coast| |
being is coming to terms with yourself and surroundings, and coping well
- or taking the bull by the horns. Work can be stressful. Take care of
your finances, before they bring you down. Breathing deeply and just
hanging from a bar are both relaxing.
Good mental wellbeing doesn't mean you're always happy or unaffected by your experiences. But poor mental wellbeing can make it more difficult to cope with daily
life and modern financial pressures, unless you are retired with all
your direct debits in place.
cause physical side effects. If you're under a lot of pressure, you may start to feel overwhelmed or out of control.
There are lots of things we can try to improve our wellbeing. You might find it helpful to:
Find ways to relax - If there's something that helps you relax, try to find time to fit it into your day.
This could be going for a walk in a field or by the seaside (if you are
lucky). Both are calming and remind us that we live on a beautiful
planet, even when it is raining or snowing.
Take a break
- If you're feeling overwhelmed by a stressful situation, take a short break.
Make something - Doing something creative can help distract you from difficult thoughts or feelings, or help
to process them. It can be very rewarding to make something: a drawing, a cake, carving wood.
Join a class or group - Learning a new skill in a group can be enjoyable, and help boost your confidence.
Try online learning - Online learning is a good option if it's difficult to get out and about or you're short on time.
- If you find that being on your computer or phone a lot is making you feel more busy and stressed,
turn them off for a while. They will bombard you with advertising, for
things you don't want or need.
Time with animals - Lots of people find that being with animals is calming and enjoyable.
Volunteering - Using your time to help others can give you a sense of purpose, help you meet people and boost your self-esteem.
Think about your diet - Try to eat regular meals and have a balanced diet, as this can help your mood and energy levels.
Look after yourself - Basic self-care, like brushing your teeth or having a shower, is important for your physical health and can help you feel better.
Sleeping Well - We need sleep to
allow our bodies to repair. Sleep deprivation can become a problem if
you let it. Establish a routine, to help set a regular sleeping pattern.
A comfortable sleeping environment will improve your sleep. You might sleep better with a low light on, or with different bedding.
After a really good night's sleep, things look different. |
Welcome back guys! You remember i said you that i'm going to make an another instructable for making a patch cable which will connect two identical subwoofers or amplifiers to one audio source?? This is it!! This instructables is useful for DJ enthusiasts also as they'll get to know how their patch cables are manufactured and how they can make one for themselves. Their are several types of patch cables and this is just one of them!
Step 1: Materials and Tools Needed
1. 3.5mm Stereo socket.
2. 3.5mm Stereo Phono Jack.
3. Two RCA Jacks.
4. 1 or 2 mts. Stereo shielded wire.
5. Adhesive(Strong enough to seal).
Tools needed:- Insulating tape, Pliers with inbuilt stripper or separate stripper, Razor, Soldering iron, etc..
Step 2: Working With Shielded Cables
Working with these types of wires may be challenging if basic and proper knowledge is lacking. These are actually two-cored cables with a shielding of ground cable in a zig-zag form. The shielding of signal wires is important as it reduces the impact of outer interfering signals and prevents a hum in the amplifier. Stripping these wires may be difficult because here normal wire strippers won't work, infact it'll just easily damage the shielding wire and make a mess out of it. So, here i'm going to use razor that may sound funny, but it really works! ;)
1st locate a place where you want to strip the wire. Now using razor, try to peel the cover slightly from every side of the wire. Now gently pull out the cover as shown in the image; you'll get wires naked cleanly. Then use a pin or a needle to pull out the two wires(red and black) from the bottom of the cut. Now strip those two colored wires normally as you do. I had an inbuilt stripper on plier, so i used that. Follow the image and you're done!
Step 3: Preparing 3.5mm Socket
Always remember that Red wire is for right channel and Black wire is for left channel. For your convenience i've labelled the 3.5mm socket in the image. Take a desired length of shielded wire and following the 'Step 2' method, solder it on the socket terminals. Then take a piece of steel wire and wrap it around the socket to make a nice firm grip of wire. Lastly, cover the whole socket using insulating tape and put some adhesive to seal it.
Step 4: Preparing 3.5mm Jack
The jack is clearly labelled and all you have to do is to follow the very 1st step and soldering it correctly on correct pins. The red wire goes to the right channel, black goes on left and the shield wire is soldered on the ground metal pin of the jack. After finishing don't forget to grab the wire in the jaws of ground metal pin of the jack, as it will make a sturdy grip!
Step 5: Preparing RCA Jacks
RCA Jacks can be easily prepared as it has only two terminals. After following the 'Step 1', ground wires being common to both Jacks, connect and solder the red wire to the signal pin terminal of the Red Jack and do the same for black. Follow the last diagram that shows wiring of RCA Jacks. Then grab the wire firmly to the metal case jaws.
Step 6: Join the Wires
Join the wires neatly and correctly. First of all, join all the sheilding wires, then the red and the black one. Take a small piece of solder wire and wrap it on all the three joints. Heat the joints slightly using the iron and the solder will firmly stick onto it! ;)
Step 7: Tape the Joints and Seal It
Firstly, tape each joints and insulate them well. Then wrap the tape nicely covering the whole joint. Check the whole wire using a continuity tester before sealing it. If everything's alright, seal the tape joints using the adhesive and you're finished!
Any questions or suggestions are heartily welcomed! :) |
Peru: Booming Economy with Great Social Benefits
Peru, the third largest country in South America, after Brazil and Argentina, has a population of 32 million people, 80% of whom are living in urban areas, with 10 million living in the capital city of Lima alone, and almost 9 million people younger than 15 years of age.
The Peruvian economy grew from a GDP of US$ 58 billion 20 years ago to US$ 211 billion in 2017. GDP per capita (current US$) has also increased dramatically since 1997 and has reached almost US$ 6.6 thousand in 2017. When converted to international dollars (PPP), its GDP per capita grew from less than US$ 5 thousand in 1997 to US$ 13.4 thousand last year, increasing almost 170%. This positive performance is instrumental in Peru’s fight against poverty. Since 2004, poverty rates dropped from 55% to 20.7%. This outstanding progression is expected to continue in the years to come, with a forecasted GDP annual real growth rate of over 4% in the near term.
Favorable international commodity prices, the negotiation and signing of numerous free trade agreements and a business environment that promotes private investment, have greatly contributed to this growth. In the mining sector alone, export revenues increased from US$ 2.7 billion to about US$ 26.8 billion in the last 20 years. In addition, a successful export diversification policy has also contributed to the increase in Peru’s non-traditional exports, especially in theagricultural, fishing, manufacturing and textile sectors. Non-traditional exports reached US$ 11.4 billion in 2017, a notable increase from the US$ 2 billion in 1997. The overall exports from Peru totaled US$ 44.2 billion in 2017. In the first months of 2018 (January-May), exports reached US$ 19.8 billion, 17.8% higher than the amount exported in the same period during 2017.
Imports have also grown tremendously in the past 20 years. In 1997, Peru had a trade deficit of about US$ 1.7 billion, with total imports of USD$ 8.5 billion. By 2017, total imports reached US$ 38.5 billion and a surplus of US$ 5.5 billion. Between January and May of 2018, imports equaled US$ 17.15 million, 13.3% higher than imports during the same period in 2017.
The responsible macroeconomic policies that have been implemented in Peru are reflected in a low and stable inflation rate of 1.4% for 2017. In 2017, Peru’s public external debt was just 15.3% of GDP, down from 33% in 1997. The successful economic and financial story of Peru in recent years is due in part to the impact of the creation of the private pension system, which increased private savings, reaching a total fund of US$ 48 billion at the end of 2017.
Peru is a dynamic tourism and investment destination, having been named the best gastronomic destination in the world for 6 consecutive years.
For more information email us at [email protected]. |
Our Summer Solstice, which is also known as “the longest Day” is celebrated on June 21st and it happens when the tilt of the planet’s semi axis in either the southern or northern hemispheres is more inclined toward the star that it orbits.
The reason for this occurence between the 20th and 22 June is because the Earth’s axial tilt towards the Sun is at it’s maximum of 23 26′. This only occurs twice a year, the other occasion is between the 20th and 22nd Decemer, which becomes the shortest day and it is all due to each time the sun reaches it’s highest point in the sky as seen in the south or north pole and determines the number of daylight hours we receive.
It is believed in ancient history that this date in June helped the people to work out the time of year, especialy for planting and haresting crops.
At Stonehenge, some historians believe that this prehistoric momument in England is true evidence that humans used the Summer Solstice in June to erect a unique stone circle to establish the date of the longest day.
When viewed from its center, the Sun is shown to rise over a certain point on the horizon and can be clearly followed on the stone circle and used as a calendar. Again it helped the people establish what time of year it was to organise their calendars for the rest of the year. |
The Geert Hofstede analysis for Egypt
is almost identical to other Arab countries their Muslim faith
plays a large role in the peoples lives. Large power distance
and uncertainty avoidance are the predominant characteristics
for this region. This indicates that it is expected and accepted
leaders separate themselves from the group and issue complete
and specific directives.
Geert Hofstede analysis for the Arab World, that
includes the countries of Egypt, Iraq, Kuwait, Lebanon,
Libya, Saudi Arabia, and the United Arab Emirates, demonstrates
the Muslim faith plays a significant role in the people’s
Large Power Distance (PDI) (80) and Uncertainty Avoidance
(UAI) (68) are predominant Hofstede Dimension characteristics
for the countries in this region. These societies are
more likely to follow a caste system that does not
allow significant upward mobility of its citizens.
They are also highly rule-oriented with laws, rules,
regulations, and controls in order to reduce the amount
of uncertainty, while inequalities of power and wealth
have been allowed to grow within the society.
these two Dimensions are combined, it creates a situation
where leaders have virtually ultimate power
and authority, and the rules, laws and regulations
developed by those in power reinforce their own leadership
and control. It is not unusual for new leadership to
arise from armed insurrection – the ultimate
power, rather than from diplomatic or democratic change.
The high Power Distance (PDI) ranking is indicative
of a high level of inequality of power and wealth within
the society. These populations have an expectation
and acceptance that leaders will separate themselves
from the group and this condition is not necessarily
subverted upon the population, but rather accepted
by the society as their cultural heritage.
high Uncertainty Avoidance Index (UAI) ranking of
68, indicates the society’s
low level of tolerance for uncertainty. In an effort
or reduce this level of uncertainty, strict rules,
laws, policies, and regulations are adopted and implemented.
The ultimate goal of these populations is to control
everything in order to eliminate or avoid the unexpected.
As a result of this high Uncertainty Avoidance characteristic,
the society does not readily accept change and is
very risk adverse.
The Masculinity index (MAS), the
third highest Hofstede Dimension is 52, only slightly
higher than the 50.2 average for all the countries
included in the Hofstede MAS Dimension. This would
indicate that while women in the Arab World are
limited in their rights, it may be due more to Muslim
rather than a cultural paradigm.
The lowest Hofstede Dimension for the Arab World is
the Individualism (IDV) ranking at 38, compared to
a world average ranking of 64. This translates into
a Collectivist society as compared to Individualist
culture and is manifested in a close long-term commitment
to the member 'group', that being a family, extended
family, or extended relationships. Loyalty in a collectivist
culture is paramount, and over-rides most other societal
More Geert Hofstede Details
by Stephen Taylor - the Sigma |
I saw the most amazing thing in my friendsí yard the other day. It was a hot, dry day. The asphalt on her driveway was hot and dry as well - not the place for a worm (there were a few of those baked into the hardtop) or a thin-skinned frog. But there, sitting on the side of the driveway, were two wood frogs.
Wood frogs are local frogs that live for most of the year in forests - sometimes meadows and marshes - hunting for insects, worms and other small invertebrates at night while staying cool and wet under the leaves during the day. These frogs overwinter under logs and leaf litter, freezing almost solid (they actually have a kind of biological antifreeze in their bodies that prevents ice formation) during the cold winter months and thawing out in the spring. Right now they are actively moving around, seeking out vernal pools (temporary woodland ponds) to mate and lay eggs. They do this fast. Their strategy is to lay eggs early so their tadpoles can metamorphose into frogs that will be able to hop away from these ponds before they dry out by the end of summer. Why lay eggs in a temporary pond? No fish - fish are huge predators on frog eggs.
Usually you see these frogs migrating to their pools on warm, rainy nights, not hot, sunny days. So, what were these frogs doing? A big clue was that one of the frogs (the smaller, male frog) was clinging to the back of the larger, female frog, grasping her firmly just under the armpits. This is a position known as amplexus and indicated that these frogs had already migrated to their pool, started to mate, but then (Iím making assumptions here) must have decided to strike out for a different pool to complete the fertilization process.
In the spring, during wood frog mating season, wood frogs descend en masse upon vernal pools. Males frenziedly seek out females and clasp the female from behind in a mating position known as amplexus. Males have trouble identifying females by sight or smell, instead they must hug potential partners - a female, carrying lots of eggs will feel fatter than a male. Sometimes males make mistakes and have been observed attempting amplexus with different species of frogs or toads, even salamanders! Males will also cling to each other - long chains of a single female with multiple males each clinging to the male in front can form during this time.
Amplexus stimulates egg-laying. As soon as the female releases the eggs they start to swell - the male has to fertilize the eggs immediately after the female releases the eggs, before the eggs have swelled up. So that first male in the chain is the one who will fertilize those eggs - and he wonít let go until the female is finished releasing eggs (up to 1,000 in a mass).
If I had looked carefully at those two frogs on my friendsí driveway I might have been able to see the nuptial pads on the male. During breeding season, the males develop an enlarged thumb with a patch of rough skin. They use these to get a better grip on the female during amplexus.
I wasn't sure what to do. The frogs were just sitting there, baking in the hot sun. They had hopped up out of one vernal pool and appeared to me to be making their way to the vernal pool on the other side of the lawn to finish mating (or perhaps I had misread the cues - was the female trying to discourage her suitor by coming up on land to get him off her back?) In the end I decided to "rescue" them by picking them up and transporting them in the direction they were headed. I hope I did the right thing and didnít stress them out too much, but I figured sitting on the hot tarmac was the worse option. When I tried to catch them, the female hopped away...pretty impressive given the size and relative weight of her cargo. When I finally did catch them I was afraid the male would panic and let go, but he stayed put, sticking to her as I released them into the pool. This was a committed relationship!
Susan Pike, a researcher and an environmental sciences and biology teacher at St. Thomas Aquinas High School, welcomes your ideas for future column topics. She may be reached at [email protected]. Read more of her Nature News columns online. |
What is a weed?
A weed is a plant growing where it is not wanted. Over 1,800 species of plants, many brought from overseas for New Zealand gardens, have spread in the wild. There, they can become pests, climbing over and smothering native plants.
Where they grow
Weeds do not usually thrive in dense, dark bush. They flourish at bush edges, in scrubland, and in open ground that has been damaged by animals, fire or slips. Seeds are carried by wind, water or on people’s shoes. When people dump garden waste near the bush, garden plants may take root.
Weeds can kill native plants, and deprive animals of food and shelter. The Department of Conservation lists about 300 weeds as serious problems in national parks and reserves. But it is expensive and difficult to control weeds. Volunteer groups such as Weedbusters help by pulling out weeds in problem areas.
Some bush weeds
- Woolly nightshade escaped from gardens in the 1880s and is now a common weed in northern bush. Nothing can grow beneath it, as rainwater dripping off the leaves is poisonous.
- Gorse was brought from Britain in the 1830s to make farm hedges. But it has taken over farmland, scrubland and damaged forest.
- Blackberry came with the first British settlers and quickly spread. Today, sprays help control it, but it is still a serious problem in some scrublands and forest reserves.
- Jasmine is a well-behaved garden plant south of Gisborne. But further north, where it is warmer, jasmine climbs up trees and smothers them.
- Old man’s beard has thick stems up to 30 metres long, which strangle trees. A single plant can cover the area of a tennis court. It is illegal to have this plant on your property.
- Wild ginger has exotic-looking flowers, but it has taken over some forest reserves in the north. |
When I was at school I wasn’t a terrible student, but I was terrible at studying. Yes, I was good at cramming my head full of facts and concepts at the very last minute that I was able to recall for tests and exams, but the good grades I often obtained concealed the fact that I wasn’t learning very much at all in this way. Every exam was an uphill struggle and, as soon as it had finished I would forget a considerable amount if not most of what I had learnt.
Like most of my contemporary students and many students nowadays, I believed that spending hours reading, rereading and underlining important bits before an exam was the best way to learn. But it isn’t. It is in fact a very poor way to learn, as none of this does very much for the long term retention of knowledge and improved understanding, which, arguably, are the main objectives of studying.
But in recent years a greater understanding of the principles of cognitive psychology among the teaching profession has generated a renewed interest in what works well and not so well in terms of teaching and learning. So, what do we know about successful studying? How can we best prepare for impending exams?
- Space your studying – Don’t leave revision to the last minute. Instead organise yourself so that you space your studying, revising smaller chunks more frequently in the run up to the exam or, preferably, throughout the course. This is an effective strategy because learners remember information better when they are exposed to it multiple times, not when they cram.
- Interleave different topics – Closely related to the notion of spacing revision, interleaving is the practice of alternating different topics and types of content. Although we may intuitively feel that we learn better by focusing on one topic at a time, this is not actually how we learn best. Research suggests that better, long term retention is achieved when students interleave different but related topics or skills into their revision schedule.
- Pair graphics with text – Your textbook or teacher may well have started capitalising on this by providing you with relevant diagrams, illustrations or mind maps. The reason why this is a great strategy is because graphics present examples and depict overarching ideas or concepts, and in so doing they help to explain how these ideas and concepts connect. If ready-made graphics are unavailable, spend some time as part of your revision schedule creating your own graphics. Not only can this be very handy when it comes to last minute revision, but it will also help you organise and conceptualise your knowledge more effectively, so that you remember it more easily.
- Test yourself frequently – Tests are not just good at assessing how much you know and, therefore, how much you still need to learn, but it turns out that tests may well be more effective at helping with the learning than they are with the assessing. This is because frequent retrieval practice – that is to say: recalling concepts or meaning – is one of the most effective ways to ensure you commit something to memory more permanently. Testing yourself is easier than ever these days, with a multitude of smartphone and tablet apps and web tools that allow you to create your own flashcards and quizzes that you can use and reuse as part of your revision routine.
- Ask the right questions – Research suggests that planning, monitoring and evaluating your own learning have great impact on learning. You can achieve this by asking yourself where a task might go wrong; by breaking down the steps that you think will lead to mastery of a topic; by producing your own worked examples; and by formulating appropriate questions and providing possible answers beyond those already provided by your teachers or textbooks. These metacognitive strategies are effortful but extremely effective in achieving secure knowledge and understanding in any given topic.
When I was at school, I often felt that the climb to get to the top and over Exam Mountain was steep and daunting. With these strategies we are still climbing, but we do so by building the steps and pathways required to get us to the summit more leisurely, so we can then aim higher and be better placed to continue on to the next challenge.
This piece was originally published by Galore Park under the title “Gearing up for the exams”. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.