text
stringlengths 188
632k
|
---|
3. Spotting bots, cyborgs and inauthentic activity
Written by: Johanna Wild , Charlotte Godart
Charlotte Godart is an investigator and trainer for Bellingcat. Before Bellingcat, she was at the Human Rights Center at UC Berkeley, working within its Investigations Lab, teaching students to conduct open-source research on global conflicts for international humanitarian entities.
Johanna Wild is an open-source investigator at Bellingcat, where she also focuses on tech and tool development for digital investigations. She has an online journalism background and previously worked with journalists in (post-)conflict regions. One of her roles was to support journalists in Eastern Africa to produce broadcasts for the Voice of America.
In late August 2019, Benjamin Strick, a Bellingcat contributor and BBC Africa EYE investigator, was analyzing tweets spreading the hashtags #WestPapua and #FreeWestPapua when he noticed accounts exhibiting abnormal behavior. These accounts were all spreading Indonesian pro-government messages at a moment when the conflict in West Papua was gaining international visibility: A local independence movement had taken to the streets to fight for freedom from Indonesian control, leading to violence between the Indonesian police and protesters.
The accounts Strick saw exhibited multiple odd similarities. Soon, he would realize that these were the early indicators of coordinated inauthentic behavior. But at first, he started by noticing the small stuff.
For one, many of the accounts had stolen profile pictures. Take this account for instance, which claimed to be of someone named Marco:
Using Yandex’s reverse image search tool, Strick found that the account’s profile picture had been previously used on other websites under different names. None of the accounts using the photo were for a real person named “Marco.” This proved that the accounts were, at the very least, misleading about their true identities.
Beyond faking their identities, Strick also found the accounts published similar or even identical content while often retweeting one another. Even more striking was that some of them showed precise synchronization in the timecode patterns of their tweets. For example, @bellanow1 and @kevinma40204275 mostly published their tweets at minute 7 or minute 32 of any particular hour.
It’s unlikely that a human would adopt this kind of tweet rhythm. This synchronization across multiple accounts, combined with their misleading photos, suggested the accounts were not linked to real identities, and could be automated. By analyzing suspicious account patterns such as these, Strick eventually concluded that the accounts were part of a pro-Indonesian Twitter bot network that was spreading one-sided and misleading information about the conflict in West Papua. (You can read more about the larger network these accounts were part of in the chapter 11b case study, “Investigating an Information Operation In West Papua.”)
What’s a bot? The answer is more complicated than you might think
The West Papua case is far from being the only information operation to use social bots. Other operations have been much more widely publicized and criticized, although at their core they contain similarities in how they operate.
A bot is a software application that can automatically perform tasks assigned to it by humans. Whether a bot does good or bad completely depends on the intentions of its “owner.”
The bots most often referred to in public debates are social bots, active on social networks including Facebook, Twitter and LinkedIn. On these platforms, they can be used to spread specific ideological messages, often with the aim to make it look as if there is a groundswell of support for a particular topic, person, piece of content or hashtag.
Social media bots tend to fall into three main categories: the scheduled bot, the watcher bot and the amplifier bot. It’s important to know which kind of bot you’re interested in because each type has a specific purpose. With each purpose comes a different language and communication pattern. In the context of disinformation, we’re most interested in looking into the amplifier bot.
The amplifier bot exists to do exactly what it sounds like: amplify and spread content, with the goal of shaping online public opinion. It can also be used to make individuals and organizations appear to have a larger following than they really do. Its power comes in numbers. A network of amplifier bots can attempt to influence hashtags, spread links or visual content, or gang up to mass spam or harass an individual online in an attempt to discredit them or to make them seem controversial or under siege.
By working together in large numbers, amplifier bots seem more legitimate and therefore help shape the online public opinion landscape. Amplifier bots that spread disinformation do it mainly through hashtag campaigns or by sharing news in the form of links, videos, memes, photos or other content types. Hashtag campaigns involve bots constantly tweeting the same hashtag, or set of hashtags, in coordination. The goal is often to trick Twitter’s trending algorithm into adding a specific hashtag to the trending topics list. An example is “#Hillarysick,” which was propagated widely by bots after Hillary Clinton stumbled in September 2016, shortly before the presidential election. (It’s also important to note that hashtag campaigns don’t require bots, and can be more effective without them. See this investigation of human “hashtag mills” in Pakistan from Dawn.)
Purchasing and creating bots is relatively easy. Countless sites will sell you your own bot army for just a couple of hundred dollars or even less. But a sophisticated, humanlike botnet is much harder to create and maintain.
How to recognize bots
Developers and researchers have created many tools to help assess whether an account might be automated. These tools can be useful in gathering information, but a score from one tool is by no means definitive and should never form the sole basis of any reporting or conclusion.
One of the most well-known tools is Botometer, created by researchers at Indiana University. Based on various criteria, it calculates a score for how likely it is that a Twitter account and its followers are bots.
While there are exceptions, most publicly available bot detection tools have been created for Twitter. The reason is that many social networks — including Facebook — restrict their APIs (application programming interfaces) in a way that prevents the public from analyzing and using their data to create such public tools.
As noted earlier, bot detection tools are a great starting point but they should not be your sole evidence. One reason for their varying degree of accuracy is there is simply no universal list of criteria for recognizing bots with 100% certainty. There’s also little agreement about how to classify something as a bot. Researchers at the Oxford Internet Institute’s Computational Propaganda Project classify accounts that post more than 50 times a day as having “heavy automation.” The Atlantic Council’s Digital Forensics Research Lab considers “72 tweets per day (one every ten minutes for twelve hours at a stretch) as suspicious, and over 144 tweets per day as highly suspicious.”
It can often be challenging to determine whether a disinformation campaign is conducted by social bots or by humans who are motivated or paid to post large amounts of content about a specific topic. The BBC, for instance, found that accounts who posted similar Facebook messages amplifying favorable content about Boris Johnson in November 2019 were managed by people who pretended to be social bots.
You might also encounter cyborgs, social media accounts that are partly automated and partly managed by humans, which display a combination of natural and inauthentic behavior. Journalists must avoid falsely labeling suspicious accounts as bots without proper evidence and analysis, as a mistaken accusation can undermine your credibility.
One way to deal with these different types of bots, cyborgs and hyperactive human accounts is to focus your investigation on monitoring all inauthentic or bot-like behavior, instead of trying to identify only one type of suspicious account.
For example, Bot Sentinel provides a publicly available database containing (U.S.) Twitter accounts that exhibit suspicious behavior. Their creators decided to collect “accounts that were repeatedly violating Twitter rules” instead of specifically searching for social bots.
Steps to investigate inauthentic behavior
In general, we suggest the following approach for identifying inauthentic and potentially automated behavior on social networks:
1. Manually check the accounts for suspicious behavior.
2. Combine this with the use of tools or more technical network analyses.
3. Investigate their activity, content and network of other accounts they interact with. Combine this with traditional investigation techniques, such as trying to contact them or people they claim to know.
4. Consult with outside experts who specialize in bots and inauthentic activity.
To learn how to manually assess suspicious accounts, it’s important to understand the typical warning signs of automated accounts on Twitter, or other social networks.
Every social media bot needs an identity. Bot creators want to make their accounts appear as convincing as possible, but it takes time to set up and maintain credible-looking profiles, in particular if the goal is to run a large bot network. The more accounts someone has, the more time-consuming it is to create and manage them in a way that makes them seem authentic. This is where these accounts slip up. In many cases, their creators do the bare minimum to establish a profile, and a good investigator can detect this.
Here are a few things to look for:
No real profile picture
A stolen profile picture (as seen in Benjamin Strick’s West Papua investigation) or no profile picture at all can be an indicator of inauthenticity. Since bot creators want to create many accounts at once, they have to obtain a collection of photos and often copy them from other websites. However, doing so creates inconsistencies. For instance, an account with the profile photo of a male but a username implying that a female is the owner of the account could be a signal that something isn’t right. To get around this issue, many bot creators choose cartoons or animals as profile pictures, but again this tactic becomes another pattern to use to detect inauthentic or bot accounts.
Automatically created usernames
Next, look out for names and usernames. Every Twitter handle is unique, which means the username you want is often already taken. This is an inconvenience to the average person, but becomes a real challenge when you’re trying to create 50, 500 or 5,000 accounts in a short period of time.
Bot creators often deploy a strategy to help them easily find unused usernames. Scripts with criteria like the following are used to automatically create usernames:
When you notice several Twitter accounts with handles consisting of the same number of characters and digits, you can manually search for more accounts with that pattern in each of the accounts’ followers list to potentially identify a network.
In this example, the accounts have something else in common: They all were created in September 2019. When combined with other signals this can be an indicator that the accounts were all done at the same time by the same person.
Account activity does not fit age
You should become even more suspicious if a new account already has a relatively large number of followers or if it has published a large number of tweets within a short time. The same applies if an older account has very few followers despite being very active.
If you come across such an account, analyze the account’s tweet activity more deeply. Take the number of tweets located at the top of the page, and divide this by the number of days the account has been active. For example, take an account that has 3,489 tweets as of Nov. 11, 2019, and was created on Aug. 15, 2019. Divide 3,489 by 89 (the days it’s been active), and you get 39.2 tweets per day.
Looking at the tweets made over the lifetime of the account, does the number seem too high, unrealistic or not maintainable?
Suspicious tweet patterns
Another element to examine is tweet rhythm. Humans might show slight preferences for the days and times they usually tweet, but it is unlikely that a person posts consistently only on Monday, Tuesday and Wednesday and is completely silent on all other days of the week over a long period of time.
If you want to see these patterns visualized for one specific account, check out the account analysis tool built by Luca Hammer:
Visualization as part of your investigation
To get a better understanding of the activity of a whole bot network, you can use a visualization platform like Gephi. Bellingcat contributor Benjamin Strick used this tool to analyze the connections between Twitter accounts belonging to a pro-Indonesian bot network.
By looking at the visual representation of the connections between a large number of Twitter accounts, he noticed that the structure on the left side of the picture (in red) stood out.
By zooming in on this area, he could see which Twitter accounts were part of this specific structure.
Each red circle represents a Twitter account and the lines are the relationships between them. Usually, smaller accounts are arranged around a bigger circle in the middle, which means that they all interact with the influential account. The accounts in the structure above, however, did not interact in that way with one another. This led Strick to analyze those abnormal account’s behavior.
The future of social bots: Can we out-trick them?
The technology behind social bots has become much more advanced in the last few years, allowing these small software applications to become more adept at simulating human behavior. We are getting to the point where people are predicting that artificial users could engage in sophisticated online communications without their human counterparts realizing that they’re actually having a long conversation with a bot.
However, as of now there is no proof that high-level, machine-learning-empowered social bots exist or are being deployed. For now, it seems that many disinformation campaigns are currently still receiving support from less-complex amplifier bots.
“I don’t think that there are many sophisticated social bots out there that are able to have real conversations with people and to convince them of certain political positions,” said Dr. Ole Pütz, a researcher for the project “Unbiased Bots that Build Bridges” at Bielefeld University in Germany.
According to him, the best way to help the public recognize inauthentic behavior on social networks is to use a detection method that catalogs and weighs all the factors that make an account suspicious. As an example, he says, “This account uses a script to retweet news, it automatically follows others, and that one never uses speech patterns that humans would normally use.”
For now, a methodical analysis of account behavior, content, interactions and patterns remains the best approach for identifying inauthentic behavior.
In our case study chapter, we provide a more in-depth and technical explanation of how we analyzed the different factors in a suspicious Twitter network related to the Hong Kong protests. |
Published on August 25, 2011 by Amy
There are many types of grants available, which serve a variety of purposes. Although the government will readily advertise free money, qualifying for a grant is not easy. However, it has been proven that minorities have a better chance of locating and getting approved for a government grant.
dna testing, dna ancestry testing, ancestry, genealogy, indian genealogy records, paternity testing, turquoise jewelry, native american jewelry
Native American descendants may take advantage of Indian grants. Indian grants consist of free government money than can be used to assist these individuals with starting a business, paying college expenses, etc. There are numerous Indian tribes. Some grants are intended for specific groups. For example, if you are a Blackfoot Indian, you will not qualify for a grant intended for the Cherokee Indians.
One type of Indian grant includes obtaining money for school. Grants are not loans. Unlike loans, you do not have to repay a grant. However, to qualify for free money, all money must be used for a specific purpose. Thus, you cannot obtain a $20,000 education grant, and then use $5000 to payoff debt. The government is very particular about grant funds. If an education Indian grant is used for another purpose, the person receiving the funds is required to payback the money.
Another type of Indian grant includes obtaining free money to start a business venture. Applying for these types of grants is tricky. If a business will be financed with a grant, the government has strict guidelines. For example, the business must be used to better the community. Also, there must be a need. In other words, getting a grant to open a hair salon or nightclub is practically impossible. However, the government may approve a grant to open a daycare center that caters to low income families or children with special needs. If the goal is to finance a new business with government money, select a business venture that is needed in your community. |
Author : Yvonne Winkel.
Published : Sat, Mar 30 2019 :11 PM.
Format : jpg/jpeg.
In a cultural diversity class the author had an assignment to write an essay to ...review a current article that discusses or illustrates the portrayal of some aspect of cultural diversity in U.S.society. One current article which appeared to meet the assignment directions concerned black officers in the U.S. military -- it illustrated an aspect of cultural diversity in U.S. society. So the general topic of the proposed essay became A review of a current newspaper article that discusses black officers in the U.S. military illustrating an aspect of cultural diversity in the U.S. This statement of the general topic of the proposed essay serves as the basis for the first sentence in the introductory paragraph. The first sentence of the example introductory paragraph might be something like The media addressing some aspect of cultural diversity that was selected for this paper is a newspaper article discussing black officers in the U.S. military. Notice how this sentence clearly states what is the general topic of the essay which IS the main point of the introductory paragraph. Also notice how words from the assignment directions are used in this sentence -- communicating to the essay evaluator that the writer is paying attention to the assignment directions.
So the third sentence in the example introductory paragraph is expected to clearly communicate to the reader how the information in the second sentence does support the main point of the paragraph as stated in the first sentence. For this example, a third sentence might be something like This information clearly indicates the selected newspaper article presents some aspect of cultural diversity, that aspect being blacks in the U.S. military still struggling to achieve higher ranks. Notice how this sentence communicates explicitly to the reader the writer`s understanding of exactly how the information presented in the second sentence supports the main point stated in the first sentence. At this point, the main point of this paragraph HAS BEEN MADE.
Following the four-sentence process for paragraph development, the second sentence is expected to provide some information that illustrates or supports the point stated in the first sentence. For this example essay assignment, the located newspaper article that discusses black officers in the U.S. military IS the support or evidence to present in the second sentence -- and the article located, via some online research is titled After 60 years, black officers rare by L.C. Baldor, published in The Times Herald, 7/28/08. So the second sentence of the example introductory paragraph might be something like In the newspaper article `After 60 years, black officers rare,` the author of the article indicates that although `Blacks have made great strides in the military since it was integrated 60 years ago, but they still struggle to gain a foothold in the higher ranks [in the military]`. Of course, at the end of this sentence is expected a citation to show the source of the information presented in the second sentence -- like (Baldor, 2008, ¶ 1). Please note the role of a citation is to point the reader to the related reference that is expected on the References page at the end of the essay -- and note the citation consists of last name of the author, year of publication of the article, and, in this case, a number indicating the specific paragraph in the article where the cited information may be located (because this online article did not provide page numbers). What to notice in this second sentence is how the information presented in the sentence directly supports or MAKES the point stated in the first sentence, BUT, don`t leave it up to the reader to make that connection on his or her own -- in the third sentence, communicate explicitly to the reader how YOU, the writer, understands the information in the second sentence demonstrates the point stated in the first sentence.
Essays are personal--the best of them can seem like conversation with an intelligent, provocative friend, but one with remarkable discretion in editing out the extraneous. Whether the word I appears at all, you must be in your essay, and pungently. It can`t be simply How I Spent My Summer Vacation; it must be How I Spent My Summer Vacation Tearfully Mourning My Dead Ferret. Never hide in an essay. Essays aren`t formless dough, they are the baked bread, hot and crusty. Cranky, apprehensive or playful, your candid voice should be a constant: you don`t want your essays to roar like a lion in one paragraph and bleat like a mewling lamb in another (unless it`s done for effect).
Writingeflective essay write online guided tool creative examples outline example of introduction gibbs
Write online guided writing tool reflective essay creative examples on leadership
Writing reflective essay example introduction examples of essays in nursing using gibbs model on group work how to
Essayeflective examples for high school how to write writing example of in nursing using gibbs model
Essay writingtive introduction example of gibbs in nursing on group work experience how to write
Writinglective essay critical examplelection ethnography examples sample nursing using gibbs model of introduction
Writing reflective essay on group work
Writingective essay write online guide how do i get started example of in nursing gibbs
Writing reflectiveay write online guide how do i get started in third person
Writing reflective essay example of gibbs in nursing how to write 3rd person on work experience
Writing reflectiveay write on shakespeare group work creative
Sample nursing reflectiveay using gibbs model writing example how to write in 3rd person
Writingive essay helping with homework coast chapel church santa cruz using gibbs model creative
Writing reflective essay higher an example of critical examples essays in nursing using gibbs
Writing reflective essay tips and guides for visual ly creative examples on
Writingive essay depaul homework service elpaperzcjc on in third person example of introduction
Writingtive essay using gibbs model outline example of
Writing reflective essay in third person on leadership how to write 3rd outline
How to write reflective essay in 3rd person writing on leadership example third
Writing reflective essay in third person nursing creative examples on work experience
Writing reflective essay examples lexu tk in nursing example of gibbs how to write 3rd
Essay writing reflective on group work outline sample nursing using gibbs model
Writing reflective essay in nursing example of introduction how to write 3rd person creative examples
First-person essays span space, time and subject: the city dump, an obsessive bird, or a toy from the 60s--all subjects of essays I`ve published--are just one shuffle of an endless deck of compelling themes. Mongrel lot or not, it`s never the subject of an essay that tells, but the style and stance of its author--what might seem the least likely of essay subjects can be made a piquant page-turner by a writer`s winning hand. We`ll look here at choosing the topic, slant and voice of your essay, constructing a lead, building an essay`s rhythm and packing a punch at essay`s end.
Your essay must have strong roots, and support one side of the argument. And example of this would be if you are writing your essay about immigration laws, you might shed a light on the social issues that are involved concerning illegal immigration. And what hardships Americans face due to the overwhelming population of illegal aliens. The facts that are included in the argumentative essay must relate directly to the theme of your essay. Do not falsify or exaggerate any facts that support or oppose your point of view; this can be misleading to the reader and have an adverse affect on the quality of your essay. Even though you essay may contain very good information, one false piece of information can ruin your entire essay. You can input ideas into your essay, but be sure they are in direct relation to the facts that you have already provided in the essay. |
Seamless Precision Tubes History
When considering the advances made in modern medicine since the late 1800s, what breakthroughs and major milestones come to mind? Certainly the invention of the x-ray or the widespread use of general anesthesia. But considering all the scientific progress made during the second half of the 20th century, few realize the vitally important contribution of seamless precision tubes to our fundamental health and wellbeing.
From superelastic needles used to robotically ablate tumors to miniaturized pacemakers, the unmatched reliability, strength, flexibility and concentricity of seamless precision tubes have helped make surgeries less invasive, biopsies easier, and a whole host of other medical procedures more comfortable and less traumatic for patients.
In many surgical and medical applications, medical device materials come into contact with solvents. Some of these fluids are extremely corrosive and make the use of plastic devices impractical or dangerous. Even exposure to pure water, when given enough time, will cause many products to corrode and eventually fail. In the medical device industry, premature failure of critical components is simply not an option when a patient’s life is at stake.
That is why medical device manufacturers rely heavily on seamless precision tubes. For their industry leading concentricity, along with its high degree of corrosion resistance, excellent fatigue life, large recoverable deformations, kink/crush resistance and exceptional superelastic behavior at or near human body temperatures, Confluent Medical Technologies’s industry leading premium seamless precision tubes cannot be rivaled. |
When we think of gut health, we automatically think of our stomach in most cases but the gut comprises a huge expanse in the human body, the whole way down from the mouth to the anus.The body houses trillions of bacteria and the most densely populated areas of bacteria are actually in our gut.
What you eat can have a huge bearing on how well your body performs. Therefore, it is wise to feed the good microbes the right food as these bacteria play a critical role in digestion, immune function and weight management.
Microbiotics are the beneficial bacteria, also known as live cultures, that live in the intestinal tract. Although the word bacteria is usually associated with germs and illness, beneficial bacteria are essential for the body to function properly.
From new born infants to grandparents there is a formula that Udo Erasmus has created to best serve the gut flora appropriate to each age group. Beneficial bacteria are essential for digestive health at all stages of life, from infant to advanced age, which means that microbiotics are good for everyone.
Digestive enzymes are like scissors that cut up the foods we eat into basic building blocks that our body then absorbs and reassembles to build cells, tissues, organs, glands and entire body systems.The human body makes and uses more than 3,000 kinds of enzymes that initiate or speed up chemical reactions.
Udo’s Choice Digestive Enzyme range contains plant based enzymes to assist the breakdown of fats, carbohydrates, soluble fibre, starch, milk sugar and complex sugars aiding healthy digestion and nutrient absorption. They do this by providing enzyme activity combinations which are precisely balanced to optimize the body’s absorption and use of food nutrients.
Tips to Top-Up your digestive health
Tip 1: Eat a wide variety of vegetables, nuts and seeds
Plant based foods provide the gut with the fibre it needs to feed and keep it healthy - keep a diary and ensure you are eating 5-10 portions daily. Diversification is key, as like anything, if you keep on having the same foods the body will get lazy and bored! Having a rotation of different fruits, cruciferous veggies, fibrous vegetables, wholefoods and nuts will go a long way to help keeping the gut happy. Try foods like, carrots, broccoli, pumpkin, squashes, cauliflower, cabbage, aubergine, radishes, sweet peppers, apples, pears, berries, basil, parsley, dill, lettuce, brazil nuts, almonds, walnuts, cashew nuts, sunflower seeds, flaxseeds, sesame seeds are a great starting point – go and explore your local market and see what foods are in season!
Tip 2: Include prebiotic foods that ‘fertilise’ the gut
Prebiotic foods are also important as the fibre in these veggies will help to feed, nourish and stimulate the growth of the good bacteria found in the large intestines or colon. They act as a fertiliser for the good bacteria that is already there. Prebiotic foods are garlic, leeks, red and white onion, bananas, oats, asparagus, chicory, Jerusalem artichokes and black strap molasses.
Tip 3: Add in probiotic foods to support the gut
Probiotic foods introduce bacteria into the gut to help support and build the good bacteria against the bad bacteria. Fermented foods such as Kombucha (fermented tea), kimchi (fermented vegetables), sauerkraut (fermented cabbage), miso soup (fermented soy), yoghurt and kefir (fermented milk). Udo’s Choice Beyond Greens contains a fermented grass blend of oat grass, barley grass, wheat grass and alfalfa grass creating it’s own probiotics that may help re-establish a healthier intestinal tract and improve digestion.
Tip 4: Top-Up with a ‘live’ bacteria and digestive enzyme supplement
Poor diet or health, antibiotics or simply the stresses and strains of modern living can disturb the delicate microflora environment in the digestive tract, compromising health in all kinds of ways. Udo’s Choice Super 8 replenishes gut bacteria. It contains 8 live bacteria strains which will support the upper and lower digestive tract - Lactobillus in the small and Bifidobacterium in the large. By including strains from both families Super 8 ensures that your entire digestive system is covered. |
The cephalopods are part of the class of invertebrates that include octopuses, squids, and nautiluses, all grouped under the phylum of mollusk. The speciation of cuttlefish and other cephalopods is quite complex, as can be seen in this Encyclopedia of Life link. The common cuttlefish is known as sepia officinalis.
The biological mechanism behind this intricate and fast acting camouflage capability includes a network of more than 20 million specialized cells called chromatophores that contain sacs of pigment. As in Figure 1 below, the chromatophore cells are attached to muscle fibers that connect to the cell body radially and are innervated with nerve axons.
The colors of the chromatophore pigmentation are yellow, red, and brown. There are other cells involved in cuttlefish coloration, but the chromatophores are the most kinetic of the set owing to their nexus with the neuromuscular system.
In the illustration in Figure 2 below, we see on the left a chromatophore cell at rest. On the right we see the cell activated via expansion of the radial muscle fibers. Note how the yellow pigment sac in this instance is stretched out by the strands of muscle, increasing it's surface area sufficiently to render the color visible.
This color palette ensures that the cuttlefish can produce virtually any color in the color spectrum. When you're an extant species belonging to a biological class that originated in the Ordovician era, between 485 and 444 million years ago, there's been much time for evolution to solve certain adaptation problems.
Although the issue is not definitively settled, the current consensus among marine biologists appears to be that cuttlefish process their background environment visually, via their "W" shaped eyes.
That visual sensory input subsequently undergoes highly sophisticated neural processing, sending commands to the radial muscle fibers attached to the chromatophore cell bodies. Specifically, on how to expand in the correct sequence and combinations in order to produce the desired skin color and body shape. The fact that this process is coordinated at so many levels of organization so quickly staggers the imagination.
Obviously the ability to innervate over 20 million cells in order to produce complex colors and shapes, informed by background color/textures cues no less, requires gargantuan neural processing power. It turns out that cuttlefish, along with other cephalopods, have large brains and a high encephalization quotient. This metric is thought to be a predictor of sorts of the intelligence of an animal.
The PBS NOVA video embedded below from 2007 offers a fascinating glimpse into the behavior and biology of this magnificent animal, and is well worth the time. |
Native American culture
Native Languages of the Americas:
Yaqui Legends, Myths, and Stories
This is our collection of links to Yaqui stories and folktales that can be read online.
We have indexed our Native American folklore section
by tribe to make them easier to locate; however, variants on the same
legend are often told by American Indians from different tribes, especially if those tribes are kinfolk or neighbors to
each other. In particular, though these legends come from the Yaqui tribe, the traditional stories of
related tribes like the
Pima and Papago are very similar.
Enjoy the stories! If you would like to recommend a Yaqui legend for this page or think one of the ones on here
should be removed, please let us know.
Mother Earth in traditional Yaqui religion (her name literally means "our mother.")
She was considered to be the mother and guardian of the
Yaqui people. After Catholicism was adopted by the Yaquis, she became merged with Jesus'
mother Mary (a situation that is common in Mexico, where pre-Columbian goddesses often
became absorbed into local versions of Mary.) Today, most Yaquis
consider the Virgin Mary and Itom Ae to be one and the same.
Yaqui Indian Folklore
Yaqui Myths and Legends:
Online collection of Yaqui legends and traditional stories.
The Surems and the Talking Tree Yomumuli and the Little Surem People:
Yaqui legend about a Surem woman who foretold the future.
The Yaqui Curandero The Yaqui Doctor:
Yaqui legends about a traditional healer punished for cheating death.
The Enchanted Pascola:
Yaqui legend about a clumsy dancer who received powers from a magic goat.
Ku Wikit The Ku Bird:
Yaqui stories about the origin of the first parrot.
How The Mountains Were Created:
A Yaqui fusion legend about how Itom Ae and Jesus made the mountains.
The Legend of Skeleton Mountain The Big Bird:
Yaqui legends about a monster bird that carried off people.
The Snake People:
Yaqui story about a man punished for injuring a snake.
The Singing Tree:
Yaqui myth about a prophecy received from a sacred tree.
Yaqui Myths and Legends:
Collection of Yaqui legends and traditional stories.
Deer Dance: Yaqui Legends of Life:
Another good collection of Yaqui myths and folklore.
Great collection of traditional tales about little people from the Yaqui and other tribes.
Yaqui religion and expressive traditions
Yaqui and Mayo Easter ceremonies
Books of Native American legends
Native Americans of the Southwest
The American Indians
Back to the list of Native gods and spirits
Back to the Amerind homepage
Buy some Native American literature
Arizona Indian reservation map
Would you like to help support our organization's work with endangered American Indian languages?
Native Languages of the Americas website © 1998-2015 Contacts and FAQ page |
Introduction and Specifications
One of the most renowned and visited hydroelectric power plants of Sri Lanka, the Udawalawe Hydroelectric plant generates a total of 6 MW of power to the surrounding region. The water that powers and makes the generation of electric power possible at this particular power plant is obtained from the Uda Walawe Water Reservoir. The Udawalawe Dam, which was established decades ago, has paved the way for the reservoir and the immediate natural surroundings of the dam oozes resplendent charm and beauty.
The year during which the Udawalawe hydroelectric plant was commissioned is 1969 and it is three years later that the Udawalawe Reserve was designated as a national park of Sri Lanka. A tour or visit to the hydroelectric power plant will yield a valuable experience as one could learn how a hydroelectric power plant operates as well as the mechanisms and equipment utilised by the plant. First-hand observations of the Udawalawe hydroelectric plant is certain to render a bushel of information and amazement for the observer.
When analysing how the plant operates, it is necessary to understand that a dam creates a huge amount of pressure in the water that is being collected. This water pressure enables the water that is fed to giant turbines to generate a substantial amount of electric power as the turbines produce movement and energy. The power house that have been established to facilitate the production of electricity via the hydroelectric power plant operates as two units and visitors can observe these two units during their tours.
Location and Surroundings
The hydroelectric power plant that operates due to the Udawalawe Dam is situated close by the Udawalawe National Park. Due to the high degree of popularity and acclaim the park enjoys, the hydroelectric plant automatically receives recognition as the local residents and / or tour guides provide information of the attractions surrounding the Udawalawe Park.
Another popular tourist attraction, the world famous and the United Nations’ world heritage site of Sinharaja Forest Reserve is located in the vicinity of the power plant. Tourists will also find other tourist destinations such as the Suriyakanda site in the area and all of these attractions enhance the value of visiting the hydroelectric power plant of Udawalawe.
The circuit bungalow of the Ceylon Electricity Board that is situated near by the Udawalawe Hydroelectric Power Plant provides accommodation facilities. This particular bungalow is located at a particular village in the vicinity and it belongs to the CEB, the entity responsible for the power plant. In order to locate the circuit bungalow, tourists can ask for directions to this particular village, which is named Kapugala Village. The village of Kapugala is situated close by Pallebedda, which is a city located minutes away from Udawalawe. |
We are presently in an omics revolution in which genomes and other omes can be readily characterized, and new omics technologies can be applied to understand fundamental biology and improve human health. Our laboratory has invented many technologies to analyze genomes, transcriptomes and other omes.
We have applied these to:
1 ) Study fundamental principles of regulatory networks
2) Analyze human variation i.e. what makes people different from one another
3) Perform deep omics profiling/big data collection on individuals over time to understand what keeps them healthy and what happens when they become ill or undergo other sorts of changes (e.g. diet, etc)
4) Solve mystery diseases and disease prognosis.
Regulatory Networks and Noncoding Regions of the Human Genome
We have developed methods for mapping transcription factor binding sites through the genome. We used these approaches to develop regulatory maps and help decipher the combinatorial regulatory code – which factors work together to regulate which genes. Using this approach we are mapping pathways crucial for cell differentiation using iPSCells and for understanding regulatory networks. We are also analyzing the role of regulatory sequences in metabolism, cancer inflammation and autism.
We have been analyzing differences between individuals and species. We developed paired end sequencing for humans and found that humans have extensive structural variation (SV), i.e. deletions, insertions and inversions. This has now been shown to be a major cause of phenotypic variation and human disease. In addition, by mapping binding sites difference among tissues and cells of different humans, we have found that individuals differ much more in their regulatory information than in coding sequence differences.
We can correlate these differences with those in SNPS and SVs, thereby associating noncoding DNA differences with regulatory information. Â We are presently expanding this analysis to examine differences in other types of molecules: transcriptomes, proteomes, metabolomes, immunomes, microbiome, etc.
Personal Omics Profiling, Wearables and Human Disease
Our understanding of human health and what happens when people transition to disease is quite limited and poorly understood on a personal level. We have set up integrated Personal Omics Profiling (iPOP) in which we determine the genome sequences of people to predict disease risk and also analyze their transcriptome and proteome, metabolome, cytokines, immune cells and molecules in blood and/or urine in unprecedented detail over time. In this manner we determine people’s healthy state and what happens when they undergo a illness (e.g. viral infection) or other changes (diet, colonoscopy, exercise, weight gain or loss), all at a personal level.Â
By following a cohort of over 100 individuals we have found novel biological pathways and relationships that that occur during these periods as well as valuable information that helps manage the health of individuals.
Recently we have also pioneered the use of wearable devices for continuous and frequent monitoring of physiological parameter and shown that these can be used to:
1) detect early signs of inflammatory diseases (colds and Lyme disease)
2) distinguish insulin resistance (which is associated with Type 2 Diabetes
3) decrease blood oxygen and fatigue on aircraft.
Solving Underlying Genetic and Epigenetic Causes of Human Disease
We have established pipelines for mapping genomes and identifying genetic mutations underlying human disease. Using these pipelines we have solved a number of undiagnosed diseases including those involved in immunology (TT7, NFKappaB), developmental delay (NGLY1), inflammatory bowel disease (HSP1LA) and others. We are also examining the role of epigenetics (DNA Methylation, Chromatin) in human diseases such as autism and cancer.
Donations are vital to the achievements of the Snyder Lab and are greatly appreciated. Direct gifts support our research. Checks payable to Stanford University. Please note on the check WAZC/Genetics and specifics of where the funds should be directed. Thank you.
Kindly send by mail to:
PO Box 20466
Stanford, CA 94309
CALL US: 650.725.2504
CONTACT US: [email protected] |
Crafts: A Fun Family Affair
When we see interesting pottery, hand-carved wooden bowls and intricate weavings in galleries, museums, and shops, we often feel a sense of awe for the craftsmanship and beauty of the object. But when we think about “crafting” with our children we may worry that we are not creative enough or that the end result won't be “perfect.”
Similar to other educational experiences, it is the process, not the product, that matters. When children are engaged and focused on making crafts, they learn to take initiative, make choices, and develop cognitive and physical skills, while also increasing confidence, competence, independence, and a personal sense of aesthetics. With a small amount of planning, your family can enjoy the experience of making craft projects together that emphasize the creative process and result in a fun family creation.
There are numerous resources and suggestions for family craft activities in magazines, books, and online. Use what you find as the basis for your family craft and then let your child’s (and your) imagination and creativity soar. Try to resist the urge to copy the actual craft or focus on the end product—the goal is to respect your child’s process and encourage exploration no matter what the result looks like.
Key to a successful experience is to plan an activity that is appropriate for your child’s stage of development. Below are a few suggestions for different age groups to get you started.
Three Years and Older
- Painting: Often the crafts most appreciated are those with the most open-ended opportunities. Purchase some washable paint and white paper and let each family member paint as many pictures as they would like.
- Picture Frames: Frames may be purchased at a craft store or made by gluing four wooden craft sticks together. Provide glue, glue brushes (if desired), and recycled objects, such as random puzzle pieces, large buttons (too big to swallow), pieces of paper or fabric, or anything around the house that is not a choking hazard to decorate the frame.
- Decorated Boxes: Wooden or cardboard boxes may be purchased at a craft store or found around the house—you can even use shoe or check book boxes. Children can paint the boxes and then paste on photographs or pictures from magazines.
- Pinecone Bird Feeders: Family members can cover pinecones with peanut butter (or if allergic to peanuts, suet, which can be purchased from a butcher). Use brushes to spread the peanut butter or suet all over the pine cone, and then roll it and sprinkle the inside with bird seed. Or recycle your orange peels to make this adorable bird feeder. Hang it outside and watch what happens.
Four Years and Older
- Greeting Cards: Your family may enjoy making their own cards to send to extended family and friends for special occasions. Card stock paper and envelopes can be purchased at craft stores, or use computer paper and no envelopes. Provide scrap paper to make collages and/or crayons and markers to decorate and write a greeting.
- Bill or Paper Holders: Each family member finds a special rock; paints it and then uses glue to attach a clothes pin. A second option is to glue wood scraps together, paint the sculpture and add two clothespins to the top. Or, simply paint the rocks and use that as a paper weight. See what happened when we challenged our teachers and families to a rock decorating contest.
- Family Mural or Gift Wrap: Provide large paper from an office supply store and create a family mural where everyone gets to draw, color or paint on the same large surface. Hang it in your family room or use for wrapping gifts.
- Planters: Family members decorate clay pots with paint, pictures, or tissue paper. Cut pieces of tissue paper into small squares. Mix starch and water. Everyone uses starch to paint over the tissue paper and adhere it to the pot. To give the pot a smooth surface, the children then go over the tissue paper with “Mod Podge” (may be purchased at a craft store). Then use a paint brush to paint over the pots with two coats of Mod Podge, to give the pot a smooth surface.
Six Years and Older
- Jewelry: Children can make necklaces or bracelets by stringing beads purchased at a craft store. The younger your child, the bigger the beads and thicker the string should be. Your family can also make beads using clay or modeling dough. Decorative pins can be created gluing found objects (such as loose puzzle pieces or Legos), to a pin back, and painting over the creation.
- Pillows: Older children can make pillows using a sewing machine or sewing by hand. Children often love using a sewing machine and it is a wonderful activity but must be carefully monitored. If you are using solid colored fabric, the children can decorate their pillows with fabric paint or pens.
Creating crafts as a family can bring you together, sharing ideas, discussing, and planning the craft, followed by working side-by-side with common goals. Crafts are also wonderful gifts from the heart for relatives, friends and neighbors. And the process of the family working and creating together is a gift for everyone involved. |
At the end of her talk at the Seattle Town Hall about her book The Sixth Extinction, Elizabeth Kolbert takes questions from the audience. The final question is from a boy in his mid-teens. He's the only one at the microphone who's likely to be around when this the extinction process has gone into high gear. So, what does he ask?
Back up for a moment. In her talk, Kolbert focuses on three things we humans are changing: the atmosphere, the oceans and how we keep redistributing animals around the planet. (You can watch the whole talk on Book TV and it's well worth 45 minutes of your time.)
It's like we're running geological history backwards very fast by sending all that carbon back up into the atmosphere.
The Atmosphere: Right now we're adding about 10 billion metric tons of CO2 to the atmosphere each year – mostly through the burning of fossil fuels. It took hundreds of millions of years for all this carbon to be buried under the surface of the Earth, and it's like we're running geological history backwards very fast by unearthing it and sending it all back up into the atmosphere – literally millions of times faster than it took to bury it.
(If you want to see how this has affected the climate over the past 130 years, check out this quick video from NASA.)
The Oceans have absorbed about a third of the greenhouse gases we've poured back into the atmosphere – about 150 billion metric tons. Right now the oceans are absorbing about a million metric tons every hour.
As a result, ocean acidity has increased by about 30 percent, which makes it very difficult for living creatures to build their shells – from shellfish to the micro-organisms at the base of the food chain to the coral reefs, which are likely to become the first entire ecosystems in the modern world to go extinct.
Moving Species Around: 250 million years ago, the great continental mass known as Pangaea began to break up into the continents we know today. Now that we're transporting animals all over the planet (which we started doing several thousand years ago), it's another way of running geological history backwards at very high speed. Today, we move thousands of species around the planet every day.
We call most of them invasive species. But they didn't invade. We brought them here. We brought the Asian carp, for example, to the Great Lakes from Asia. And since the local wildlife have had no time to adapt to the new arrivals, the carp are wiping them out by the millions. For the Army Corps of Engineers to keep them from taking over the Great Lakes altogether would cost $18 billion. That's just one invasive species. (Of course, the single most expensive invasive species is humans. But there's no corps of engineers that can keep us at bay.)
What to Do? At the end of her talk, Kolbert pays tribute to all the people who are trying to save animals who are going extinct – from the frogs to the elephants to the coral reefs. But will this help turn things around?
"Even people who are not directly part of efforts like these give lots of money to groups that do really great work. And I would like to be able to end on that sort of upbeat note, and that we just need to get even more people involved in efforts like that.
"But that, unfortunately, wouldn't really be true ... Caring is not really the issue. It doesn't really matter how we feel about this. It doesn't matter how much we're concerned about it. What matters is that we are changing the world. That's what makes us comparable to an asteroid [like the one that caused the previous mass extinction 65 million years ago].
"And until and unless we confront that – that we are that world-changing force, I'm afraid that we're really just not confronting the problem."
At question time, Kolbert says she doesn't know if humans, too, will go extinct.
We're very good at taking over the habitat and resources of other animals. But the dinosaurs were an incredibly successful group of animals for tens of millions of years. And when the rules suddenly change, as in an asteroid impact (and as in what's happening now), you never what's going to happen.
Can humans act in a way that's beneficial to the planet?
Maybe. But hunter gatherers were sending animals to extinction for thousands of years before any kind of civilization. "I'm sad to say that we've been doing this for a very long time, and it's now just ramped up incredibly."
What about all the children who have to walk miles for a bowl of water?
The trouble is that lifting people out of poverty tends to take resources, so the more we do to help humankind, the worse off we leave the other animals. It's a Catch-22.
And so to the teenage boy. He gets the last question –a two-parter. It's a poignant moment. Perhaps more than anyone in the auditorium, he understands what this means for him and his generation.
Is the situation irreversible? And what can we do?
Unlike most of her peers, Kolbert is too honest to hold out false hope. And unlike most of his peers – most of the entire population – the boy asking the questions wants the truth.
And the truth is that the problem is not what we humans DO. It's not even what we ARE. It's THAT we are. |
Share your best tips for science education on the STELLA web portal
The STELLA web portal (www.stella-science.eu) has launched new tools for teachers and experts to share their best practices on science education in Europe. By joining the STELLA forums and submitting initiatives to the STELLA catalogue you can share your experiences and exchange ideas on new teaching methods and educational approaches.
STELLA project is funded with support from the European Commission within the Lifelong Learning Programme. It aims to improve the science education in Europe by inspiring teachers’ and experts’ communication and exchange of ideas on teaching methods and best practices.
Open forums for broad discussions on education
The STELLA forums bring together teachers, teacher trainers, experts and everyone interested in science education together to communicate with each other and with the STELLA team. The topics, science education and interesting practices, are discussed both at national level (national forums for Germany, France, Italy, Portugal and Bulgaria) and across countries (European forums).
Fill in an online questionnaire and share your favourite initiatives
Teachers are invited to submit their favourite initiatives and projects to the STELLA catalogue using an easy and quick online questionnaire. The questionnaire includes multiple choice questions and a free space to describe the most important aspects of the initiative. The questionnaire is available in all the STELLA languages: English, German, French, Italian, Portuguese and Bulgarian.
Properly filled in questionnaires are published on the STELLA catalogue of initiatives, which is accessible online for everybody interested in science education. The catalogue is searchable by the subjects and the targeted age group. Additional resources, such as videos, interviews, and case studies, are available for a number of initiatives. The catalogue includes also more than 500 initiatives from the former Socrates GRID project - Growing interest in the development of teaching science.
Photo: Stockxpert.com, HAAP Media Ltd. (Standard license terms -- Permitted use) |
Definition of Haematuria
Haematuria is the presence of blood in the urine. Haematuria can be classified into 2 types:
- Microscopic haematuria -where the blood is not visible and present only on testing of the urine.
- Macroscopic haematuria- where there is visible blood in the urine causing it to be discoloured pink, red, brownish-red or tea-coloured. Gross haematuria is another term for visible blood in the urine.
In Australia microscopic haematuria is defined as greater than 10 red blood cells visible on a high-powered microscopic examination of urine. The definition of microscopic haematuria varies from more than 3 to 10 red blood cells in different countries. Microscopic haematuria is usually discovered when urine is tested with a dipstick test. As the results of urine testing with a dipstick are not always accurate, the finding of microscopic haematuria should always be confirmed with microscopic examination on an MSU or mid-stream urine testing.
Although seeing blood in the urine with visible or macroscopic haematuria can be frightening, most of the time blood in the urine is not life threatening. The important thing is not to ignore the symptoms of haematuria and to have it investigated because it can sometimes be caused by a serious condition in the urinary tract.
Blood in the urine can originate from any part of the urinary tract ranging from the kidneys, collecting system (ureters and bladder) as well as from the urethra (waterpipe) taking urine from the bladder.
Urine testing for haematuria should only be done for identifiable clinical reasons rather than as a form of population health screening.
Classification of Haematuria
Apart from the main classification into microscopic (invisible) haematuria and macroscopic (visible) haematuria, haematuria can be classified into:
- Symptomatic – associated with voiding symptoms such as
- Hesitancy (slow urination)
- Dysuria - burning or pain on urination
- Abdominal or flank pain
- Asymptomatic – occurring without symptoms
How often does Haematuria occur?
The prevalence of asymptomatic microscopic haematuria (i.e. invisible blood in the urine without urinary symptoms) ranges from 2 to up to 31% of the population with higher rates occurring in the older population, men and those with a history of smoking.
What are the common causes of Haematuria?
Urinary tract infection UTI is one of the most common causes of haematuria. Stones within the urinary tract (kidney or ureteric) can also cause blood in the urine. Urinary tract cancers such as kidney cancer and cancers of the bladder (TCC- transitional cell cancer – of the lining of the urinary tract) are also important causes of haematuria.
What is the significance of Haematuria?
Not all haematuria is caused by significant problems in the urinary tract.
Studies have shown that even with extensive investigation, a specific cause for the haematuria is not found in up to 70% of patients with microscopic haematuria and up to 50% of patients with macroscopic haematuria.
Haematuria requires investigation to exclude significant or worrying pathology in the urinary tract.
Macroscopic or visible haematuria is more concerning than microscopic (invisible) haematuria. Cases of macroscopic haematuria (including even one episode of visible blood in the urine) require thorough investigation because of the significant rate of urinary tract cancers found in people with visible blood in the urine. The prevalence of urinary tract cancers in people presenting with the symptom of visible blood in the urine ranges between 3 to 6% but has been reported to be as high as 19% in some studies.
Risk factors for Urinary Tract Cancers
Risk factors for urinary tract cancers (or malignancy) include:
- Increasing age especially > 40 years
- History of smoking (both current and past)
- Occupational exposure to dyes in the print and clothing industries, benzenes
- Exposure to medications such as cyclophosphamide and phenacetin
- Previous pelvic radiation
- History of macroscopic or visible haematuria
- Significant bladder symptoms in the absence of a urinary infection such as urgency, frequency, pain or discomfort on urination |
The deal that the United States and the Taliban signed on Saturday allows the United States to extract itself from a stalled war. For years, the fighting showed no signs of battlefield breakthrough, while the United States held the Afghan security forces and Afghan government on life support.
Since at least 2015, U.S. policy has been one of wishing and hoping — hoping that the Taliban would commit enough strategic and technical blunders to do itself in. But the Taliban has not. The negotiated deal promises to secure basic U.S. counterterrorism interests and also provides a chance that peace will eventually come to Afghanistan — something Afghan people badly crave. Afghan security forces have lost perhaps as many as 50,000 fighters in the past five years, the Taliban perhaps the same number, and Afghan civilians have been dying at a rate of low thousands annually.
In fact, both peace negotiations and intense fighting can go on for a long time, long after U.S. troops have left Afghanistan. In a recent piece, I explored the divergent models of negotiations that various Afghan actors — such as the Afghan government and Taliban — and international partners have in mind for negotiations, and how these may unfold over the next several years. Here, I discuss some of the immediate issues over the next 14 months as U.S. troops are withdrawn from Afghanistan.
THE DEAL ITSELF
The basic parameters of the deal the United States and the Taliban signed have been known for almost a year. The United States has committed to withdraw its 12,800 forces from Afghanistan within 14 months, with the first 5,000 withdrawn in 135 days since the signing of the deal. The Taliban has promised not to conduct terrorist attacks against the United States or allow its territory to be used for that purpose. And the Taliban and the Afghan government have vowed not to militarily attack each other as U.S. troops withdraw. Meanwhile, within 12 days of deal being signed, the Taliban agreed to start engaging in a so-called intra-Afghan dialogue that will also include the Afghan government, and which will seek to arrive at a negotiated settlement among the Afghan parties. Those talks can take months, and more likely years.
To the extent that the announced deal contained any surprise at all, it was the speed of U.S. withdrawal: It has been estimated that the fastest possible timeframe for the U.S. military to leave, pack up and lift out its equipment, and dismantle its bases is actually 12 to 14 months. The Taliban had been asking for an unrealistic 6 months, but many analysts in Washington maintained that the speed of the negotiated withdrawal would be much slower.
The deal does not imply or guarantee that any intra-Afghan negotiated settlement will be signed before the U.S. withdraws its forces. Nor does it imply that the United States will slow or reverse its withdrawal if the talks are stuck and Afghan security forces are taking a pounding from the Taliban on the battlefield. Only a major terrorist attack against U.S. assets (such as the U.S. embassy or homeland) by the Taliban or a group linked to it — or from Taliban-controlled territories — would put the Taliban in breach of the deal and likely therefore halt or reverse the U.S. withdrawal.
Such direct breaches are unlikely. Nor will significant military pressure against Afghan security forces (which the Taliban probably will mount) necessarily be regarded as a violation of the accord. The U.S. military in Afghanistan declared Taliban attacks on Afghan security forces since Sunday a violation of the deal, or at least the non-published U.S. interpretation of the deal. And the U.S. military already responded with its first air attack against the Taliban to help Afghan security forces since the deal was signed. But how long will the response be maintained as the U.S. departs, as has already started happening?
Any hope that a permanent or lengthy ceasefire would be established before the start of an intra-Afghan dialogue died a long time ago. As soon as the seven-day violence reduction was over, the Taliban issued directives to its fighters to restart attacks on Afghan security forces. To some extent, battlefield commanders fear that their fighters could get too cozy with the barbershops and ice cream parlors that they could visit during an earlier ceasefire and then the seven-day violence reduction, making it hard to bring them back to the battlefield.
At a more strategic level, the Taliban well understands that its battlefield performance will enhance its negotiating hand. Though hardly 10 feet tall, the Taliban has systematically managed to increase the battlefield operational tempo since 2015. U.S. airpower has limited its ability to take over provincial capitals and inflict even greater casualties to Afghan security forces. That counter will soon be removed as U.S. troop numbers go significantly down.
Still, the group may well hold off taking over a provincial capital and a province until spring 2021, when the U.S. military presence in the country has dropped dramatically and NATO and the other allies may also have removed many of their trainers and advisers. Till then, the Taliban is likely to mount the same type and perhaps even the tempo of military operations as it did in 2019, hitting Afghan security forces left and right and inducing units to sign local non-aggression pacts with the Taliban (a growing trend in 2019, as former Afghan defense and military officials told me during my fieldwork in Afghanistan in October 2019). Perhaps the biggest limitation on how much the Taliban heats up the battlefield is its need not to alienate the Afghan public too much, given the greater difficulty it will have in justifying violence against Afghan people once the U.S. troop presence has been substantially reduced.
It won’t be a small task for Taliban leadership to control the battlefield ambitions of its mid-level commanders. As the deal was signed, the Taliban had to engage in triangulated communication: Its spokesman gloated of victory (“the defeat of the arrogance of the White House in the face of the white turban”), clearly addressing mid-level battlefield commanders. But the Taliban’s negotiators in Doha issued a counterstatement, warning commanders against too much hubris and also seeking to reassure the United States. And the Taliban’s leader Haibatullah Akhundzada issued a peaches-and-cream statement to the Afghan people, promising peace, no revenge against those who fought the Taliban, and freedom and happiness under Islamic values.
Many young urban Afghans are not reassured, and fear the change in power distribution and political dispensation that negotiations with the Taliban are likely to produce. In contrast, in rural areas of Afghanistan, many Afghans want peace above all: They may have experienced little economic improvement and political and social freedoms over the past two decades. What they experience daily is the war and the loss of male breadwinners to fighting.
The Afghan government has long objected to the agreed parameters of the deal. In October 2019, it issued its own roadmap to negotiations, which was sensible but disconnected from the well-known U.S.-Taliban deal in the making. Hoping that the deal can yet be avoided, the government has not developed bargaining positions, such as redlines for which it will fight against the Taliban without the U.S. military around, perhaps for years to come. Even in late winter, it was still focused on composing its negotiating team while courting allies such as India, hoping it could derail the U.S.-Taliban deal.
The political tensions over the reelection of President Ashraf Ghani, contested by rival Abdullah Abdullah, have only compounded the lack of a unified negotiating front among Afghan politicians vis-à-vis the Taliban. Come December, when many fewer U.S. troops are around, it’s easily possible that the level of conversation between the Taliban and the Afghan counterparts is merely at the broad level of generalities.
It is not surprising that President Ghani has refused to release the 5,000 Taliban prisoners,something that the Taliban has long been asking for and expected after the signing of the U.S.-Taliban deal. The Afghan government understands that come winter 2020 and spring 2021, as the U.S. troop presence declines, holding at least some Taliban prisoners may be one of the government’s few precious levers in negotiations.
If, at that time, the intra-Afghan talks are stalled, pressures for a side deal between Afghan opposition politicians and the Taliban — perhaps seeking to overthrow the Ghani government and establish an interim one — will only grow. Rumblings to that effect have been bubbling in Afghanistan since fall 2019. If that happened, would the Afghan military hold or break up into ethnic factions? Would one of its powerful leaders attempt a military counter coup d’état? Would the United States continue to fund the Afghan security forces (without which Afghan forces would melt down), as it reiterated just this week? Those are some of the questions the Trump administration and its possible successor will need to grapple with.
Only under an extremely optimistic scenario would the intra-Afghan negotiations produce a reasonably stable settlement within 14 months. (Under much more auspicious circumstances, Colombia’s negotiations with the Fuerzas Armadas Revolucionarias de Colombia, or FARC, took four years; the Philippines’ talks with the Moro insurgents took 13 years and counting; Guatemala’s post-civil war peace accords took three years; and Nepal’s took over five years.)
WHAT’S IN STORE
However long the process takes and however much fighting occurs before that, the Taliban will likely continue to hold significant if not dominant power in Afghanistan. As Taliban-linked interlocutors told me, the Taliban wants to avoid a civil war and was very keen to avoid an “irresponsible” departure of U.S. forces — in other words, a departure without a deal with the Taliban, since the Taliban believes that would have pushed the country closer to a civil war and impeded intra-Afghan negotiations.
The Taliban maintains that once U.S. troops are out and it is in power, the group can have good relations with the United States and very much wants to maintain the flow of U.S. economic aid. Whatever power (and in whatever form) the Taliban has after the U.S. military departure, U.S. economic aid may ironically be one of the most important mechanisms to shape the Taliban’s behavior toward more inclusion, pluralism, and some respect for women’s and human rights. |
The spotted lanternfly is an invasive insect that has spread throughout southeastern Pennsylvania in recent years, arriving in Delaware County in 2017. It poses a serious threat to Pennsylvania agriculture, including the grape, tree fruit, hardwood, and nursery industries, and can become a significant problem pest to homeowners and residents.
Stopping the spread is a community effort, and we need your help!
The public can do a great deal to stop the spread of this invasive insect.
The extension service is asking homeowners to report sightings of spotted lanternfly to help with management and control. There is extensive information about spotted lanternfly on the Penn Slate Extension website. Information includes:
- How to identify and report Spotted lanternfly
- Signs, symptoms and potential damage
- Management techniques for both homeowners and businesses
- How to comply with the state Spotted Lanternfly quarantine
Penn State extension is also offering free Spotted Lanternfly Information Sessions to help inform the public about this threat. To find a session near you, visit the extension website here. Click on “Where and When” to find a session close to you.
Don’t see a meeting coming up in your community? Call your local Penn State Extension office to request a meeting. |
The presence of the cervical mucus symptom reflects the rising blood oestrogen from the developing follicle in the ovary, and is the most important sign of the beginning of the fertile phase in all reproductive situations.1 Changes in the fertility indicators, basal body temperature, cervical mucus and cervix during the cycle, help the woman identify the fertile and infertile phases of the menstrual cycle.
- The Infertile Phases (Fig. 11-3)
There are two infertile phases, the first infertile phase (the relatively infertile phase) occurs before the fertile phase, and the second infertile phase (the definitely infertile phase) occurs after the fertile phase. The woman can identify the infertile phase by the sensation of dryness at the vulva and no mucus is visible. This is due to the presence of gestogenic mucus occluding the cervical canal. Gestogenic mucus is secreted in the cervical crypts under progesterone stimulation.
- The Fertile Phase (Fig.11-3):The woman can identify the fertile phase by the build-up of oestrogenic mucus during this phase. Sperm can survive in oestrogenic fertile-type mucus for five days, which means that sexual intercourse five days before ovulation could result in pregnancy. The fertile phase (the peri-ovulatory phase) is the combined time of the life span of the ovum after ovulation (24 hours), and the life span of sperm in fertile-type mucus before ovulation. Therefore the fertile phases, during which sexual intercourse could potentially result in conception, lasts for 6-9 days.3
THE FERTILITY CYCLE – WHEN DO THE FERTILE PHASE AND INFERTILE PHASES BEGIN AND END
The limits of the fertile and infertile phases of the fertility cycle are defined by applying the rules of the chosen natural family planning method to the fertility indicators. In the symptothermal double-check method of natural family planning two indicators are used to identify both the beginnning and end of the fertile and infertile phases of the cycle. The rules of the ‘double-check method’ must be taught to the woman by a qualified natural family planning teacher.
The Limits of the Relatively Infertile Phase / First Infertile Phase (Fig.11-3)
The infertile phase that precedes ovulation is called the relatively infertile phase as the woman is awaiting the onset of the fertile phase. It begins on the first day of the period and includes the time of menstruation and the dry days that precede the mucus symptom. It ends with the first sign of moistness or mucus at the vulva, cross-checked with the calendar rule whichever comes first. In clients with short cycles of 21 -24 days mucus may appear immediately after the period or before the period ends, which means there is no relatively infertile phase. In such clients intercourse during a menstrual period could lead to conception.
Fig. 11-3; The cervical mucus indicator as a sign of fertility or infertility: The diagram shows the three phases of the fertility cycle and the related mucus symptom. The relatively infertile phase includes the days of the menstrual flow and the dry days that follow the period before the onset of the mucus symptom. The fertile phase includes ovulation and the days of ‘build-up’ of the oestrogenic mucus which transports and nourishes sperm. The presence of fertile-type mucus is a sign of potential fertility as it indicates a rising oestrogen level from the developing follicle in the ovary and imminent ovulation. The definitely infertile phase after ovulation shows a return to the sensation of dryness at the vulva due to the ‘drying-up’ action of progesterone from the corpus luteum and the secretion of gestogenic mucus by the cervical crypts. The definitely infertile phase is so-called as the woman is definitely infertile in this phase as the ovum is dead and no further ovulation will occur in that cycle.
The Limits of the Fertile Phase (peri-ovulatory phase) (Fig. 11-3):
The fertile phase is called the peri-ovulatory phase as it includes ovulation, and the potentially fertile days of the build-up of oestrogenic mucus. The beginning of the fertile phase is identified by the mucus symptom, viz. the appearance of mucus, and or the sensation of moistness at the vulva, cross-checked with the calendar rule whichever comes first. The end of the fertile phase is identified by the mucus symptom (i.e. the drying up of mucus at the vulva), cross-checked with the sustained rise of the basal body temperature (BBT) whichever comes last.
When does ovulation occur?
The exact time of ovulation cannot be identified by the fertility indicators, but ovulation occurs around the time of the ‘Peak’ mucus symptom.2 The ovum has a life span of 24 hours and the fertilizable life of the ovum is 8 to 12 hours.1 After ovulation there is a rise in the basal body temperature (BBT) due to progesterone from the corpus luteum. When a sustained rise in the temperature (BBT) has been recorded according to the rules of the symptothermal NFP method, the woman knows that ovulation has occurred. The end of the fertile phase is identified by cross-checking the rise in Basal Body Temperature with the mucus indicator whichever comes last.
The LIMITS of the Definitely Infertile Phase/ Second Infertile Phase (Fig. 11-3)
The infertile phase that follows ovulation (luteal phase) is called the definitely infertile phase because the woman cannot get pregnant during this phase as the ovum is dead. It begins with the sustained rise in temperature (BBT) cross-checked with the mucus symptom whichever comes last, and it ends on the day before the next period. The luteal phase has a constant length of 14 days (range 10 – 16 days), and it tends to be the same length for each cycle for any individual woman.1 There is a sensation of dryness at the vulva during the luteal phase due to progesterone from the corpus luteum.
Can cervical mucus be difficult to recognise?
For those who have difficulty in identifying cervical mucus and who wish to achieve a pregnancy, an ovulation monitor may help define the fertile phase.
Klaus H; ‘Natural family planning – Is it scientific? Is it effective?’ pages 12, 4,10; Newman Lecture Series 1-May 21, 2000. (on the internet if you google ‘natural family planning, Dr Hanna Klaus’).
Flynn AM, Lynch SS; ‘Cervical mucus and identification of the fertile phase of the menstrual cycle'; Br J of Obstet &Gynec; August 1976; vol 83; 656-659
Freundl G et al; “Estimated maximum failure rates of cycle monitors using conception probabilities in the menstrual cycle”; Human Reproduction, (2003), vol 18, no12, p 2628-2633.
To be most effective, the woman must be taught the Symptothermal Double-Check Method of Natural Family Planning by a qualified natural family planning teacher. |
For us, the art of cheese making begins in Cabot, Vermont, where the most talented cheese makers combine the purest ingredients with a long tradition of quality and great taste to produce our award-winning cheeses.
Wondering how Cabot’s Award-Winning Cheddar Cheese is made?
It starts with the freshest milk gathered from our farm families’ cows, and ends several steps later with the World’s Best Cheddar—and other celebrated flavors crafted to please every taste…whether used in a favorite recipe or enjoyed all alone.
Here is how Cheesemaking Works:
- High quality cow’s milk is gathered from Cabot farmers, then pasteurized by heating to exactly 162° F for exactly 16 seconds, then cooled to a steady 88° F.
- This perfectly pasteurized milk is poured into a large vat. A starter culture of bacteria is added, along with an enzyme known as Rennet, which helps the starter culture grow, turning the milk into cheese.
- Stainless steel wires are used to cut the developing cheese mass into small cubes of curd. The liquid that separates from the curds is what we call whey.
- Once the curds and whey are cooked, they’re pumped to a finishing table where the whey is drained off, and salt is added to the cheese to enhance flavor and slow acid development. This is also when we add herbs and other ingredients to make flavored specialty cheeses.
- The cheese curds are then packed together under pressure to create 42lb. blocks that are vacuum-sealed in plastic, or hand-packed into round wax forms. These are moved to a temperature-controlled warehouse, where our Cheddars are aged to perfection. |
What you eat may affect how you learn, say UCLA researchers in a new study on the effects of fructose and omega-3 fatty acids on the behavior of rats.
Rats that were fed only fructose and standard rat chow had more trouble navigating a maze at the end of six weeks than rats who were fed a diet supplemented with omega-3 fatty acids, according to results published in the Journal of Physiology.
"Our findings illustrate that what you eat affects how you think," said Fernando Gomez-Pinilla, a professor of neurosurgery and integrative biology and physiology. "Eating a high-fructose diet over the long term alters your brain's ability to learn and remember information. But adding omega-3 fatty acids to your meals can help minimize the damage."
The animals trained on a maze with visual landmarks twice daily for five days before starting the experimental diet. Six weeks later, the researchers tested the rats' ability to recall the route and escape the maze.
"The second group of rats navigated the maze much faster than the rats that did not receive omega-3 fatty acids," Gomez-Pinilla said. "The DHA-deprived animals were slower, and their brains showed a decline in synaptic activity. Their brain cells had trouble signaling each other, disrupting the rats' ability to think clearly and recall the route they'd learned six weeks earlier."
The faster rats received omega-3 fatty acids in the form of flaxseed oil and docosahexaenoic acid (DHA), which protects against damage to the brain's synapses, or chemical connections. The DHA-deprived rats also developed signs of resistance to insulin.
"Our findings suggest that consuming DHA regularly protects the brain against fructose's harmful effects," said Gomez-Pinilla. "It's like saving money in the bank. You want to build a reserve for your brain to tap when it requires extra fuel to fight off future diseases."
Still, no matter how much salmon we eat, we should also avoid sweets most of the time — and not just high-fructose corn syrup, Gomez-Pinilla told the Los Angeles Times. High-fructose corn syrup has taken most of the bad rap lately, because it's added to so many foods, but that doesn't give regular white sugar a pass. |
Born Giorgio Barbarelli da Castelfranco, called Giorgione, the artist was an influential Venetian painter of the High Renaissance. His birthplace of Castelfranco is a town outside of Venice, to where he traveled for his early studies. It is there that he gained an apprenticeship with the prestigious painter Giovanni Bellini (1430 – 1516). Bellini helped form the prevalent style of the Venetian School of painting, of which Giorgione and other artists such as Titian (1485 – 1576) became known for.
One of his earliest pieces was the Castelfranco Madonna, or Madonna and Child Between Saint Francis and Saint Nicasius, painted between 1503 and 1504. The common depiction of Madonna and Child, called a Sacra conversazione, implores an unusual, almost regal throne upon which the Madonna sits. The altarpiece is in the Cathedral of Castelfranco in Veneto and was commissioned by Tuzio Costanzo, a Condottieri, or mercenary leader. In the background of the piece is a lush landscape of which Giorgione and other Venetian painters introduced to painting of the time. This style would find its most perfect example in Giorgione’s Sleeping Venus, where his mythological nude subject seems to blend intimately into the soft, flowing landscape behind her.
Some of his earlier religious works also give much attention to the landscapes, using a more horizontal composition in which the landscape could fill its upper half. The two pieces housed in the Uffizi Gallery, Moses Undergoes Trial by Fire, and Judgment of Salomon, share this dynamic. The works show the influence in Giorgione from his teacher, Bellini and also that of the painting style from Northern Europe This same beauty and significance of landscape is in most of Giorgione’s work, including his Pastoral Concert, The Three Philosophers and The Tempest, which some consider as the first true landscape painting is western art.
Giorgione, along with his almost contemporary and at one time assistant, Titian, brought much innovation to the style of portrait painting. While it is said that Titian went on to surpass Giorgione as a portraitist, the early work of Titian is sometimes indistinguishable from Giorgione. There is also some critical contention in attribution between the two artists over works depicting the Madonna and Child.
Giorgione left an undeniable impact on painting, with his depiction and focus of landscapes, as in The Tempest, and also in being considered the first genre painter, as in The Pastoral Concert, which holds no clear religious or allegorical context. This set forth the influential contributions of the Venetian painters seen throughout the Renaissance and into the Baroque period. |
Apr 10, 2014, updated April 2014
Nestlé launched the Crecer Bien – or Growing Well – programme in Peru in 2008 to tackle chronic malnutrition and the rising trend in obesity in Peruvian children.
Over three quarters of youngsters under the age of five suffer from chronic malnourishment. On the opposite end of the scale, nearly 10% of children in the same age range are overweight, according to the Estado nutricional en el Perú, the National Health Institute, between 2009-2010.
Anaemia, which can be caused by a lack of iron, is also a severe health problem in the country affecting more than 50% of pre-school children, as highlighted by the World Health Organization.
To help address these health problems, Nestlé’s Crecer Bien programme was targeted at children aged five to eight, with a focus on giving teachers and parents the knowledge and tools to promote better nutrition and hygiene to children.
Teachers are provided with lesson plans and materials that fit in with existing education systems thanks to a cooperation agreement with the Ministry of Education in Peru.
Nestlé is using the Ministry’s national curriculum programme to develop, validate and monitor Crecer Bien.
It has been implemented in the Peruvian regions of Lima, Piura, La libertad, Lambayeque, Ica, Huancavelica – Tayataja, and Chilca – Cañete, which has impacted on more than 330,000 people over the past five years.
The company is also supporting the efforts of the Ministry of Health to boost its priorities in increasing physical activity and healthier lifestyles.
As part of the programme, parents and teachers can download all the programme’s materials from Crecer Bien.
They can also find out more and engage on the initiative through its social media sites on Facebook and Twitter.
In addition, it had a weekly slot on the official Peruvian Government TV channel Canal 7 to boost its messages.
The Peruvian First Lady, Nadine Heredia, has backed the Crecer Bien initiative and encouraged its expansion to national level.
As a result, Nestlé led a group of large food and beverage companies in the country to form the ‘Peru Vive Bien’ association in 2012, with an aim to implement Crecer Bien as a ‘National Crusade for Nutrition’.
The Peruvian First Lady announced the creation of the association and the Crecer Bien programme at the Scaling Up Nutrition meeting in New York, United States, in the same year.
Value to Society
To date, Crecer Bien has reached over half a million children, parents and teachers.
At national level, in the coming years more than one million children will benefit from the programme as part of the ‘National Crusade for Nutrition’.
Value to Nestlé
The programme establishes a global competitive advantage and demonstrates Nestlé’s commitment to address health issues globally; and has a positive impact on Nestlé’s reputation as a leading Nutrition, Health and Wellness company.
Nestlé will continue to lead the ‘Peru Vive Bien’ association, aiming to develop healthy nutrition initiatives and improve the living habits of Peruvian families.
The company also seeks to strengthen the Crecer Bien programme for urban and rural families. In 2014, the initiative will be adapted to native languages such as Quechua to benefit rural and vulnerable populations in extreme poverty. |
Improving forestry secondary education: Identifying teachers’ needs
Industrial, technological, and societal changes require teachers to be continually engaged in professional learning activities that promote new scientific approaches to education and content. Providing teachers with current and relevant professional development is an important task in secondary education. This study sought to identify the professional development needs for educators who teach forestry and forest ecosystem content to secondary students. Researchers used the Delphi method with two participant groups to investigate the diversity of thought held throughout the southeastern United States. Participants were agriculture and environmental science teachers, state department of education administrators, foresters, and environmental scientists. Participants identified eleven areas of educational need: 1. Forestry career days, 2. Tree diseases and pathogens, 3. Graduation requirements limit student opportunities to take electives, 4. Career counseling in forestry jobs, 5. Educate students about degrees needed for forestry careers, 6. Over commitment of students to extra-curricular activities, 7. Lack of foundational forestry knowledge, 8. Lack of forestry /agriculture programs in schools, 9. Develop forestry electives in middle school, 10. Lack of foundational forest management knowledge, and 11. Connect classroom content to FFA and Envirothon extra-curricular activities.
Barrick, R. K., Ladewig, H. W., & Hedges, L. E. (1983). Development of a systematic approach to identifying technical inservice needs of teachers. Journal of the American Association of Teacher Educators in Agriculture, 24(1), 13–19. https://doi.org/10.5032/jaatea.1983.01013
Connaughton, K. (2015). Forestry employment trends. Journal of Forestry, 113(6), 571–573. https://doi.org/10.5849/jof.15-036
Copenheaver, C. A., Duncan, D. W., Leslie, L. D., & McGehee, N. G. (2004). An exploration of cross-disciplinary peer education in natural resources. Journal of Natural Resources and Life Sciences Education, 33, 124–130. https://doi.org/10.2134/jnrlse.2004.0124
Darling-Hammond, L. (2006). Constructing 21st -century teacher education. Journal of Teacher Education, 57,1–15. https://doi.org/10.1177%2F0022487105285962
Fox, T.R., Jokela, E.J., & Allen, H.L. (2004). The evolution of pine plantation silviculture in the southern United States. U.S. Department of Agriculture, Forest Service, Southern Research Station. https://www.fs.usda.gov/treesearch/pubs/9647
Franklin, E. A. (2011). Greenhouse facility management experts identification of competencies and teaching methods to support secondary agricultural education instructors: A modified Delphi study. Journal of Agricultural Education, 52(4), 150–161. https://doi.org/10.5032/jae.2011.04150
Fuhrman, N.E., Morgan, A.C., Copenheaver, C.A., Peterson, J.A., Newberry, M.G., DeLoach, S.G., & van de Gevel, S. (2014). Repeated monitoring of forest plots: Evaluating the accuracy of student scientist data. North American Colleges and Teachers of Agriculture Journal, 58(2), 95–101. https://www.nactateachers.org/attachments/article/2198/5%20Fuhrman_2014%20NACTA%20Journal.pdf
Joerger, R.M. (2002). A comparison of the in-service education needs of two cohorts of beginning Minnesota agricultural education teachers. Journal of Agricultural Education, 43(3), 11–24. https://doi.org/10.5032/jae.2002.03011
Krueger, R.A., & Casey, M.A. (2008). Focus groups: a practical guide for applied research (4th ed.). Sage Publications.
Landeta, J. (2006). Current validity of the Delphi method in social science. Technological Forecasting and Social Change, 73, 467–782. https://doi.org/10.1016/j.techfore.2005.09.002
Lockerman Friend, K.R. (2008). Attitudes and knowledge of forestry by high school agricultural education teachers in West Virginia (Publication No. 1458746) [Master’s thesis, West Virginia University]. ProQuest Dissertations Publishing.
McCabe, S.M., Munsell, J.F., & Seiler, J.R. (2014). Forest field trips among high school science teachers in the southern Piedmont. Natural Sciences Education, 43(1), 44–50. https://doi.org/10.4195/nse2013.01.0001
Munsell, J.F., McCabe, S.M., & Seiler, J.R. (2016). Forestry education in US Southern Piedmont high school science classes. Journal of Forestry, 114(4), 441–448. https://doi.org/10.5849/jof.14-137
Myers, B. E., & Thompson, G. W. (2009). Integrated academics into agriculture programs: A Delphi study to determine perceptions of the National Agriscience Teacher Ambassador Academy participants. Journal of Agricultural Education, 50(2), 75–86. https://doi.org/10.5032/jae.2009.02075
Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: An example, design considerations and applications. Information and Management, 42, 15–29. https://doi.org/10.1016/j.im.2003.11.002
Peake, J., Duncan, D., & Ricketts, J., (2007). Identifying Technical Content Training Needs of Georgia Agriculture Teachers. Journal of Career and Technical Education, 23(1), 44–55. https://doi.org/10.21061/jcte.v23i1.442
Roberts, T. G., & Dyer, J. E. (2004). Characteristics of effective agriculture teachers. Journal of Agricultural Education, 45(4), 82–95. https://doi.org/10.5032/jae.2004.04082
Rouleau, M., Sharik, T.L., Whitens, S., & Wellstead, A. (2017). Enrollment decision-making in U.S. forestry and related natural resource degree programs. Natural Sciences Education, 46(1), 1–9. https://doi.org/10.4195/nse2017.05.0007
Rubenstein, E. D. & Thoron, A. C. (2014). The creation of a biofuels and sustainable agriculture post-secondary curriculum: A true-Delphi study. Career and Technical Education Research, 39(2), 171–184. https://doi.org/10.5328/cter39.2.171
Sharik, T.L., Lilieholm, R.J., Lindquist, W. & Richardson, W.W. (2015). Undergraduate enrollment in natural resource programs in the United States: Trends drivers, and implications for the future of natural resource professions. Journal of Forestry, 113(6), 538–551. https://doi.org/10.5849/jof.14-146
Skaalvik, E. M., & Skaalvik, S. (2011). Teacher job satisfaction and motivation to leave the teaching profession: Relations with school context, feeling of belonging, and emotional exhaustion. Teaching and Teacher Education, 27(6), 1029–1038. https://doi.org/10.1016/j.tate.2011.04.001
Sussman, S., Burton, D., Dent, C.W., Stacy, A.W., & Flay B.R. (1991). Use of focus groups in developing an adolescent tobacco use cessation program: Collection of norm effects. Journal of Applied Social Psychology. 21(21),1772–1782. https://doi.org/10.1111/j.1559-1816.1991.tb00503.x
Thangaratinam, S., & Redman, C. WE. (2005). The Delphi technique. The Obstetrician and Gynaecologist, 7(2), 120–125. https://doi.org/10.1576/toag.184.108.40.206071
The National Council for Agricultural Education. (2019, December 2). National AFNR content standards. https://thecouncil.ffa.org/afnr/
USDA Forest Service (2015). USDA Forest Service Strategic Plan: FY 2015–2020. FS-1045. USDA Forest Service. https://www.fs.fed.us/strategicplan
Velardi, S. H., Folta, E., Rickard, L., & Kuehn, D. (2015). The components of effective professional development for science educators: A case study with environmental education program Project Learning Tree. Applied Environmental and Communication, 14(4), 223–231. https://doi.org/10.1080/1533015X.2015.1109484
Washburn, S. G., King, B. O., Garton, B. L., & Harbstreit, S. R. (2001, February 22 - 24). The professional development needs of Kansas teachers of agriculture. Proceedings of the AAAE Central Region Agricultural Education Research Conference, 216–227. https:/eric.ed.gov/?id=ED475348
Copyright (c) 2020 Eric Rubenstein, Carolyn A. Copenheaver, Jason B. Peake
This work is licensed under a Creative Commons Attribution 4.0 International License. |
The title might sound daunting, but properties of limits (also called limit laws) are just shortcuts to finding limits of functions.
How To Use Properties of Limits
To find a limit using the properties of limits rule:
- Figure out what kind of function you are dealing with in the list of “Function Types” below (for example, an exponential function or a logarithmic function),
- Click on the function name to skip to the correct rule,
- Substitute your specific function into the rule.
Click a function name in the left column to skip to that rule.
|1. Constant function||f(x) = C||y = 5|
|2. Constant multiplied by another function||k * f(x)||5 * 10x2|
|3. Sum of functions||f(x) + g(x) + …||10x2 + 5x|
|4. Product of two or more functions||f(x) * g(x) * …||10x2 * 5x|
|5.Quotient Law||f(x) / g(x)||5x / 10x2|
|6. Power functions||f(x) = axp||10x2|
|7. Exponential functions||f(x) = bx||10x|
|8. Logarithmic functions||f(x) = logbx||log10x|
The limit of a constant (k) multiplied by a function equals the constant multiplied by the limit of the function.
- The limit of f(x) = 5 is 5 (from rule 1 above).
- The limit of 10x2 at x = 2 can be found with direct substitution (where you just plug in the x-value): 10((22) = 40
- Multiply your answers from (1) and (2) together: 5 * 40 = 200
Tip: Plot a graph (using a graphing calculator) to check your answers.
The limit of a sum equals the sum of the limits. In other words, figure out the limit for each piece, then add them together.
For step by step examples, see: Sum rule for limits.
The limit of a product (multiplication) is equal to the product of the limits. In other words, find the limits of the individual parts and then multiply those together.
Example: Find the limit as x→2 for x2 · 5 · 10x
- The limit of x2 as x→2 (using direct substitution) is x2 = 22 = 4
- The limit of the constant 5 (rule 1 above) is 5
- Limit of 10x (using direct substitution again) = 10(2) = 20
- Multiply (1), (2) and (3) together: 4 · 5 · 20 = 400
Extended Product Rule
Any “extended” formulas in properties of limits are just extensions of other formulas. This one is just an extension of the product rule above: you can just keep on multiplying as many parts as you need (e.g. a * b * c * d * …).
The limit of a quotient is equal to the quotient of the limits. In other words:
- Find the limit for the numerator,
- Find the limit for the denominator,
- Divide the two (assuming that the denominator isn’t zero!).
The rule for power functions states: The limit of the power of a function is the power of the limit of the function, where p is any real number.
Example: Find the limit of the function f(x) = x2 as x→2.
- Remove the power: f(x) = x
- Find the limit of step 1 at the given x-value (x→2): the limit of f(x) = 2 at x = 2 is 2. You can use direct substitution or a graph like the one on the left.
- Put the power back in: 22 = 4
A particular case involving a radical:
Also, if f(x) = xn, then:
This particular part of the properties of limits “rule” for power functions is really just a shortcut: The limit of x power is a power when x approaches a.
Properties of Limits: References
Gunnels, P. (undated). Limit Laws. Retrieved May 29, 2019 from: http://people.math.umass.edu/~gunnells/teaching/Sample_Lecture_Notes.pdf
Stephanie Glen. "Properties of Limits (Limit Laws)" From CalculusHowTo.com: Calculus for the rest of us! https://www.calculushowto.com/limit-of-functions/properties-of-limits-laws/
Need help with a homework or test question? With Chegg Study, you can get step-by-step solutions to your questions from an expert in the field. Your first 30 minutes with a Chegg tutor is free! |
Master of Science in Education (MSEd)
In a time where adolescent females are under internal and external scrutiny, this writer created and implemented a school-based program for middle school age girls. The program was designed to address and enhance the self-esteem among adolescent females. The curriculum focused on building self-esteem through establishing an acceptable body image, developing a positive self-concept, and forming healthy peer relationships. A review of the literature regarding the definition and societal impact on self-esteem among adolescent females was studied and incorporated into the characteristics of this program. An evaluation of this 10-week, 12 member psycho educational group was performed using the testing instrument known as the Piers-Harris Children?s Self-Concept Scale. The assessment tool was given as a pretest and posttest to evaluate the overall level of self-concept, as well as specific domains such as physical appearance, intellectual status, happiness and satisfaction, behavioral adjustment, anxiety, and popularity. The results of this assessment indicated that the ten week psycho educational group had a positive influence on student?s self-esteem.
Natasi, Nicole A., "Enhancing Self-Esteem of Sixth Grade Girls: A Group Counseling Approach" (2005). Counselor Education Master's Theses. 76. |
Allusion vs Illusion
What is the difference between allusion and illusion? This article compares definitions of allusion vs illusion, as well as tips and tricks on remembering when it is proper to use illusion versus allusion, and distinguishing the difference.
The essay contained an allusion to Harry Houdini, widely acknowledged master of illusion. With the only visible difference being in the initial letter, you can guess that allusion and illusion will have very similar pronunciations and likely come from the same root, with just a different prefix. Let’s look at this pair of nouns to understand their differences.
A Common Source
Allusion and illusion share a root, while each has a different prefix. The root that they have in common is the Latin word ludere, which means “to play.” The difference in this playful pair is found in their prefix. The prefix of allusion is ad-, which when added to ludere forms aludere, “to play with.” The prefix of illusion is in-, which when added to ludere forms illudere, “to mock.”
When it comes to pronunciation, the difference in these two words is quite minute. Allusion is pronounced /uh LOO zhuhn/, while illusion is pronounced /ih LOO zhuhn/. In the context of the stream of sound in a whole sentence, the two words can be difficult to distinguish by pronunciation and require context for the user to be sure which one was used.
An allusion is an indirect reference. This means that it is not explicit and some inference or surmise on the part of the hearer or reader is required in order to comprehend that is being referenced. Here is an example:
The name Yogi Bear is an allusion to the Yankee baseball star and manager, Yogi Berra, and Jellystone Park, of course, is an allusion to Yellowstone Park.
Allusion also refers to an instance of using the technique, as in this sentence:
Using an allusion in your public speaking can help involve your audience by setting them a little puzzle to solve as they listen.
An illusion is a false or erroneous perception or conception. People can have an illusion, as well as create an illusion, in which case, they may either be creating art or attempting to deceive others. Here are some examples:
The Hallowe’en production tried to create the illusion of a spooky, abandoned castle, haunted by restless spirits.
Unfortunately, Ralph is under the illusion that he is actually a competent volleyball player. . . .
Rhonda hoped that well-chosen clothing and a heavy accent would create the illusion that she had recently arrived from Eastern Europe.
Distinguishing Allusion and Illusion
One mnemonic you can use to remember the difference between allusion and illusion is this: allusion, by making references to other works, looks to all the world. Illusion, with it’s potential for trickery, on the other hand, can cause ill. If you remember this, then the spelling of the word will remind you of which is which.
One other things: there is no form illude, so you don’t have to worry about distinguishing allude from illude. But do watch out for elude, which means “to get away from.” |
Why are coral reefs important?
Name: Wynne A Wells
Can you tell me the importance of coral reefs?
Coral reefs are important for many different reasons:
*the coral reef is "biologically diverse" that means there
are many different kinds of animals and plants that live theree
This is important, because just like the tropical rainforests,
Coral reefs may be the source of medicines, chemicals or other
resources that haven't even been discovered yet, and unless we
save these environments, we'll never get the chance to discover
these resources that we need;
*Coral reefs are "biologically productive" , which means there are
lots of each thing that grows here. Many of the creatures that l
live here, like lobsters and fish, we depend on for food, even
here in the Midwest , and all around the world!
*Coral reefs are beautiful places, and provide income from
tourists to many otherwise poor countries around the world.
*Reefs are very stable, and provide a protective barrier around
many islands and coasts. Without the reefs these islands and
coasts will erode away into the ocean.
*It is important to protect the reefs we have today, because they
can't be replaced. Reefs are formed very slowly by tiny animals
called "coral". Each animal is tinier than your pinky nail, and
grows very slowly, only about 1 centimeter a year. The reefs we have
today were formed over 100s of thousands of years, and
it would take just as long to grow back, if they grow back at all
Oil drilling and erosion from developing coasts near reefs are big problems.
Tom F Ihde
Click here to return to the Biology Archives
Update: June 2012 |
Parliament: English lawmaking body.
House of Lords and the House of Commons
Protestant: a Christian who is NOT Catholic
The Church of England: EXACTLY the same
as Catholicism except the head of the
church is the KING (7 sacraments)
A. Monarchs Defy Parliament
1. King James I (Catholic) and King
Charles I (Catholic) both upset
Parliament (lots of Protestants).
2. Charles I signed the Petition of
Right, which limited the monarchy
and protected people’s rights.
*agreed to get their consent to tax
B. The English Civil War
1. After Charles I ignored the petition and
continued to upset Parliament, the English Civil
War broke out in 1642.
2. Oliver Cromwell led the protestants against the
Monarch. He won and became a dictator.
3. Charles I was executed.
C. The Restoration
1. Unhappy with a military rule,
Parliament restored the monarchy
with King Charles II in 1660 (after
2. His brother, King James II’s
Catholic beliefs and favoritism
upset his subjects.
1. A bloodless overthrow of
James II in 1688 led to the rule
of Protestants Mary and William
2. This was known as the
D. The Glorious Revolution
E. Limits on Monarch’s Power
1. England became a
2. The English Bill of Rights
in 1689 listed the things a
ruler could not do and
protected people’s rights.
A. American Independence
1. Britain’s American colonies
were upset with King George III
for taxing them.
2. In 1776, Thomas Jefferson
borrowed John Locke’s ideas
and wrote the Declaration of
B. The Influence of the
1. Americans were influenced by Enlightenment
ideas like consent of the governed, natural
rights, separation of powers, democracy, free
speech, religious toleration, rights of the
C. The American Revolution
1. France under King Louis XVI helped
Americans fight their rival, Britain, in the
American Revolutionary War.
2. Americans shocked the world by winning
their independence in 1783.
D. Americans Create a
1. The Constitution outlined the
American government’s structure.
2. Using Montesquieu’s ideas, a
federal system of government with
three separate branches and a
system of checks and balances was
D. Americans Create a
3. Ten amendments known as
the Bill of Rights were added
to the Constitution to provide
protections for the people.
4. Many of these rights came
from Voltaire, Rousseau, and |
Carpal Tunnel Syndrome (cont.)
IN THIS ARTICLE
Carpal Tunnel Syndrome Causes
The following are risk factors associated with the development of carpal tunnel syndrome:
Carpal tunnel syndrome is rare in children.
The relationship between work and carpal tunnel syndrome is unclear. Positions of extreme wrist flexion and extension are known to increase pressures within the carpal canal and apply pressure on the nerve. This is particularly true with repetitive strain injury to the wrist. Intensity, frequency, and duration of work activity and their relationship to carpal tunnel syndrome are unclear.
Medically Reviewed by a Doctor on 12/4/2014
YOU MAY ALSO LIKE
Must Read Articles Related to Carpal Tunnel Syndrome
Patient Comments & Reviews
The eMedicineHealth doctors ask about Carpal Tunnel Syndrome:
Carpal Tunnel Syndrome - Describe Your Experience
Please describe your experience with carpal tunnel syndrome.
Carpal Tunnel Syndrome - Symptoms
What were your carpal tunnel syndrome symptoms?
Pain Management Resources
- Arthritis Pain Relief: Risks and Benefits
- How to Save Money on Health Care
- Will Health Reform Affect You? |
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising.
Sunday, June 25, 2017
Hemophilia and Inherited Bleeding Disorders
CBC value question
A recent CBC had one value outside of the normal range and I`m wondering what would cause that or if there should more concern about this. MCH was 33.8 and the "acceptable" range is 27 - 33
What might cause this? Is this cause for concern? Thank you.
The MCH stands for mean corpuscular hemoglobin and represents the amount of hemoglobin present in each red blood cell. A normal range for test results is defined as a range that will include 95% of the population. The value of 33.8 that you encountered may well represent a 'normal' value for you. It is not regarded as significantly different than the normal range.
Situations in which this value can be normal yet associated with clinical disease are when specific types of anemia (low red blood cell count or hemoglobin level) are present. Examples of such anemias would include those associated with bone marrow failure, hemolytic anemia, chronic renal disease, leukemia and metastatic malignancies. This lab finding by itself would not be able to diagnose any of these conditions.
I hope you found this information useful.
Patricia M Carey, MD
College of Medicine
University of Cincinnati |
Jewish people came here probably in the 19th century. The synagogue was built i 1883 but in the second half of the 20th century rebuilded into the townhouse.
Zlutice has extraordinary deep history. The celebration of thousand years were kept here in 1973. The village was firstly mentioned on the list of Czech bishopric in 973. The town was church property and was sold in 1186 to lord Bedrich. The town was promoted in 1214 but the surrounding wall were built later in the 13th century when the administrators was the family of Ryzmberk. The town got its town privillagies in 1375 as well as Cheb. The town recieved its coat-of-arms too. During the Hussism the town was badly damaged and after the battle by Tachov in 1427 it became a seat of the Hussist army leader Jakoubek of Vresovice and his family settled here too. During this period the estate was growing and developing and recieved other important privillages, but in 1537 was sold and many owner changed here since then. At the end of the 16th century the family of Kokorov was in charge of the town until 1850 when the last member of this family died.
The town was probably bilingual since it was established.But after the Hussism the offical languague was Czech. It last until 1673 when German became the offical languague in the whole Pilsen region.
The town square kept its original shape with surrounding roads. The original town castle disapeared with time only a few fragments survived.
There are some beautiful townhouses around the square. The townhall is in one of them and was founded in 1537. The local museum is next to the townhall and the information center is also on the square.
The most valuable building is the St. Peter and Paul´s church. This gothic building from the period of the king John of Luxemburg has irregural shape which was caused by many rebuildings. The original painting were found on the walls and there is also an interesting inventory from Baroque.
The town is famous for its manuscript called Zluticky with renesance paintings made by Jan Taborsky from Klokotska hora in 1558-1565. The copy is displayed in the local museum. |
These apps and websites for texting, messaging, and communication make it easier for teachers to send out asments, reminders, and progress reports and communicate with parents and students about conferences, field trips, and volunteer opportunities. This list will help you find a tool to keep your communication consistent, reach parents on platforms they're already using, and, in some cases, give students the opportunity to lead the conversation by demonstrating their learning in the classroom. Friendly, free tool for school-to-home communication facilitates connection.
Web-based chat platforms have been around for years, but are gaining a new foothold in classrooms as educators look for ways to incorporate technology into the curriculum. The immediacy of the technology gives students a direct connection with the instructor as well as classmates. Web chats promote real-time collaboration and discussion that can lead to deeper processing of class material. Integrating this technology does, however, require intentional planning on the part of the teacher. Preparation should include establishing rules of online etiquette and a process for orderly turn-taking, so that everyone gets a chance to participate.
|Eye tint:||I’ve got brilliant gray eyes|
|Hair color:||Dark-haired hair|
|What is my favourite drink:||Tequila| |
Once upon a time, before the advent of behavioral scientists and social reformers, the doctrine of accountability had few challengers. A person was held responsible for his behavior. Those who failed to meet society’s standards of conduct were expected to suffer prescribed consequences. Those whose level of performance at work or school or elsewhere was adjudged superior had a right to anticipate recognition; those who were inferior had no cause for complaint if they were penalized accordingly.
The gap between the real and the ideal existed here as elsewhere in the machinery of society. Some persons were held more rigorously accountable than others. But the principle itself was not called into question.
The sweeping application of the doctrine of accountability left many innocent victims in its wake. And so social reformers began pressing for limitations on its applicability. The populace of tender age early escaped some accountability; so did those of conspicuously little intellect, and those considered lacking in sanity.
As the influence of the social sciences became more pronounced, the areas of non-accountability were extended. More sectors of life were involved; more categories of people were held to be exempt from responsibility for their actions. The behavioral sciences, stressing the manner in which human behavior is the consequence of the interplay of hereditary and environmental influences, seemed to many to make notions of free will obsolete. Why should persons who are molded by factors over which they have no control suffer for not meeting society’s standards?
In the newer conception of penology, the purpose of sentencing a convicted person was held to be not punishment but reform. The deviant needed ...1
Already a CT subscriber? Log in for full digital access.
Have something to add about this? See something we missed? Share your feedback here.
Subscribe to Christianity Today and get access to this article plus 60+ years of archives.
- Home delivery of CT magazine
- Complete access to articles on ChristianityToday.com
- Over 120 years of magazine archives plus full access to all of CT’s online archives
- Learn more |
Exploring the pathways of our lexicon
Stretching Out "The Whole Nine Yards"
"The whole nine yards," meaning "the full extent of something," remains one of the most puzzling idioms for word-watchers. Everyone seems to have their own explanation for where the expression comes from, and yet there is still no definitive origin story for it. This is surprising for a phrase that's not terribly old: scattered uses can be found from the 1960s, and now it's been pushed back a bit earlier, to 1956.
In a 2009 Word Routes column, I reported on what was then the latest progress in finding the earliest known usage of "the whole nine yards." Two citations from 1962 had been found by contributors to the American Dialect Society mailing list, a haven for those who enjoy the sport of "antedating," or hunting for increasingly earlier documentation of words and phrases. Stephen Goranson had found an example in a short story in the Fall 1962 issue of Michigan's Voices, and Bonnie Taylor-Blake had discovered it in a letter to the editor in the December 1962 issue of Car Life. Both of these examples were found thanks to Google Books: as the massive digitization project continues to grow, newly scanned sources fill in the historical gaps for words and phrases with murky origins, like "the whole nine yards."
Taylor-Blake has continued to monitor Google Books for newly discoverable attestations, and her vigilance has paid off. The database now includes issues of Kentucky Happy Hunting Ground from the 1950s — a publication that continues to be put out by the Kentucky Department of Fish and Wildlife Resources under the name Kentucky Afield. Google Books turned up examples of "the whole nine yards" in KHHG from 1956 and 1957. But because the relevant passages are only displayed in "snippet view," Taylor-Blake needed to track down the full context for verification, and the current Kentucky Afield editor helped her out, sending along page scans. On page 18 of the July 1956 issue of KHHG, an article headlined "Kentucky Afield Fishing Derbies Are Underway" describes fishing competitions held around Kentucky and the prizes that the winners would get, including a 14-foot boat trailer and Evinrude motor as the Grand Prize. A paragraph near the end of the article wraps things up with "So that's the whole nine-yards."
The second article, on p. 31 of the January 1957 issue, uses "the whole nine yards" (no hyphen this time) to describe hunters: "These guys go the whole nine yards — no halfway stuff for them." Taylor-Blake determined that the author of both articles was Ron Rhody, and remarkably enough he's still around and even has a blog. Rhody told Taylor-Blake that he thought it was a common expression in Kentucky at the time but didn't have any particular insights about its origins. He surmised that it had to do with football yardage, one of the more popular origin stories. Getting a first down in football requires advancing the ball ten yards, so if it was fourth down with nine yards to go, you could go for it and try to get "the whole nine yards" for a first down instead of safely punting. (See my previous Word Routes column for a roundup of theories.)
And so the search continues. The Kentucky connection is an interesting one, but there's no reason to think that the idiom was particularly localized to that state. Stephen Goranson noted that there was a master's thesis in folklore at Western Kentucky University in 1979 with the title "An' the Whole Nine Yards: an Ethnography of a Kentucky Gunsmith." I got in touch with the author of the thesis, Michael Korn, who now works for the Law Enforcement Bureau of Montana Fish, Wildlife & Parks. He told me that he used that title because Joe Hollingsworth, the late Bowling Green gunsmith who was the subject of the thesis, "regularly used the phrase to describe a custom rifle he was building that had every fancy detail." Korn believes that the expression originated from veterans returning from World War II, like Hollingsworth's father. He subscribes to the common conjecture that "the whole nine yards" originally referred to the length of an ammunition belt for machine guns used during the war.
That, or some related military origin, could be the ultimate source, and as the documented sources for "the whole nine yards" creep ever closer back to the World War II era we may eventually find an authoritative explanation for the phrase. For now, though, such an explanation remains tantalizingly out of reach.
(If you'd like to hear more about the history of English idioms, take a listen to the hour I spent on WFAE's "Charlotte Talks" earlier this week, along with UNC Charlotte professor Ralf Thiede.) |
Rosacea is a common disorder that mainly affects skin on the face. It causes redness on the nose, chin, cheeks, and forehead. Over time, the redness can become more intense, taking on a ruddy appearance. Blood vessels may become visible.
In some cases, rosacea appears on the chest, back, or neck. It can affect the eyes, causing them to feel irritated and to appear bloodshot or watery. People with rosacea can also develop red solid bumps and pus-filled pimples. The disorder can cause the nose to take on a bulbous, swollen appearance called rhinophyma.
Causes of Rosacea
The cause of rosacea is not known, but elements of the disease process have been identified. One theory is that rosacea may be due to a disorder of the neurovascular system (nerves, veins, arteries) or the immune system. A microscopic skin mite called Dermodex is more abundant where there is rosacea and may contribute to the condition. Studies have suggested a genetic connection between rosacea and other serious health conditions such as cancer and cardiovascular and intestinal diseases.
Risk Factors for Rosacea
Rosacea affects an estimated 14 million Americans -- most of them don't know they have it.
People who have fair skin and who tend to blush easily may be at a higher risk for the disorder. Rosacea appears more often among women, but men tend to have the more severe symptoms. A possible reason for this could be that men generally delay medical treatment until rosacea becomes advanced.
Is There a Cure for Rosacea?
While there is no cure for rosacea, medical therapy is available to control or reverse the signs and symptoms. If you suspect that you have rosacea, consult your doctor.
Signs and Symptoms of Rosacea
Rosacea's appearance can vary greatly from one individual to another. Most of the time, not all of the potential signs and symptoms appear. Rosacea always includes at least one of the primary signs listed below. Various secondary signs and symptoms may also develop.
Primary signs of rosacea include:
- Flushing. Many people who have rosacea have a history of frequent blushing or flushing. The facial redness, which may come and go, often is the earliest sign of the disorder.
- Persistent redness. Persistent facial redness may resemble a blush or sunburn that does not go away.
- Bumps and pimples. Small red solid bumps or pus-filled pimples often develop in rosacea. Sometimes the bumps may resemble acne, but blackheads are absent. Burning or stinging may also be present.
- Visible blood vessels. Small blood vessels become visible on the skin of many people who have rosacea.
Other potential signs and symptoms include:
- Eye irritation. The eyes may be irritated and appear watery or bloodshot in some people with rosacea. This condition, called ocular rosacea, can also cause styes as well as redness and swelling of the eyelids. Severe cases, if left untreated, can result in corneal damage and vision loss.
- Burning or stinging. Burning or stinging sensations may occur on the face and itchiness or a feeling of tightness may also develop.
- Dry appearance. The central facial skin may be rough, and thus appear to be very dry.
- Plaques. Raised red patches may develop without changes in the surrounding skin.
- Skin thickening. In some cases of rosacea, the skin may thicken and enlarge from excess tissue, resulting in a condition called rhinophyma. This condition often occurs on the nose, causing it to have a bulbous appearance.
- Swelling. Facial swelling can occur independently or can accompany other signs of rosacea.
Signs and symptoms of rosacea may develop beyond the face, affecting areas including the neck, chest, or ears.
Your doctor will conduct a thorough exam of signs and symptoms and will ask questions about your medical history. Tell your doctor about any problems you are having with your face (redness, bumps or pimples, burning, itching, etc.). There is no specific test to diagnose rosacea.
Rosacea treatment may vary depending on a person's signs and symptoms. Treatments used for rosacea include:
- Medications. Sometimes, doctors prescribe oral and topical medications to treat the disorder's associated bumps, pimples, and redness. Medications can bring the condition under control and keep it in remission (the disappearance of signs and symptoms).
- Surgical procedures. Doctors can remove visible blood vessels, limit the amount of extensive redness on the face, or correct nose disfigurement in some cases.
While there is no way to prevent the condition, rosacea sufferers can improve their chances of maintaining remission by identifying and avoiding lifestyle and environmental factors that trigger rosacea flare-ups. Some triggers include:
- Sun/wind exposure
- Emotional stress
- Hot/cold weather
- Heavy exercise
- Alcohol consumption, especially red wine
- Hot beverages and foods
- Spicy foods |
Episode 2 The Meaning of Climate Change 1st December, 2015 (Part 1) Indigenous Oil . Combining anecdotal experience of indigenous groups on the front line of Canada’s environmental conflict with academic research. Produced and directed by Will Hood.
This episode explores the role of story in our on-going relationship with energy, ecology and economics.
This episode features: Chief Billy Joe Laboucan Massimo Chief of the Lubicon Cree Band, Little Buffalo, Alberta, Canada; David Attenborough Broadcaster, UK; Ernie Gambler Indigenous Musician from Calling Lake, Alberta, Canada; Isabel Altamirano-Jimenez Indigenous Scholar at the University of Alberta, Canada; J.B. Williams, Tsawout First Nation Flood Story Narration (with music from Elder May Sam); Makere Stewart-Harawira Indigenous Scholar at the University of Alberta, Canada; Peter Newell Professor of International Relations at the University of Sussex
Episode Extras: Oil On Lubicon Land: A Photo Essay
Source: (Part 1) Indigenous Oil – The Glass Bead Game
TORONTO – Aboriginal people in Ontario are prepared to lay down their lives to protect their traditional lands from any unwanted development, a group of First Nations chiefs said Tuesday.Five aboriginal chiefs served notice on the Ontario and federal governments, developers and the public that they’ll assert their treaty rights over their traditional territory and ancestral lands.That includes the rights to natural resources — such as fish, trees, mines and water— deriving benefit from those resources and the conditions under which other groups may access or use them, which must be consistent with their traditional laws, said Ontario Regional Chief Stan Beardy.“All those seeking to access or use First Nations lands and resources have, at a minimum, a duty to engage, enquire and consult with First Nations with the standards of free, prior and informed consent,” he said.“We will take appropriate steps to enforce these assertions.”
via Ontario First Nations prepared to lay down lives to protect lands. |
Migration from rural areas of India to the city is surprisingly low compared with other large developing countries, leaving higher paying job opportunities unexploited. This research shows that well-functioning rural insurance networks are in part responsible for this misallocation in the labor market, creating incentives that keep adult males in the village. Policies that provide private credit to wealthy households or government safety nets to poor households would encourage greater rural-urban migration but they could also have unintended distributional consequences.
The majority of the world’s population lives in low-income countries where market failures are pervasive and governments’ budgets are tight. Research in development economics addresses the following questions:
What keeps individuals in poverty?
What keeps firms small and unable to expand?
Which policies have been effective at enabling resources to flow more easily to their most productive use, thus raising incomes?
What approaches have been effective at improving government performance, e.g. through incentives for agents delivering public services and the design of the tax system?
Many fear that climate change will have severe effects on the global economy, particularly through the threat to food production and farmers’ earnings. This research suggests that much of the potential harm could be avoided if farmers can switch their crops in response to changing relative yields. |
USING MORMON FILMS FOR ALSATIAN RESEARCH
On the eve of the French Revolution in 1789, half of the Jews in France were living in Alsace, an area roughly the size of the state of Rhode Island. The first Jews to arrive in what is now France probably arrived as slaves during the Roman occupation. Following the fall of the Second Temple in the first century C.E., many more fugitive Jews fled across the Mediterannean to Gaul, settling in such cities as Arles, Vienne and Narbonne, where they were soon comfortably established. Over the following centuries Jews had spread, and were thriving, to all parts of what was then France. However, with the first Crusade in the 11th century the persecutions began.
Over suceeding centuries the Jews were alternately tolerated and expelled by the French rulers, depending on their usefulness to the particular monarch. The boundaries of what was then known as France were considerably smaller than those of today. The region of Alsace was a part of the Holy Roman Empire until it was ceded to France by the Treaty of Westphalia in 1648, at the end of the Thirty Year's War. Since it was not French, large numbers of Jews expelled from France fled to this small neighboring region.
In addition, the havoc wrought on that area by the many battles had reduced it to ruins, both financially and physically. For that reason, the Jews were welcomed to help rebuild Alsace, and were also less visible spread out in the countryside. The following year (1649) the Chmielnicki massacres brought even more Jews from Eastern Europe to relative safey in Alsace. And so, over the years, the population grew rapidly, from the 2600 souls counted in a 1689 census, until the famous (or infamous) 1784 "Census of the Jews who were Tolerated in Alsace", which showed there to be over 20,000 living there at that time. By contrast there were then about 7,000 in the Moselle region, some 2,000 in the Comtat-Venaissin in the southeast of France, 4,000 in the Bordeaux/Bayonne region, descendants of those expelled in the 15th century from Spain and Portugal, and only 500 in Paris, all of whom were given French citizenship in 1792. This explains why so many of French ancestry in the U.S. descend from Alsatian roots.
We come now to a discussion of the records available for research in Alsace. To begin with, the most important thing to remember is that there are no centralized records for doing research in France. France is divided into 97 Départements, roughly coinciding to counties in the U.S. Each maintains its own departmental archive. Alsace comprises two Départements: Bas-Rhin in the north, with Strasbourg as its main city, and Haut-Rhin to the south with Colmar as its main city. Knowing that you had an ancestor who came from "Alsace" is about as helpful to doing research there as knowing that you had an ancestor from "New England", or the "Pacific Northwest" in the U.S. In short, before attempting to cross the ocean to France it is imperative that you use the usual resources to identify the precise locality from which your ancestor came. The JewishGen FAQ #11, "Finding your Ancestral Town" is an excellent guide for those in the U.S.
The records that do exist in Alsace can be divided into two distinct periods: Pre-1792, also referred to as the Ancien Régime, and post-1792, when civil registration became compulsory for all French citizens. There are a number of resources available from the period of the Ancien Régime, but they are not available in the United States, and the difficulty of locating and deciphering them calls for an expert in the field. Among these are such items as early censuses, taxation records and Notarial archives. The Archives themselves are not set up to do research, or copying and mailing of documents abroad. Should you be fortunate enough to know from which town your family came then you are advised to seek the services of a qualified, experienced and knowledgeable researcher in France.
Now, let us consider the post-1792 records. A number of these have been filmed by the Mormons and are available at their Family History Centers. Without a doubt, the most valuable of these microfilms are the Civil Registration records. These include the birth, marriage and death registrations, almost all of which have been filmed by the Mormons, and are the main source for Jewish genealogical research in the area. Most of these films were made in the 1970's or early 1980's, and, therefore, because of France's 100-year Privacy Laws, end in the 1870's or early 1880's.
Assuming that you have located the town from which your ancestor came you must first search the Locality section of the LDS catalog, either on microfiche or CD-ROM. You would look under the country, the department, and then the town. For example: France, Moselle, Saint-Julien-lès-Metz. Under that heading you would then choose "Civil Registration". This will in turn list the various film numbers available for that community (Figure 1). The new online web catalog at http://www.familysearch.org permits a simple online search by first clicking on the Library Catalog button, and then choosing the Place Name search. In this case you would enter the name of the town, and then the country, i.e., Saint-Julien-lès-Metz, and then France. This will then bring you to the listing for France, Moselle, Saint-Julien-lès-Metz, and then again to the Civil Registration Lists. A click on the View Film List button will give you the same lists as below.
A typical listing for a town will provide, first of all, 10-year indexes to birth, marriage and death registrations (Tables Décennales). Then follow the listings of film numbers for each of the records: Births (Naissances), Marriages (Mariages) and Deaths (Décès). Within each year these indexes are arranged alphabetically by family name, and the marriage records include listings by both the name of the bride and the groom. Using these indexes as your starting point you should carefully note any possible family names and the dates and certificate numbers. Only then should you begin with the individual reels which contain the full certificates. The most difficult to deal with are those from the first two decades (from 1792 through 1810).
These were handwritten paragraphs giving the particulars, and often extremely difficult to read and understand. As in all such human undertakings, handwriting quality differs from town to town. Some scribes were very meticulous, and kept detailed records. Some did not. One helpful feature in these earlier years is that the name of the individual and certificate number is written in the margin. So, if you have the correct date and certificate number it is possible to make a copy of the document, and hopefully be able translate it or find someone who can read it for you.
Beginning in 1811 the job grows simpler. A printed form was used for the records, with blanks to be filled, which helps the legibility enormously. (Figure 3). Names of parents are given, often the occupation of the groom, a house number and a grandparent, are included. I have found records from the later years which have the date and place of death, as well as dates for permission to emigrate, and the date and place to which that person emigrated added in the margin! It is also important to note the witnesses that were required to be present. Almost always these were relatives of the bride or groom, and can give additional family information. This is particularly true in the case of marriages, where relatives often came from different towns which are named. This can lead to other branches of the family. Births or deaths were often reported by a neighbor or friend.
While not producing any heirs to trace, it can fill in a touching picture of your ancestor's life when an infant who was stillborn or who died shortly after birth is discovered. These infants will not necessarily be found in the birth records, but may have been directly entered into, and found only in, death records.
It can be an exhausting procedure to go through these individual reels of film. In my case, it took me 2 ½ years, going once a week, to look at every single reel of microfilm for my town in Alsace. However, there is a benefit to doing this that goes far beyond obtaining a copy of a single vital record for a single ancestor. One can reconstruct entire family relationships, finding siblings of the direct ancestor, as well as their descendants. It is well worth the effort! |
Help support New Advent and get the full contents of this website as an instant download. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99...
A most valuable Greek manuscript of the Old and New Testaments, so named because it was brought to Europe from Alexandria and had been the property of the patriarch of that see. For the sake of brevity, Walton, in his polyglot Bible, indicated it by the letter A and thus set the fashion of designating Biblical manuscripts by such symbols. Codex A was the first of the great uncials to become known to the learned world. When Cyril Lucar, Patriarch of Alexandria, was transferred in 1621 to the Patriarchate of Constantinople, he is believed to have brought the codex with him. Later he sent it as a present to King James I of England; James died before the gift was presented, and Charles I, in 1627, accepted it in his stead. It is now the chief glory of the British Museum in its manuscript department and is on exhibition there. [Editor's Note: The British Museum and the British Library split in 1973, and the Codex is now kept in the latter.]
Codex A contains the Bible of the Catholic Canon, including therefore the deuterocanonical books and portions of books belonging to the Old Testament. Moreover, it joins to the canonical books of Machabees, the apocryphal III and IV Machabees, of very late origin. To the New Testament are added the Epistle of St. Clement of Rome and the homily which passed under the title of Second Epistle of Clement the only copies then known to exist. These are included in the list of New Testament books which is prefixed and seem to have been regarded by the scribe as part of the New Testament. The same list shows that the Psalms of Solomon, now missing, were originally contained in the volume, but the space which separates this book from the others on the list indicates that it was not ranked among New Testament books. An "Epistle to Marcellinus" ascribed to St. Athanasius is inserted as a preface to the Psalter, together with Eusebius's summary of the Psalms; Psalm 151 and certain selected canticles of the Old Testament are affixed, and liturgical uses of the psalms indicated. Not all the books are complete. In the Old Testament there is to be noted particularly the lacuna of thirty psalms, from 5:20, to 80:11; moreover, of Genesis 14:14-17; 15:1-5, 16-19; 16:6-9; 1 Samuel 12:20-14:9. The New Testament has lost the first twenty-five leaves of the Gospel of St. Matthew, as far as 25:6, likewise the two leaves running from John 6:50, to 8:52 (which, however, as the amount of space shows, omitted the formerly much disputed passage about the adulterous woman), and three leaves containing 2 Corinthians 4:13-12:6. One leaf is missing from I Clement and probably two at the end of II Clement. Codex A supports the Sixtine Vulgate in regard to the conclusion of St. Mark and John 5:4, but, like all Greek manuscripts before the fourteenth century, omits the text of the three heavenly witnesses, 1 John 5:7. The order of the Old Testament books is peculiar. In the New Testament the order is Gospels, Acts, Catholic Epistles, Pauline Epistles, Apocalypse, with Hebrews placed before the Pastoral Epistles. Originally one large volume, the codex is now bound in four volumes, bearing on their covers the arms of Charles I. Three volumes contain the Old Testament, and the remaining volume the New Testament with Clement. The leaves, of thin vellum, 12 3/4 inches high by 10 inches broad, number at present 773, but were originally 822, according to the ordinary reckoning. Each page has two columns of 49 to 51 lines.
The codex is the first to contain the major chapters with their titles, the Ammonian Sections and the Eusebian Canons complete (Scrivener). A new paragraph is indicated by a large capital and frequently by spacing, not by beginning a new line; the enlarged capital is placed in the margin of the next line, though, curiously, it may not correspond to the beginning of the paragraph or even of a word. The manuscript is written in uncial characters in a hand at once firm, elegant, simple; the greater part of Volume III is ascribed by Gregory to a different hand from that of the others; two hands are discerned in the New Testament by Woide, three by Sir E. Maunde Thompson and Kenyon experts differ on these points. The handwriting is generally judged to belong to the beginning or middle of the fifth century or possibly to the late fourth. An Arabic note states that it was written by Thecla the martyr; and Cyril Lucar the Patriarch adds in his note that tradition says she was a noble Egyptian woman and wrote the codex shortly after the Nicene Council. But nothing is known of such a martyr at that date, and the value of this testimony is weakened by the presence of the Eusebian Canons (d. 340) and destroyed by the insertion of the letter of Athanasius (d. 373). On the other hand, the absence of the Euthalian divisions is regarded by Scrivener as proof that it can hardly be later than 450. This is not decisive, and Gregory would bring it down even to the second half of the fifth century. The character of the letters and the history of the manuscript point to Egypt as its place of origin.
The text of Codex A is considered one of the most valuable witnesses to the Septuagint. It is found, however, to bear a great affinity to the text embodied in Origen's Hexapla and to have been corrected in numberless passages according to the Hebrew. The text of the Septuagint codices is in too chaotic a condition, and criticism of it too little advanced, to permit of a sure judgment on the textual value of the great manuscripts. The text of the New Testament here is of a mixed character. In the Gospels, we have the best example of the so-called Syrian type of text, the ancestor of the traditional and less pure form found in the textus receptus. The Syrian text, however, is rejected by the great majority of scholars in favour of the "neutral" type, best represented in the Codex Vaticanus. In the Acts and Catholic Epistles, and still more in St. Paul's Epistles and the Apocalypse, Codex A approaches nearer, or belongs, to the neutral type. This admixture of textual types is explained on the theory that A or its prototype was not copied from a single manuscript, but from several manuscripts of varying value and diverse origin. Copyist's errors in this codex are rather frequent.
Codex Alexandrinus played an important part in developing the textual criticism of the Bible, particularly of the New Testament. Grabe edited the Old Testament at Oxford in 1707-20, and this edition was reproduced at Zurich 1730-32, and at Leipzig, 1750-51, and again at Oxford, by Field, in 1859; Woide published the New Testament in 1786, which B. H. Cowper reproduced in 1860. The readings of Codex A were noted in Walton's Polyglot, 1657, and in every important collation since made. Baber published an edition of the Old Testament in facsimile type in 1816-28; but all previous editions were superseded by the magnificent photographic facsimile of both Old and New Testaments produced by the care of Sir E. Maunde Thompson (the New Testament in 1879, the Old Testament in 1881-83), with an introduction in which the editor gives the best obtainable description of the codex (London, 1879-80).
APA citation. (1908). Codex Alexandrinus. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/04080c.htm
MLA citation. "Codex Alexandrinus." The Catholic Encyclopedia. Vol. 4. New York: Robert Appleton Company, 1908. <http://www.newadvent.org/cathen/04080c.htm>.
Transcription. This article was transcribed for New Advent by Sean Hyland.
Ecclesiastical approbation. Nihil Obstat. Remy Lafort, Censor. Imprimatur. +John M. Farley, Archbishop of New York.
Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads. |
Human Rights and Religious Wrongs
Although the discourse on human rights has a long pedigree, traceable at least to early modern natural rights theory and politics, the philosophical case for human rights against one alternative, religion, has yet to be made. Hence Religion and Human Rights: An Introduction, the new volume edited by John Witte Jr. and M. Christian Green, both of Emory University's Center for the Study of Law and Religion, elicits high hopes. Unfortunately, despite its range of expertise, constituted by contributions from scholars across borders and disciplines, it not only fails to make that case, but indicates an acute unawareness of its very need or urgency.
The book's fatal weakness is betrayed on its cover by the presence of the Christian "Golden Rule," as illustrated by Norman Rockwell. In reducing religion to the merry mantra "Do unto others as you would have them do unto you," religion's latent critique of the contemporary human-rights agenda goes unnoticed. Instead, the book is from the start firmly in the human-rights camp. The authors' purpose, then, is to sell human rights to religious believers. This is accomplished in two ways: the book's first section investigates possible bases of religious authority for human rights amongst the world's major religious traditions, to demonstrate that the two are theoretically complementary; and the book's second section explores the reality of the encounter between human rights and religion in the contemporary world, to demonstrate that the two are empirically complementary.
To outline the religious critique of the human-rights agenda, a review of its evolution is, as the editors appreciate, in order. At the end of World War II, it was "time to restate the basics of life, freedom, and community," a necessity which prompted the Universal Declaration of Human Rights (UDHR), drafted by a multinational committee of experts and ratified by the General Assembly of the UN in 1948. But the UDHR was not merely a restatement of acknowledged moral norms. Rather, it staked a profound philosophical position potentially at variance with earlier moral systems, such as religion—and, especially, Judaism. In deciding that the "basics" are to be found first and foremost at the level of the individual and not the community (such that one is a human being first and only after and if one chooses, a Jew), the UDHR presented a philosophical alternative to earlier approaches which put the community first.
Consider the language of human-rights declarations. The articles dealing with religion in the UDHR were called the rights of "thought, conscience, and belief," and were elaborated by subsequent conventions, such as the International Covenant on Civil and Political Rights (ICCPR), adopted by the General Assembly in 1966, the Declaration on Religion, adopted in 1981, and the Copenhagen Document, adopted in 1990 by the Organization for Security and Cooperation in Europe (OSCE). The ICCPR declares that "freedom to manifest one's religion or beliefs may be subject only to such limitations as are prescribed by law and are necessary to protect public safety, order, health, or morals, or the fundamental rights and freedoms of others." Effectively, the human-rights regime determines the contours of religion (with the who-is-a-Jew question, among other thorny issues, neatly elided by the assertion that "Everyone shall have the . . . freedom to have or to adopt a religion or belief of his choice"), and the demands of religion do not supersede the autonomy of the individual. The prerogative assumed here by the supra-state human-rights regime used to belong to the State. But inevitably, with the rise of human rights, the State itself, like religion, becomes enervated. The Declaration on Religion, meanwhile, insisted that parents' education of their children must ensure that
the child shall be protected from any form of discrimination on the ground of religion or belief. He shall be brought up in a spirit of understanding, tolerance, friendship among peoples, peace and universal brotherhood, respect for freedom of religion or belief of others, and in full conscience that his energy and talents should be devoted to the service of his fellow men.
The doublethink in this article is almost as astonishing as its totalitarian ambition. The demand that a child is to be raised both to believe in the spirit of understanding, tolerance, and universal brotherhood, but also to respect the freedom of religion and belief of others, severely limits what those religions and beliefs of others can be. And the aspiration to dictate the terms and content of the education of every child on earth is a remarkable conceit. Education is necessarily the prerogative of someone other than the object of that education, and the question is whether that prerogative belongs to the parents, the religious community, or the State. According to the Declaration of Religion, the answer is: none of the above.
Ever the apologists, the book's editors insist this allows for the "manifestation of religion" (a revealingly sterile locution) to be subjected to "‘appropriate" state regulation and adjudication—a disingenuous defense if the Declaration is to be taken at its word that the State has no role but to enforce the cosmopolitan human-rights regime.
Given the profundity of the human-rights attack on religion, one would presume it reflects a thoughtful and substantive philosophy of humankind which successfully draws together the remarkable variety of human predilections and beliefs. But when Jacques Maritain, a member of the UDHR's drafting committee, was asked precisely how such a diverse group holding such divergent viewpoints could agree to a definitive list of fundamental rights, he responded, "We agree about the rights but on condition no one asks us why." The goal, apparently, was to agree "not on the basis of common speculative ideas, but on common practical ideas," a tacit admission that there is no comprehensive—perhaps no coherent—moral logic to the human-rights agenda, despite its confidence in a utilitarian individualism directly at odds with religion.
It is precisely this opposition to religion that underlies the editors' introduction, which treats the topic in a condescending and anthropological manner. Religions, we are told, are now confessing "that their internal policies and external advocacy have helped to perpetrate bigotry, chauvinism, and violence as much as they have served to propagate equality, liberty, and fraternity." Granted, the editors rebuff the arguments of more extreme anti-religionists who would prefer to purge religion from the human-rights agenda altogether. Nevertheless, it is only because of the residual power of religion in the contemporary world that "to exclude [religions] from the struggle is impossible, indeed catastrophic. To include them, by enlisting their unique resources and protecting their unique rights, is vital to enhancing the regime of human rights." This cynical perspective is predictably met by cynicism among the religious, who are more likely to call for human rights when their members are abused, and less likely to evaluate their own behavior toward minorities in their ranks.
And so, quite clear that each side is using the other for its own benefit, the book commences its search for authoritative bases for the human-rights agenda in the traditions of the various religions. The Jewish contribution is provided by David Novak, a Conservative rabbi and scholar, who shares his editors' pragmatic motivation—although this pragmatism undermines the Jewish theoretical supports which he hopes to bring to the human-rights agenda.
In staking the claim that a tradition which is so concerned with commandments and lacks a very word for "right" nonetheless has much to offer the human-rights movement, the burden of proof is on Novak, who incorporates the rights-talk into Jewish tradition rather than finding it there organically and explicating it. Thus, somewhat resignedly, Novak notes that the Jewish people may not be able to achieve "the full and final coordination of all rights"—but that the Jews can still contribute to that full realization by someone else.
In fact, Novak wisely notes how the efforts of one people to reach out and benefit another are often underlain by an imperialist agenda of political or religious conquest, an observation which can be deliciously be turned on the human-rights regime itself. This is the case made by Abdullah Ahmed An-Naim, who authored the chapter on the Muslim contribution. Perhaps unsurprisingly, he opens with probably the greatest defense of religion in the book:
I find it difficult to see how any conception of human rights can be "universal" by any definition of this term if it is inconsistent with the religious beliefs of Muslims at large. If universality is a normative claim that these rights ought to be universally accepted and applied, a believer will not voluntarily accept that claim if it is incompatible with her religious beliefs.
Although he goes on to claim that a human-rights agenda can in fact be founded on traditional Islamic ideas, he never actually makes that theoretical case. And elsewhere, An-Naim has insisted that human rights not be the standard by which religion is judged, which seems surely to argue against the aforementioned articles on religion of the human-rights declarations, which, in delineating acceptable religious practice, do precisely that.
"Human rights norms . . . have emerged today as one of the very few universal and cosmopolitan principles that are recognized around the world." And, to be sure, many religious people have thereby benefited, for the specifically religious rights afforded to individuals have been extended to religious groups, and theoretically ensure the religious rights of minorities. That said, in practice these legalistic exhortations have also often failed precisely in those places where they are most needed. But although the volume goes on to explore interesting empirical encounters between human rights and religion, not having made the case (and barely seeing the need to make the case) for a universalist human-rights philosophy as against the communalist claims of religion, the book fails to justify, or indeed recognize, its own necessity.
Jonathan Neumann is the Tikvah Fellow at Commentary, the current issue of which features his essay on Occupy Wall Street and the Jews.
Comments are closed for this article. |
The Shrine of Our Lady of Walsingham (known as "England's Nazareth") is an Anglican and Catholic shrine to the Virgin Mary in rural Norfolk, England. It was founded in the 11th century after a local noblewoman had a vision of the Virgin Mary and became a very popular medieval pilgrimage destination. Suppressed at the English Reformation, the shrine was revived in the early 20th century and once again attracts many pilgrims.
History of Shrine of Our Lady of Walsingham
In the mid-11th century, Little Walsingham was a thriving village located halfway between the major city of Norwich and the wealthy town of King's Lynn. The lady of the manor in this village was Lady Richeldis de Faverches, a Saxon noblewomen. A young widow with one son, Geoffrey, she was known for her piety, devotion to Mary, and good works.
In 1061, the Virgin Mary appeared to Lady Richeldis in a vision, transporting her to the Holy House in Nazareth and requesting that an exact replica be built in Walsingham. The vision was repeated three times and the house was miraculously completed overnight using the materials provided by Lady Richeldis. Another legend says that a miraculous spring appeared in the ground to mark the spot where Mary which her shrine to be constructed.
Geoffrey de Faverches, who may have participated in the First Crusade (1096-99), left instructions in his will for a priory to be built around the Holy House. This was done by the Augustinians in the mid-12th century. The Slipper Chapel was built around 1340 as the last pilgrim chapel before Walsingham. In 1347, a Franciscan friary was established in Little Walsingham by Elizabeth de Burgh, Countess of Clare.
Helped by widespread enthusiasm for the Holy Land and devotion to Mary in medieval England, the shrine and priory at Little Walsingham steadily grew in popularity among pilgrims and monarchs alike. The first king to visit was Henry III in 1226. He was followed by Edward I (visited 11 times), Edward II (1315), Edward III (1361), King David of Scotland (1364), Richard II (1383), Queen Joan (1427), Edward IV (1469), and Henry VI (1487).
King Henry VIII was the last of the pre-Reformation kings to visit. His first wife, Catherine of Aragon, was a frequent visitor as well. But it was under King Henry VIII that the shrine was suppressed in 1538, as part of the English Reformation. The image of Our Lady of Walsingham and the Holy House were both burned to ashes.
In 1890, Charlotte Boyd bought the Slipper Chapel. Originally an Anglican, Miss Boyd converted to Catholicism after visiting the Marian shrines of Europe. In 1897, she donated it to Downside Abbey, the chapel was refounded by Pope Leo XIII, and it received the first Roman Catholic pilgrimage since the Middle Ages. In 1934, the Slipper Chapel was named the Roman Catholic National Shrine of Walsingham.
In 1921, Friar Patten, the Vicar of Walsingham, revived the medieval pilgrimage among Anglicans. He commissioned a new statue of Our Lady of Walsingham, based on the image shown on the medieval seal of the priory. The statue was placed in Little Walsingham's parish church in 1922 and the first organized Anglican pilgrimage took place in 1923. Anglican pilgrims began to arrive in steadily increasing numbers thereafter.
In 1948, a major "Pilgrimage of Prayer and Penance" was made by Catholics around England to Walsingham, in response to Pope Pius XII's call for repentance after the evils of World War II and for prayers for peace in Britain around the world.
A Catholic statue of Our Lady of Walsingham was made in 1957 and crowned by the papal legate before a crowd of over 10,000 people on August 15. In 1981, the Catholic Chapel of the Reconciliation was built next to the Slipper Chapel.
In April 2005, construction began on a new Catholic parish church in Little Walsingham village. It was dedicated by Bishop Micheal Evans on the Feast of the Annunciation in March 2007.
What to See at Shrine of Our Lady of Walsingham
The Shrine of Our Lady of Walsingham actually consists of several shrines and chapels of various denominations, which are scattered around the village of Little Walsingham and the nearby village of Houghton St Giles. Since its revival in the early 20th century, the shrine and pilgrimage of Walsingham has had a strong ecumenical tradition.
The Anglican Shrine Church, built by Friar Patten in the early 1930s, is located near the center of Little Walsingham. It contains a replica of the Holy House and the statue of Our Lady of Walsingham made in 1922. Its crypt contains the Holy Well, which was discovered during the construction of the church and is believed to have healing properties.
During the pilgrimage season (Easter to October), several services are held in the Shrine Church each day. Sprinkling at the Holy Well - in which pilgrims receive a sip of water, the sign of the cross on their foreheads, and water poured over their hands - is available at 2:30 pm each day.
The Anglican Shrine is administered by the College of Guardians, comprised of 20 priests and male and female laity, who are its legal trustees. The Guardians can be identified by the insignia they wear at the Shrine Church and during the National Pilgrimage: a star suspended on black and white ribbon and a blue mantle.
The Slipper Chapel, located about a mile south of Walsingham in Houghton St Giles, is the primary Catholic shrine at Walsingham. Built in the 14th century, it is the only surviving pilgrim station of many that once marked the pilgrimage route. Its unusual name derives from the pilgrims who would remove their shoes here to walk the rest of the way to Walsingham barefoot. The church was restored and reconsecrated by the Roman Catholic Church in 1938.
Also in 1938, the Chapel of the Holy Ghost was added to the church to provide more room for pilgrims. The small chapel contains votive candles and a fine modern mosaic by Anna Wyner called Descent of the Holy Spirit at Pentecost - Our Lady in the Midst of the Apostles (1988).
Next to the Slipper Chapel is the modern Chapel of Reconciliation.
The main Catholic site in the village of Walsingham is the Church of the Annunciation (a.k.a. New Parish Church), dedicated in 2007. Made of brick and stone, it has a round sanctuary and the latest technology in renewable energy.
There is an Orthodox presence at Walsingham as well. The Greek Orthodox Church worships in the restored stationmaster house and the Russian Orthodox Church has a shrine by the river.
Also of interest in the village of Little Walsingham is the Shirehall Museum, which includes an exhibit on the history of the pilgrimage to Walsingham; the Parish Church of St Mary, where the modern statue was original placed; and the ruins of a 13th-century Franciscan friary.
Pilgrimages and Events
In addition to the specific pilgrimages below, a longer pilgrimage is made by individuals and groups from Ely to Walsingham (about 50 miles).
During pilgrimage season (Easter-October), services are held multiple times each day in the Anglican Shrine Church. In addition, every Saturday and Wednesday evening, the image of Our Lady of Walsingham is carried in procession around the gardens. Finally, on Sunday afternoons, the Procession of the Blessed Sacrament carries a monstrance with the consecrated host, accompanied by pilgrims singing the Lauda Sion hymn.
The Anglican National Pilgrimage to Walsingham is held on the last Monday of May each year. At 11 am, the High Street is closed to traffic and the Shrine Church is locked. At noon, a Mass is held in the Abbey Grounds.
Since 2004 this has been followed by a lunch interval from 1-2:30 pm, during which it is traditional to have a picnic in the abbey gardens. At 2:30 pm there is a sermon in the Abbey Grounds, followed by a procession.
The Catholic National Pilgrimage begins at the Slipper Chapel in the village of Houghton St Giles, then proceeds along the scenic "Holy Mile" to the Catholic church in Little Walsingham.
Quick Facts on Shrine of Our Lady of Walsingham
|Names:||Shrine of Our Lady of Walsingham|
|Dedication:||Virgin Mary (of Walsingham)|
|Visitor and Contact Information|
|Coordinates:||52.893710° N, 0.875355° E|
|Lodging:||View hotels near Shrine of Our Lady of Walsingham|
- Walsingham.org.uk - official website of the Shrine of Walsingham
- Ian Ousby, Blue Guide England, 11th ed. (1995), 334.
- The Spiritual Traveler: England, Scotland, Wales, 116-17.
- Kevin J. Wright, Catholic Shrines of Western Europe, 31-33.
- Photos of Shrine of Our Lady of Walsingham - here on Sacred Destinations
Map of Shrine of Our Lady of Walsingham
Below is a location map and aerial view of Shrine of Our Lady of Walsingham. Using the buttons on the left (or the wheel on your mouse), you can zoom in for a closer look, or zoom out to get your bearings. To move around, click and drag the map with your mouse. |
Chen M, Bruno E, Santos EE, Sarma DP (2007). A brief review of the “vulgaris” lesions of the skin. The Internet J Dermatol 6(1). Indexed by Google Scholar.
The Internet Journal of Dermatology Volume 6 Number 1
A brief review of the “vulgaris” lesions of the skin
M Chen, E Bruno, E Santos, D Sarma
M Chen, E Bruno, E Santos, D Sarma. A brief review of the “vulgaris” lesions of the skin. The Internet Journal of Dermatology. 2006 Volume 6 Number 1.
Medical students and the trainees in dermatology and pathology have a curiosity about the names, such as, acne vulgaris or verruca vulgaris. The word “vulgaris” sounds like vulgar, commonly meaning crudely indecent, coarse, or obscene.
However, the word “vulgar” is derived from the Latin word “vulgaris”, meaning “of or belonging to the common people”. In medical terminology, the word “vulgaris” means common or ordinary.
A search through the indexes in Dermatology and Pathology text books revealed seven dermatologic conditions with “vulgaris” in their names. These included very common diseases, such as, acne vulgaris and verruca vulgaris as well as now rarely diagnosed disease, such as, lupus vulgaris. We are briefly reviewing the seven “vulgaris” diseases of the skin.
The term acne originates from the Greek word acne, which Aëtius Amidenus used to describe a skin eruption. The most common form of acne is “acne vulgaris”, meaning “common acne”. Acne vulgaris is an inflammatory disease of the skin, affecting a large percentage of people, especially during puberty. The typical acne lesions can be categorized into comedones, papules, pustules, nodule and inflammatory cysts.
The mechanism of acne formation involves the excessive secretion of oils from the sebaceous glands due to hormone over-production as well as the shedding of dead skin cells. This likely obstructs the pores of hair follicle providing an ideal environment for microorganism growth, which initiates an inflammatory response. This leads to the formation of a visible lesion . The remaining unsightly scars after acne resolution may have a significant psychosocial impact on the affected adolescent; early and aggressive treatment is therefore advocated.
Microscopically, acute folliculitis and peri-follicular neutrophil accumulation (pus) are evident. During the resolving stage, the hair follicle is completely destroyed and inflammatory cells are replaced by fibrous tissue leading to scar formation.
Verruca vulgaris, commonly known as a wart, is one of the most recognizable skin growths. Common warts can occur at any age but generally occur during childhood and adolescence. Frequently, warts occur on the fingers and hands; however, warts may grow on any epidermal surface. The causative agent of verruca vulgaris is human papilloma virus (HPV), which is also responsible for genital warts, cervical dysplasia, and cervical cancer . When HPV invades the skin, it incorporates into the human genome and interferes with the cell cycle, leading to unregulated cell growth and wart formation. HPV typically invades individuals with limited immunity. Children generally have less immunity to HPV than adults, and are more commonly infected. To date, no single treatment is perfect for verruca vulgaris. The treatment of choice depends on both the location and the size of the lesion. Genital warts require special consideration due to the precancerous risk.
Microscopically, the appearance of verruca vulgaris is quite eye-catching. The lesion has a centrally raised spiky undulation due to the upward proliferation of epidermis and subepidermal papillae and usually shows marked hyperkeratosis. The rete ridges at the edge of the lesion converge toward a central point. In the acute phase, keratinocytes undergo noticeable viral change (koilocytosis), which tends to be less obvious during the relapsing phase.
The term lupus, Latin for wolf, implies the rapacity and virulence of this disease. It has been used since the late thirteenth century to describe ulcerative skin disease. However, it was not until the mid-nineteenth century that two specific skin diseases were separated as lupus erythematosus and lupus vulgaris.
Lupus vulgaris is a progressive form of cutaneous tuberculosis . It is twice as common in women as in men, and occurs in patients with immunity produced by previous tuberculosis exposure. The pathogen may reach the skin by two mechanisms: 1) exogenous inoculation, via the blood or lymph, spreading from other tuberculous internal organs, or 2) by direct extension from underlying infected glands or joints. The disease often affects the face around nose and ears, and ultimately leads to skin disfigurement due to the ulcerative destruction. The characteristic lesion has a nodular appearance with a reddish-brown plaque, and shows an “apple-jelly” color when pressed with a glass spatula (diascopy).
The histopathologic features of this disease are rather nonspecific. Besides the skin ulceration, tuberculoid granulomas in the deep dermis may be suggestive of the diagnosis. Special stain and tissue culture for acid-fast bacilli are confirmative but often yield a negative result.
The key for diagnosis of lupus vulgaris is the awareness of tuberculous etiology in any chronic ulcers. If the patient has clear evidence of tuberculosis, standard antitubercular treatment should be started to ensure a favorable prognosis.
Ichthyosis vulgaris refers to a group of cutaneous disorders of keratinization. The term ichthyosis is derived from the ancient Greek root ichthys, meaning fish, and describes the resemblance of the affected skin to the fish scales. Ichthyosis vulgaris can be further classified into hereditary and acquired forms.
Hereditary ichthyosis vulgaris is an autosomal dominant genetic disorder first evident in early childhood. It is the most common form of ichthyosis, accounting for more than 95% of cases. It is caused by altered profilaggrin expression leading to scaling and desquamation . Visible scales are retained for long periods and are sloughed off in clumps. On the other hand, acquired ichthyosis is a nonhereditary condition associated with internal disease, and usually appears for the first time in adulthood. Acquired ichthyosis is rare and must be viewed as a marker of systemic disease, including malignancies.
Ichthyosis vulgaris is classified as a retention hyperkeratosis. The histological appearance of both hereditary and acquired ichthyosis is practically identical. The characteristic finding is a moderate degree of hyperkeratosis with a thin or absent granular layer. The hyperkeratosis often extends into the hair follicles, resulting in large keratotic follicular plugs. The dermis is usually normal.
Pemphigus vulgaris is an autoimmune skin disorder characterized by blistering of the skin and mucous membrane. Pemphigus is derived from the Greek word pemphix meaning bubble or blister. This condition develops primarily in middle-aged or older individuals, and is a potentially life-threatening disease. Before corticosteroids became available, the mortality of this disease was high because of fluid loss and superinfection.
Blisters in pemphigus vulgaris are associated with the binding of IgG autoantibodies to keratinocyte surface molecules such as desmoglein 1 and desmoglein 3 . The binding of autoantibodies results acantholysis, the loss of cell-cell adhesion. The antibody is capable of causing blistering without complement or inflammatory cells.
The earliest recognizable histopathologic change is either eosinophilic spongiosis or spongiosis of the lower epidermis. The subsequent acantholysis first leads to the formation of clefts, and then to predominantly suprabasal blisters. There is little inflammation in the early phase of blister formation. If, however, eosinophilic spongiosis is apparent, numerous eosinophils may infiltrate into the dermis. As the lesion ages, several changes ensue, including inflammatory cell reaction, blister erosion or ulceration, and keratinocyte proliferation.
Direct immunofluorescence (DIF) is a very sensitive and specific diagnostic test for pemphigus vulgaris. IgG is demonstrated in the squamous intercellular substance with a lacelike appearance in 80% to 95% of the cases. The positivity remains many years after the disease has regressed . Negative DIF findings when the patient is in remission may be a good prognostic indicator.
Psoriasis vulgaris is a common chronic inflammation skin disorder that affects approximately 1.5% to 2% of the population. The term psoriasis is derived from the Greek word psora that means itch. Psoriasis vulgaris is also referred to plaque psoriasis because of the characteristic plaque formation on the skin. The well-defined patches of red raised skin, usually involves the knees, elbows, scalp, trunk and nails. The flaky silvery white buildup composed of dead skin cells on top of the plaques is called scale. Affected skin is generally very dry, with possible superimposed symptoms of aching, itching, and cracking.
The pathogenesis of psoriasis is not fully understood. There are two main hypotheses regarding development of the disease. The first considers psoriasis primarily as a disorder of excessive growth and reproduction of skin cells. The second hypothesis believes that psoriasis is an immune- mediated disorder. It is thought that T cells become active, migrate to the dermis and trigger the release of certain cytokines especially tumor necrosis factor-alpha (TNF?), which causes inflammation and the rapid production of skin cells . However, it is not known what initiates the activation of the T cells.
The histologic appearance varies considerably with the stage and severity of the disease. At the early stage, there are non- specific signs such as capillary dilation and edema in the papillary dermis with pericapillary lymphocyte infiltration. The diagnostic feature in this stage is the so-called Munro microabscesses, the infiltration of neutrophils into the area of parakeratosis. If there is excessive exocytosis of neutrophils, they may aggregate to form small spongioform pustules of Kogoj. The fully developed lesions are characterized by acanthosis with rete ridge elongation, thinning of the suprapapillary epidermis with small spongiform pustules, pallor of the upper epidermis, diminished granular layer, confluent parakeratosis, presence of Munro microabscesses, dermal papillary edema, and dilated capillaries. Of all these listed features, only the spongiform pustules of Kogoj and Munro microabscesses are truly diagnostic.
Vitiligo vulgaris is a skin condition characterized by patches of skin losing their pigmentation, due to the destruction of the pigment producing melanocytes. This disease affects an estimated 1% of the world’s population, and has a strong familial association. Half the patients first recognize vitiligo before 20 years of age, when it often appears in an area of minor injury or sunburn.
The central process in vitiligo is the destruction of melanocytes at the dermo-epidermal junction. Fully blossomed lesions are totally devoid of melanocytes. Rarely, a superficial perivascular lichenoid mononuclear infiltration may be observed at the border of the depigmented areas. The exact cause of vitiligo is unknown. Though autoimmune mechanisms with an underlying genetic predisposition are the most likely the cause. Antibodies to the melanocytes have been detected by immunoprecipitation in the sera of the patients with vitiligo. Also, sera from patients with vitiligo causes damage to melanocytes in cell culture, suggesting that the antibodies present in sera of affected patients are involved in the pathogenesis of vitiligo .
The diagnosis is usually straightforward, and requires no special testing. While vitiligo is a purely cosmetic concern, it is disfiguring and may be psychologically traumatic.
Deba P Sarma, MD Department of Pathology Creighton University Medical Center Omaha, NE 68131 Tel: 402-449-4951 [email protected]
- Thiboutot D, Gilliland K, Light J, Lookingbill D: Androgen metabolism in sebaceous glands from subjects with and without acne. Arch Dermatol 1999; 135:1041.
- Carr J, Gyorfi T: Human papillomavirus. Epidemiology, transmission, and pathogenesis. Clin Lab Med 2000; 20:235-55.
- Lipsker D, Grosshans E: What is lupus vulgaris in 2005? Dermatol 2005; 211:189.
- Segre JA: Epidermal differentiation complex yields a secret: mutations in the cornification protein filaggrin underlie ichthyosis. J Invest Dermatol 2006; 126:1202.
- Cozzani E, Dal Bello MG, Mastrogiacomo A, Drosera M, Parodi A: Antidesmoplakin antibodies in pemphigus vulgaris. Br J Dermatol 2006; 154:624.
- Judd KP, Lever WF. Correlation of antibodies in skin and serum with disease severity in pemphigus. Arch Dermatol 1979; 115:428.
- Griffiths CE, Iaccarino L, Naldi L, Olivieri I, Pipitome N, Salvarani C, Doria A: Psoriasis and psoriatic arthritis: immunological aspects and therapeutic guidelines. Clin Exp Rheumatol 2006; 24 (1 Suppl 40):S72.
- Norris DA, Kissinger RM, Naughton GM, Bystryn JC: Evidence for immunologic mechanisms in human vitiligo: patients’ sera induce damage to human melanocytes in vitro by complement-mediated damage and antibody-depedent cellular cytotoxicity. J Invest Dermatol 1988; 90:783.
Mingkui Chen, M.D., Ph.D., Department of Pathology, Creighton University Medical School
Erin Bruno, B.S., Department of Pathology, Creighton University Medical School
Eric E. Santos, M.D.,Department of Pathology, Creighton University Medical School
Deba P. Sarma, M.D.,Department of Pathology, Creighton University Medical School |
Origin Alternative name(s) Cornish pasty, pastie, British pasty, oggie, oggy, teddy oggie, tiddy oggin, etc. Place of origin United Kingdom Region or state Unknown, possibly Cornwall or Devon Dish details Course served Main Serving temperature Hot or cold Main ingredient(s) A pastry case with variable fillings, usually beef and vegetables
A pasty ( //; Cornish: Hogen; Pasti), sometimes known as a pastie or British pasty in the United States, is a filled pastry case, associated in particular with Cornwall in Great Britain. It is made by placing the uncooked filling on a flat pastry circle, and folding it to wrap the filling, crimping the edge at the side or top to form a seal. The result is a raised semicircular package.
The traditional Cornish pasty, which has Protected Geographical Indication (PGI) status in Europe, is filled with beef, sliced or diced potato, swede (also known as a yellow turnip or rutabaga) and onion, seasoned with salt and pepper, and is baked. Today, the pasty is the food most associated with Cornwall regarded as its national dish, and accounts for 6% of the Cornish food economy. Pasties with many different fillings are made; some shops specialise in selling all sorts of pasties.
The origins of the pasty are unclear, though there are many references to them throughout historical documents and fiction. The pasty is now popular world wide due to the spread of Cornish miners, and variations can be found in Australia, the United States, Mexico and southwest Devon.
Despite the modern pasty's strong association with Cornwall, its exact origins are unclear. The term "pasty" is an English word for a pie, of venison or other meat, baked without a dish. Pasties have been mentioned in cookbooks throughout the ages; for example the earliest version of Le Viandier has been dated to around 1300 and contains several pasty recipes. In 1393, Le Menagier De Paris contains recipes for pasté with venison, veal, beef, or mutton.
Other early references to pasties include a 13th century charter which was granted by Henry III (1207–1272) to the town of Great Yarmouth. The town is bound to send to the sheriffs of Norwich every year one hundred herrings, baked in twenty four pasties, which the sheriffs are to deliver to the lord of the manor of East Carlton who is then to convey them to the King. Around the same time, 13th century chronicler Matthew Paris wrote of the monks of St Albans Abbey "according to their custom, lived upon pasties of flesh-meat". A total of 5,500 venison pasties were served at the installation feast of George Neville, archbishop of York and chancellor of England in 1465. They were even eaten by royalty, as a letter from a baker to Henry VIII's third wife, Jane Seymour (1508–1537) confirms: "...hope this pasty reaches you in better condition than the last one..." In his diaries written in the mid 17th century, Samuel Pepys makes several references to his consumption of pasties, for instance "dined at Sir W. Pen’s ... on a damned venison pasty, that stunk like a devil.", but after this period the use of the word outside Cornwall declined.
In contrast to its earlier place amongst the wealthy, during the 17th and 18th centuries the pasty became popular with working people in Cornwall, where tin miners and others adopted it due to its unique shape, forming a complete meal that could be carried easily and eaten without cutlery. In a mine the pasty's dense, folded pastry could stay warm for several hours, and if it did get cold it could easily be warmed on a shovel over a candle.
Side-crimped pasties gave rise to the suggestion that the miner might have eaten the pasty holding the thick edge of pastry, which was later discarded, thereby ensuring that his dirty fingers (possibly including traces of arsenic) did not touch food or his mouth. However many old photographs show that pasties were wrapped in bags made of paper or muslin and were eaten from end-to-end; according to the earliest Cornish recipe book, published in 1929, this is "the true Cornish way" to eat a pasty. Another theory suggests that pasties were marked at one end with an initial and then eaten from the other end so that if not finished in one go, they could easily be reclaimed by their owners.
In 2006, a researcher in Devon discovered a recipe for a pasty tucked inside an audit book and dated 1510, calculating the cost of the ingredients. This replaced the previous oldest recipe, dated 1746, held by the Cornwall Records Office in Truro, Cornwall. The dish at the time was cooked with venison, in this case from the Mount Edgcumbe estate, as the pasty was then considered a luxury meal. Alongside the ledger, which included the price of the pasty in Plymouth, Devon in 1509, the discovery sparked a controversy between the neighbouring counties of Devon and Cornwall as to the origin of the dish. However, the term pasty appears in much earlier written records from other parts of the country, as mentioned above.
The pasty is regarded as the national dish of Cornwall. Following a nine year campaign by the Cornish Pasty Association, the trade organisation of about 50 pasty makers based in Cornwall, the name "Cornish Pasty" was awarded Protected Geographical Indication (PGI) status by the European Commission on 20 July 2011. According to the PGI status a Cornish Pasty should be shaped like a ‘D’ and crimped on one side, not on the top. Its ingredients should include uncooked beef, swede (called turnip in Cornwall), potato and onion, with a light seasoning of salt and pepper, keeping a chunky texture. The pastry should be golden and retain its shape when cooked and cooled. The PGI status also means that Cornish Pasties must be prepared in Cornwall. They do not have to be baked in Cornwall, nor do the ingredients have to come from the county, though the Cornish Pasty Association noted that there are strong links between pasty production and local suppliers of the ingredients. Packaging for pasties which conform to the requirements will be stamped with an authentication logo.
Producers outside Cornwall have objected to the PGI award, with one saying "[EU bureaucrats could] go to hell", and another that it was "protectionism for some big pasty companies to churn out a pastiche of the real iconic product". Major UK supermarkets Asda and Morrisons both stated they would be affected by the change, as did nationwide bakery chain Greggs, though Greggs is one of seven companies allowed to continue to use the name "Cornish Pasty" during a three-year transitional period.
Members of the Cornish Pasty Association (CPA) made about 87 million pasties in 2008, amounting to sales of £60 million (about 6% of the food economy of Cornwall). Over 1,800 permanent staff are employed by members of the CPA and some 13,000 other jobs benefit from the trade. Recent surveys by the South West tourism board show that one of the top three reasons people visit Cornwall is the food and that the Cornish pasty is the food most associated with Cornwall.
Recipes and ingredients
The recipe for a Cornish pasty, as defined by its protected status, includes diced or minced beef, onion, potato and swede in rough chunks along with some "light peppery" seasoning. The cut of beef used is generally skirt steak. Due to a local colloquialism, swede can be referred to and advertised as turnip whilst in a pasty, but only swede may appear in a pasty. Pasty ingredients are usually seasoned with salt and pepper, depending on individual taste. The use of carrot in a traditional Cornish pasty is regarded as a "no-no", though it does appear regularly in recipes.
The type of pastry used is not defined, as long as it is golden in colour and will not crack during the cooking or cooling, although modern pasties almost always use a short crust pastry. There is a humorous belief that the pastry on a good pasty should be strong enough to withstand a drop down a mine shaft, and indeed the barley flour that was usually used does make hard dense pastry.
Although the official pasty has a specific ingredients list, old Cornish cookery books show that pasties were generally made from whatever food was available. Indeed, the earliest recorded pasty recipes include venison, not beef. "Pasty" has always been a generic name for the shape and can contain a variety of fillings, including stilton, vegetarian and even chicken tikka. Pork and apple pasties are readily available in shops throughout Cornwall and Devon, with the ingredients including an apple flavoured sauce, mixed together throughout the pasty, as well as sweet pasties with ingredients such as apple and fig or chocolate and banana, which are common in some areas of Cornwall.
A part-savoury, part-sweet pasty (similar to the Bedfordshire clanger) was eaten by miners in the 19th century, in the copper mines on Parys Mountain, Anglesey. The technician who did the research and discovered the recipe claimed that the recipe was probably taken to Anglesey by Cornish miners travelling to the area looking for work. No two-course pasties are commercially produced in Cornwall today, but are usually the product of amateur cooks.
A pasty is known as a "tiddy oggy" when steak is replaced with an extra potato, "tiddy" meaning potato and "oggy" meaning pasty.
Whilst the PGI rules state that a Cornish pasty must be a "D" shape, with crimping along the curve (i.e., side-crimped), crimping is variable within Cornwall, with some advocating a side crimp while others maintain that a top crimp is more authentic.
Some sources state that the difference between a Devon and Cornish pasty is that a Devon pasty has a top-crimp and is oval in shape, whereas the Cornish pasty is semicircular and side-crimped along the curve. However, pasties with a top crimp have been made in Cornwall for generations, yet those Cornish bakers who favour this method now find that they cannot legally call their pasties "Cornish".
In other regions
Migrating Cornish miners (colloquially known as Cousin Jacks in the US) helped to spread pasties into the rest of the world during the 19th century. As tin mining in Cornwall began to fail, miners brought their expertise and traditions to new mining regions around the world. As a result, pasties can be found in many regions, including:
- Many parts of Australia, including the Yorke Peninsula, the site of an annual pasty festival since 1973, which claims to be the world's largest. A clarification of the Protected Geographical Status ruling has confirmed that pasties made in Australia are still allowed to be called "Cornish Pasties".
- The Upper Peninsula of Michigan. In some areas, pasties are a significant tourist attraction, including an annual Pasty Fest in Calumet, Michigan in early July. Pasties in the Upper Peninsula of Michigan have a particularly unusual history, as a small influx of Finnish immigrants followed the Cornish miners in 1864. These Finns (and many other ethnic groups) adopted the pasty for use in the Copper Country copper mines. About 30 years later, a much larger flood of Finnish immigrants found their countrymen baking pasties. The pasty has become strongly associated with Finnish culture in this area, and in the culturally similar Iron Range in northern Minnesota.
- Mineral Point, Wisconsin was the site of the first mineral rush in the USA during the 1830s. After lead was discovered in Mineral Point many of the early miners migrated to this south-western Wisconsin area from Cornwall. Those Cornish miners brought their skills working in the deep underground tin mines of Cornwall. They also brought their recipe and appetite for the pasty. A similar local history about the arrival of the pasty in the area with an influx of Welsh and Cornish miners, and its preservation as a local delicacy, is found in Butte, Montana.
- The Anthracite regions of northeastern Pennsylvania including the cities of Wilkes-Barre, Scranton, and Hazleton had an influx of miners to the area in the 1800's and with them brought the pasty. To this day pastys are still a local favourite.
- The Mexican state of Hidalgo, and the twin silver mining cities of Pachuca and Real del Monte (Mineral del Monte), have notable Cornish influences from the Cornish miners who settled there with pasties being considered typical local cuisine. In Mexican Spanish, they are referred to as pastes.
- They are also popular in South Africa and New Zealand.
Pasties have been mentioned in multiple literary works since the 12th century Arthurian romance Erec and Enide, written by Chrétien de Troyes, in which they are eaten by characters from the area now known as Cornwall. There is a mention in Havelok the Dane, another romance written at the end of the thirteenth century; in the 14th century Robin Hood tales; in Chaucer's The Canterbury Tales; and in three plays by William Shakespeare.
Pasties appear in many novels, used to draw parallels or represent Cornwall. In American Gods by Neil Gaiman, main character Shadow discovers pasties at Mabel's restaurant in the fictional town of Lakeside. The food is mentioned as being popularized in America by Cornishmen, as a parallel to how gods are "brought over" to America in the rest of the story. Another literature reference takes place in The Cat Who... series by Lilian Jackson Braun. Pasties are referred to as a cultural part of the north country, and Jim Qwilleran often eats at The Nasty Pasty, a popular restaurant in fictional Moose County, famous for its tradition of being a mining settlement. Reference to pasties is made in Brian Jacques' popular Redwall series of novels, where it is a staple favourite on the menu to the mice and hares of Redwall Abbey. Pasties also appear in the Poldark series of historical novels of Cornwall, by Winston Graham, as well as the BBC television series adapted from these works.
Superstitions, rhymes and chants
In the tin mines of Devon and Cornwall, pasties were associated with "knockers", spirits said to create a knocking sound that was either supposed to indicate the location of rich veins of ore, or to warn of an impending tunnel collapse. To encourage the good will of the knockers, miners would leave a small part of the pasty within the mine for them to eat. Sailors and fisherman would likewise discard a crust to appease the spirits of dead mariners, though fishermen believed that it was bad luck to take a pasty aboard ship.
A Cornish proverb, recounted in 1861, emphasised the great variety of ingredients that were used in pasties by saying that the devil would not come into Cornwall for fear of ending up as a filling in one. A West Country schoolboy playground-rhyme current in the 1940s concerning the pasty went:
In 1959 the English singer-songwriter Cyril Tawney wrote a nostalgic song called "The Oggie Man". The song tells of the pasty-seller with his characteristic vendor's call who was always outside Plymouth's Devonport Naval Dockyard gates late at night when the sailors were returning, and his replacement by hot dog sellers after World War II.
The word "oggy" in the internationally popular chant "Oggy Oggy Oggy, Oi Oi Oi" is thought to stem from Cornish dialect "hoggan", deriving from "hogen" the Cornish word for pasty. When the pasties were ready for eating, the bal maidens at the mines would supposedly shout down the shaft "Oggy Oggy Oggy" and the miners would reply "Oi Oi Oi".
As the national dish of Cornwall, several oversized versions of the pasty have been created in the county. For example, a giant pasty is paraded from Polruan to Fowey through the streets during regatta week. Similarly, a giant pasty is paraded around the ground of the Cornish Pirates rugby team on St Piran's Day before it is passed over the goal posts.
The world's largest Cornish pasty was made in August 2010, measuring 4.6 metres (15 ft) and weighing 860 kilograms (1,900 lb). It was created by "Proper Cornish" bakers, using 165 kilograms (360 lb) of beef, 180 pounds (82 kg) of swede, 100 pounds (45 kg) of potatoes and 75 pounds (34 kg) of onions. The pasty was estimated to cost £7,000 and contain 1.75 million calories.
- Bridie - Scottish equivalent
- Empanada - similar dish from Iberia and Latin America
- Fleischkuekle - German-Russian meat pie made with flatbread
- Paste - Mexican dish based on Pasty
- ^ Wilson, Kenneth G. (1993). The Columbia guide to standard American English. Columbia University Press. p. 321. ISBN 0231069898. http://books.google.com/books?id=L2ChiO2yEZ0C&pg=PA321.
- ^ a b "Commission Implementing Regulation (EU) No 717/2011 of 20 July 2011 entering a name in the register of protected designations of origin and protected geographical indications (Cornish Pasty (PGI))". Official Journal of the European Union 54 (L 193): 13–14. 23 July 2011. ISSN 1725-2555. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2011:193:FULL:EN:PDF. Retrieved 2011-09-01.
- ^ Scully, Terence; Taillevent (1988). The viandier of Taillevent: an edition of all extant manuscripts. Pasty mentions: University of Ottawa Press. p. 361. ISBN 0776601741, 9780776601748. http://books.google.co.uk/books?id=-a8P7LvJEvUC&.
- ^ The Goodman of Paris. c1393. http://franiccolo.home.mindspring.com/olde_eng_fest_recipes.html.
- ^ Nuttall, P Austin (1840). A classical and archæological dictionary of the manners, customs, laws, institutions, arts, etc. of the celebrated nations of antiquity, and of the middle ages. London. p. 555. http://www.google.co.uk/books?id=V-gDAAAAQAAJ&pg=PA555&dq=Yarmouth+pasties&as_brr=1.
- ^ Brayley, Edward Wedlake (1808). The Beauties of England and Wales, Or Delineations, Topographical, Historical and Descriptive. VII (Hertford, Huntingdon and Kent). London: Thomas Maiden. p. 40. http://www.google.co.uk/books?id=nd0uAAAAMAAJ&pg=PA40&dq=st+alban%27s+abbey+pasties&as_brr=1.
- ^ Encyclopaedia Britannica 1823 vol VIII. Printed for Archibald Constable and Company. 1823. p. 585. http://www.google.co.uk/books?id=JMknAAAAMAAJ&pg=PA585&dq=Matthew+Paris+pasty#PPA585,M1.
- ^ Shackle, Eric (21 April 2001). "A short history of ... Cornish pasties | Life and style | The Observer". London: Guardian. http://www.guardian.co.uk/lifeandstyle/2001/apr/21/foodanddrink.features31. Retrieved 14 August 2009.
- ^ "Thursday 1 August 1667". The Diary of Samuel Pepys. Phil Gyford. http://www.pepysdiary.com/archive/1667/08/01/. Retrieved 1 September 2011.
- ^ Laura Mason and Catherine Brown (2007). From Bath Chaps to Bara Brith: The Taste of South West Britain. Harper Press. pp. 32–33. ISBN 978-0-7524-4742-1.
- ^ Harris, J Henry (2009). Cornish Saints & Sinners. Wildside Press LLC. p. 195. http://books.google.com/books?id=ZRDxG44Thg4C&pg=PA195.
- ^ Devlin, Kate (25 July 2008). "The History of the Cornish Pasty". The Daily Telegraph. http://www.telegraph.co.uk/news/uknews/2460056/The-history-of-the-Cornish-pasty.html. Retrieved 2 March 2011.
- ^ a b c Grigson, Jane (1993) English Food. Penguin Books, p. 226
- ^ a b c d Miller, Luke; Westergren, Marc. "History of the Pasty". The Cultural Context of the Pasty". Michigan Technological University. http://www.hu.mtu.edu/vup/pasty/history.htm. Retrieved 13 March 2006.
- ^ a b c d e f "Cornish Pasty (PGI)". DEFRA. http://archive.defra.gov.uk/foodfarm/food/industry/regional/foodname/products/documents/cornish-pasty-pgi.pdf. Retrieved 2 March 2011.
- ^ Mansfield, Emma (2011). The Little Book of the Pasty. Cornwall: Lovely Little Books. p. 101. ISBN 978-1-906771-28-7.
- ^ Martin, Edith (1929). Cornish Recipes: Ancient and Modern. Truro: A. W. Jordan.
- ^ "A pasty in Plymouth's Old Audit Book". Volume number 1/130, from the Borough of Plymouth records, dated 1510. Plymouth City Council. http://www.plymouth.gov.uk/homepage/creativityandculture/archives/ourservices/archivesinfocus.htm. Retrieved 2 April 2011.
- ^ a b c d "Who invented the Cornish pasty?". London: Independent.co.uk. 13 November 2006. http://www.independent.co.uk/life-style/food-and-drink/features/who-invented-the-cornish-pasty-424094.html. Retrieved 21 September 2009.
- ^ a b c Trewin, Carol; Woolfitt, Adam (2005). Gourmet Cornwall. Alison Hodge Publishers. pp. 125–129. ISBN 0906720397. http://books.google.com/books?id=swU53UBC1LEC&pg=PA127.
- ^ "UK | England | Cornwall | Devon invented the Cornish pasty". BBC News. 13 November 2006. http://news.bbc.co.uk/2/hi/uk_news/england/cornwall/6144460.stm. Retrieved 14 August 2009.
- ^ "West Devon Record Office". Archived from the original on 2007-09-27. http://web.archive.org/web/20070927002247/http://www.a2a.org.uk/search/records.asp?cat=028-1_1&cid=6-2. Retrieved 23 December 2005.
- ^ Robert A. Georges and Michael Owen Jones, Folkloristics: an introduction, Indiana University Press, 1995, pp. 127-128
- ^ J. W. Lambert, Cornwall, Penguin Books, 1945, p. 38
- ^ The West Briton, Commercial pasty companies are failing our Cornish national dish, 23 September 2010
- ^ Poirier, Agnès (23 February 2011). "Putting the Cornish back into pasties". The Guardian. http://www.guardian.co.uk/commentisfree/2011/feb/23/cornish-pasties-eu-cornwall. Retrieved 2 March 2011.
- ^ a b Beckford, Martin. "Turnip or swede? Brussels rules on ingredients of Cornish pasty". The Daily Telegraph. http://www.telegraph.co.uk/foodanddrink/foodanddrinknews/7954303/Turnip-or-swede-Brussels-rules-on-ingredients-of-Cornish-pasty.html. Retrieved 2 March 2011.
- ^ "COUNCIL REGULATION (EC) No 510/2006 ‘CORNISH PASTY’ EC No: UK-PGI-005-0727-11.11.2008" (PDF). Official Journal of the European Union. 11 November 2008. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:190:0033:0036:EN:PDF. Retrieved 22 February 2010. "Assembly of the pasties in preparation for baking must take place in the designated area. The actual baking does not have to be done within the geographical area, it is possible to send the finished but unbaked and/or frozen pasties to bakers or other outlets outside the area where they can be baked in ovens for consumption."
- ^ "The Cornish Pasty Association's application for PGI". Cornishpastyassociation.co.uk. http://www.cornishpastyassociation.co.uk/pgi_2.html. Retrieved 14 August 2009.
- ^ a b c Wallop, Harry. "Cornish pasty given EU protected status". The Daily Telegraph. http://www.telegraph.co.uk/foodanddrink/8340861/Cornish-pasty-given-EU-protected-status.html. Retrieved 2 March 2011.
- ^ a b Salkeld, Luke (23 February 2011). "No more half-baked imitations: Cornish pasties must be made in Cornwall as they join EU protected list". Daily Mail. http://www.dailymail.co.uk/news/article-1359511/Cornish-pasties-Cornwall-join-EU-protected-list.html. Retrieved 18 March 2011.
- ^ Savill, Richard (25 July 2008). "Cornish pasty in European battle for protected status". The Daily Telegraph. http://www.telegraph.co.uk/news/uknews/2460187/Cornish-pasty-in-European-battle-for-protected-status.html. Retrieved 4 March 2011.
- ^ "About the Cornish Pasty Association". Cornish Pasty Association. http://www.cornishpastyassociation.co.uk/about.html. Retrieved 2011-09-03.
- ^ a b Clarke, Felicity (23 February 2011). "Ultimate Cornish Pasty Recipe". The Guardian. http://www.guardian.co.uk/lifeandstyle/2011/feb/23/ultimate-cornish-pasty-recipe. Retrieved 4 March 2011.
- ^ a b c d Ann Pringle Harris (7 February 1988). "Fare of the Country; In Cornwall, a Meal in a Crust". New York Times. http://www.nytimes.com/1988/02/07/travel/fare-of-the-country-in-cornwall-a-meal-in-a-crust.html?scp=1&sq=annie%20pringle%20harris%20cornwall&st=cse&pagewanted=1/. Retrieved 15 March 2005.
- ^ a b c Hall, Stephen (2001). The Cornish Pasty. Nettlecombe, Uk: Agre Books. ISBN 0953800040.
- ^ Pascoe, Ann (1988). Cornish Recipes Old and New. Penryn: Tor Mark Press. p. 1. ISBN 0-85025-304-7.
- ^ "UK | Wales | North West Wales | Sweet-savoury pastie back on menu". BBC News. 26 March 2006. http://news.bbc.co.uk/2/hi/uk_news/wales/north_west/4841110.stm. Retrieved 21 September 2009.
- ^ a b Merrick, Hettie (1995). The Pasty Book. Penryn: Tor Mark Press.
- ^ Bareham, Lindsey (21 November 2008). "The perfect pasty?". The Times. http://www.timesonline.co.uk/tol/life_and_style/food_and_drink/recipes/article5200976.ece. Retrieved 11 March 2011.
- ^ "Cornish Pasty". Here and Now Magazine. http://www.hereandnowmagazine.com/food-and-drink/cornish-classic-recipes/feature/114. Retrieved 2 April 2011.
- ^ "This is where the great pasty revolt begins". The Independent. 27 February 2011. http://www.independent.co.uk/life-style/food-and-drink/news/this-is-where-the-great-pasty-revolt-begins-2226777.html. Retrieved 2 April 2011.
- ^ Pearlman, Jonathan (4 March 2011). "Australian Cornish pasty region concerned about protected ruling". The Daily Telegraph. http://www.telegraph.co.uk/foodanddrink/foodanddrinknews/8361654/Australian-Cornish-pasty-region-concerned-about-protected-ruling.html. Retrieved 11 March 2011.
- ^ Shortridge, Barbara (1998). The taste of American place. Rowman & Littlefield. pp. 21–36. ISBN 0847685071. http://books.google.com/books?id=DsDW7DHknCQC.
- ^ Mineral Point Chamber of Commerce: A Brief History of Mineral Point, http://www.mineralpoint.com/history/index.html, accessed January 31, 2011
- ^ Johanek, Durrae (2009). Montana Curiosities: Quirky Characters, Roadside Oddities & Other Offbeat Stuff. Globe Pequot. pp. 119–120. ISBN 9780762743025. http://books.google.co.uk/books?id=HEl-E-hV6iYC&pg=PA119&dq=pasty+butte+montana&ct=result#v=onepage&q=pasty%20butte%20montana&f=false.
- ^ "Pastes (Spanish)". Turismo del Gobierno del Estado de Hidalgo. Archived from the original on 2007-08-18. http://web.archive.org/web/20070611213431/http://turismo.hidalgo.gob.mx/index.php?option=content&task=view&id=147. Retrieved 3 May 2008.
- ^ "Havelok the Dane". University of Rochester Robbins Library. http://www.lib.rochester.edu/camelot/teams/danefrm.htm. Retrieved 2011-09-01. (line 645)
- ^ In The Merry Wives of Windsor Act 1 Scene 1, Page says Wife, bid these gentlemen welcome. Come, we have a hot venison pasty to dinner: come gentlemen, I hope we shall drink down all unkindness.
- ^ In All's Well That Ends Well, Act IV Scene III, Parrolles states: I will confess to what I know without constraint: if ye pinch me like a pasty, I can say no more.
- ^ In Titus Andronicus, Titus bakes Chiron and Demetrius's bodies into a pasty, and forces their mother to eat them.
- ^ Froud, Brian (2002). Faeries. Pavilion. ISBN 1862055580. http://books.google.com/books?id=9MgsqlMARBAC&q=pastie+knockers.
- ^ a b National Trust (2007). Gentleman's Relish: And Other Culinary Oddities. Anova Books. pp. 78–9. ISBN 1905400551. http://books.google.com/books?id=cRcQizr0uy8C&pg=PA79.
- ^ Halliwell, James Orchard (1861). Rambles in Western Cornwall by the Footsteps of the Giants. London: John Russell Smith. pp. 40–41. http://books.google.co.uk/books?id=y79CAAAAYAAJ. "In fact so universal are the contents of Cornish pasties, a local proverb states that the devil will not venture into Cornwall, for if the inhabitants caught him, they would be sure to put him into a pie"
- ^ "Tawney in Depth - The background to some of Cyril's classic songs". cyriltawney.co.uk. http://www.cyriltawney.co.uk/depth.htm#oggie. Retrieved 2011-09-06.
- ^ Gibson, Rory (26 October 2010). "Time for Aussies to lose 'bogan' chant?". The Courier-Mail. http://www.news.com.au/travel/news/time-for-aussies-to-throw-bogan-chant-out/story-e6frfq80-1225943556735. Retrieved 11 March 2011.
- ^ Jago, M (26 August 2008). "Regatta beats the odds". This is Cornwall. http://www.thisiscornwall.co.uk/Regatta-beats-odds/story-11374997-detail/story.html. Retrieved 4 March 2011.
- ^ Richards, N (5 March 2010). "Pirates ready for big cup test". This is Cornwall. http://www.thisiscornwall.co.uk/Pirates-ready-big-cup-test/story-11396805-detail/story.html. Retrieved 4 March 2011.
- ^ "Bakers create world's largest Cornish pasty, weighing in at almost a TON". The Daily Mail. 20 August 2010. http://www.dailymail.co.uk/news/article-1304768/Worlds-largest-Cornish-pasty-created-baking-competition-weighing-ton.html. Retrieved 4 March 2011.
- The Cornish Pasty by Stephen Hall, Agre Books, Nettlecombe, UK, 2001 ISBN 0953800040
- The Pasty Book by Hettie Merrick, Tor Mark, Redruth, UK, 1995 ISBN 978-0-85025-347-4
- Pasties by Lindsey Bareham, Mabecron Books, Plymouth, UK, 2008 ISBN 978-0-9532156-6-9
- English Food by Jane Grigson (revised by Sophie Grigson), Penguin Books, London, 1993, ISBN 0-14-027324-7
- The Cornish Pasty Association - the trade association of the Cornish pasty industry
- The Compleat Pastypaedia - a web pasty resource
Culture of Cornwall Symbols Festivals Sports Cuisine Arts MusicFolk songs Language Folklore Organisations British pies Sweet SavouryBacon and egg pie • Bedfordshire clanger • Bridie • Butter pie • Chicken and mushroom pie • Corned beef pie • Cornish pasty • Cottage pie • Cumberland pie • Curry pie • Devizes pie • Fish pie • Game pie • Homity pie • Killie pie • Meat and potato pie • Melton Mowbray pork pie • Pork pie • Scotch pie • Shepherd's Pie • Squab pie • Stargazy pie • Steak pie • Steak and kidney pie • Woolton pie Manufacturers
Wikimedia Foundation. 2010. |
Zentangle Alphabet Coloring Page – Do you wish to learn how to draw Alphabet Coloring Pages? It is easy to do it if you know what kind of book to begin with and what books are accessible online and in your local bookstores.
If you are learning Alphabet Coloring from a book, you can start with the starting page or blank. The starting page is usually an 8 by ten inch page and the blank is usually a full-color image. When you are carried out with your first coloring session, you can go back and redraw the blank with an additional image. There are plenty of blank pages available online as well as in bookstores for you to select from.
When learning Alphabet Coloring Pages from a website, you can discover coloring pages that you can download from the web site for free. You can then print them out and work on them whilst you are utilizing the website.
There are many ways to look for coloring pages online. Some web sites have free coloring pages and some web sites have paid ones that provide a membership for their coloring service or a huge selection of coloring pages to choose from.
There are thousands of web sites providing free coloring pages for you to download. The cost differs depending on how many pages you download and when you need a membership. Many of these websites offer a fantastic selection of coloring pages.
Learning Alphabet Coloring Pages from a CD is another option. You can download a coloring booklet and after that print it out and function on the pages whilst you listen to the CD. This is a extremely easy method to discover ways to draw in a brief amount of time.
If you don’t like one or even more of the techniques over, you might be able to discover some free online coloring pages. You can discover free coloring pages on a great deal of different web sites and ina lot of different places.
Learning Alphabet Coloring Pages can be achieved with out investing a great deal of money. Just maintain your eyes open for the free issues out there. |
Acupuncture is a complementary treatment approach that works for many symptoms and side effects of cancer. In this post, you’ll learn how acupuncture in cancer works and some recommendations regarding the use of this approach.
What is acupuncture in cancer?
Acupuncture involves the practice of placing specific needles into the body at particular points. The needles stay firmly in place for a short period of time. Then after that, the therapist/practitioner removes them from your skin.
In fact, this treatment approach traced back to the traditional East Asian medicine system. To be more exact, it first started in China and became a crucial part of the country’s medical system around 2000 years ago. According to ancient Chinese, the energy named Qi flows through our body and moves along the meridians. Acupuncture changes the direction of this flow to restore energy and maintain our well-being.
Western medical acupuncture, on the other hand, bases on scientific research to deduce a modern interpretation of the method. Usually, the therapist performs acupuncture after a thorough medical diagnosis or alongside conventional medicine such as drugs or radiotherapy.
Acupuncture in cancer – Why people with cancer use it?
Medical studies and research shows that acupuncture in cancer works by stimulating nerves. It releases endorphins, the natural morphine-like substances in the spinal cord and brain. That way, it helps to relieve pain. At the same time, the approach also releases serotonin, a pain reliever to promote a feeling of well-being. Ultimately, the two substances can reduce and alleviate cancer symptoms such as:
- Dry mouth
- Tiredness and weakness
- Hot flushes due to anti-cancer treatments
People say that acupuncture sessions help them feel relaxed and improve their feeling of well-being. At the same time, acupuncture has also been shown to ease the negative effects of radiation and chemotherapy, including::
- Night sweats
- Lack of appetite
- Weight loss
- Diarrhea or constipation
Acupuncture has the added advantage of having virtually no side effects, and of enhancing energy and clear thinking. It also reduces joint pain and stiffness in postmenopausal breast cancer patients who have received aromatase inhibitors.
How to have acupuncture in cancer
The therapist will ask you some general questions about your lifestyle and overall health. This may include your diet, sleeping pattern, and how you’re feeling both emotionally and physically. All you need to do is frankly tell him about any health problems you have and medicines you take. Tell them about the cancer symptoms or treatment side effects you are experiencing. They may need to change the procedure to suit your specific needs.
Discuss how many treatments you will need beforehand as it will be different during the process. At first, your doctor may recommend taking the session once or twice a week. You may need to pay a visit again every few weeks for additional treatment if you have a chronic illness. The improvement shows up in about 3 to 6 sessions if acupuncture helps you.
Treatment usually begins with just a few needles. This may change depending on your reaction and the symptoms you experience. Your doctor will insert fine, disposable, and stainless steel needles into your skin.
The needles should not be painful, but you may experience a tingling sensation. They stay on for 10 to 30 minutes. The practitioner can snap or rotate the needle to stimulate your nerves. Or, they can attach a weak current to the needle once it is in This is called an electric shock.
Sometimes the therapist leaves a special very small needle on the skin. This is for persistent symptom relief. With ear acupuncture (atrioventricular), the practitioner places a needle or small bead (acupressure seed) on the outer part of the ear. It can stay in place for a few days. Your doctor can also instruct you in a specific way to self-acupuncture at home.
Check with your doctor before you start any additional or alternative type of treatment. Make sure your acupuncture therapist is well-informed about your complete medical and medication history.
Side effects of acupuncture in cancer
Acupuncture is generally safe and has very few side effects, provided that it is performed by a professional and qualified practitioner. The most common side effects were bruising and mild bleeding. This happens in 3 out of 100 people (3%).
Some people may experience a temporary increase in pain. Pain relief may follow. Sometimes you will feel dizzy or faint. Fainting occurs in about 1 in 100 treatments (1%). If you lie down for treatment, chances are the side effects won’t show up. |
The U.S. Forest Service is planning to burn approximately 785 acres on the east side of the Pawnee National Grassland this spring. Burning will continue through March until the burn is complete if conditions allow. Burning is anticipated to take one day. Smoke may be visible from Highway 14 and nearby communities.
The area planned for burning is located in the Keota Allotment, approximately 1 mile southwest of Keota, approximately 1.5 miles north of Highway 14.
Burning on the grasslands improves wildlife habitat, particularly for the Mountain Plover, reduces the risk of wildfire, and helps reintroduce fire into the ecosystem. Ignition of the burn will only take place if soil moisture, weather, smoke dispersal and staffing are favorable. Approximately 16 to 22 firefighters are expected to work on the burn, including up to six engines. Crews will continue to monitor the burn area until the fire is completely out.
Prescribed fires on the Pawnee National Grassland will be announced on a recorded information line at 970-498-1030. The public can also call the grassland office weekdays at 970-834-9270 for additional information. Information on this prescribed fire is also available online at https://inciweb.nwcg.gov/incident/5117/. If anyone would like to receive daily email notifications during the burn, please contact Reghan Cloudman at [email protected]. Prescribed fire smoke may affect your health. For more information see https://www.colorado.gov/pacific/cdphe/wood-smoke-and-health. |
|21st Waffen Mountain Division of the SS Skanderbeg (1st Albanian)|
Insignia of 21st Waffen Mountain Division of the SS Skanderbeg (1st Albanian)
|Size||Division (never reached divisional strength)|
|Part of||XXI Mountain Corps|
|Albanian double-headed eagle|
The 21st Waffen Mountain Division of the SS Skanderbeg (1st Albanian) was a German mountain infantry division of the Waffen-SS, the armed wing of the German Nazi Party that served alongside, but was never formally part of, the Wehrmacht during the Second World War. The division was developed around the nucleus of an ethnic Albanian battalion which had briefly seen combat against the Yugoslav Partisans in eastern Bosnia as part of the 13th Waffen Mountain Division of the SS Handschar (1st Croatian). Composed of Muslim Albanians with mostly German and Yugoslav Volksdeutsche (ethnic German) officers and non-commissioned officers, it was given the title Skanderbeg after medieval Albanian lord George Kastrioti Skanderbeg, who defended the region of Albania against the Ottoman Empire for more than two decades in the 15th century.
Skanderbeg never reached divisional strength, being at most a brigade-sized formation of around 6,000 to 6,500 troops. In May 1944, members of the division arrested 281 Jews in Pristina and handed them over to the Germans, who transported them to the Bergen-Belsen concentration camp, where many were killed. The division itself was better known for this action and for murdering, raping, and looting in predominantly Serb areas than for participating in combat operations on behalf of the German war effort. Its only significant military actions took place during a German anti-Partisan offensive in Montenegro in June and July 1944. Following those operations, the unit was deployed as a guard force at the chromium mines in Kosovo, where it was quickly overrun by the Partisans, leading to widespread desertion. Reinforced by German Kriegsmarine personnel and with less than 500 Albanians remaining in its ranks, it was disbanded on 1 November 1944. The remaining members were incorporated into the 7th SS Volunteer Mountain Division Prinz Eugen. After the war, divisional commander SS-Brigadeführer und Generalmajor der Waffen-SS August Schmidhuber was found guilty of war crimes by a court in Belgrade and executed in 1947.
History[edit | edit source]
Background[edit | edit source]
On 7 April 1939, five months prior to the outbreak of the Second World War, the Kingdom of Italy invaded the Albanian Kingdom. The country was overrun in five days, and the Italian King, Victor Emmanuel III, subsequently accepted the crown offered by the Albanian parliament. The Royal Albanian Army was incorporated into the Royal Italian Army and a viceroy was appointed to administer the country as a protectorate. After the Axis invasion of Yugoslavia on 6 April 1941, Italian Albania was expanded to include adjacent parts of the Kingdom of Yugoslavia incorporated mainly from the Yugoslav banovinas (regional subdivisions) of Vardar and Morava. Kosovo was annexed to Albania, and in the beginning, Albanians living there enthusiastically welcomed the Italian occupation. Although officially under Italian rule, the Albanians in Kosovo controlled the region and were encouraged to open Albanian language schools, which had been banned by the Yugoslav government. The Italians also gave the inhabitants Albanian citizenship and allowed them to fly the Albanian flag. Kosovo Albanians then sought retribution against Serbs and Montenegrins settlers in the region for the oppression that Albanians had experienced at the hands of the Serbs during the Balkan Wars, the First World War, and under Yugoslav rule. The Italians subsequently cleared the area of most Serbs and Montenegrins who had settled in Kosovo during the inter-war period. The local Albanians took advantage of their changed circumstances by taking revenge against their Serbian neighbours and burning the homes of as many as 30,000 Serb and Montenegrin settlers.
Albania remained occupied until Italy surrendered to the Allies in 1943. In August of that year, faced with the imminent collapse of the Italian war effort, Nazi Germany deployed the 2nd Panzer Army to the Balkans to take over areas previously occupied by Italy. One of the Italian areas seized by the Germans was Albania, where the XXI Mountain Corps of Generaloberst (General) Lothar Rendulic's 2nd Panzer Army had been deployed. A Wehrmacht plenipotentiary general, and a special representative of Heinrich Himmler, SS-Brigadeführer und Generalmajor der Waffen-SS und Polizei Josef Fitzthum, were both based in the Albanian capital of Tirana. The Germans took control of all Albanian forces that had been collaborating with the Italians prior to their capitulation, including the Balli Kombëtar, an anti-communist and nationalist militia. The Germans strengthened the Albanian army and gendarmerie, but quickly decided those troops were unreliable. That year, a number of Albanians from Kosovo and the Sandžak region were recruited into the 13th Waffen Mountain Division of the SS Handschar (1st Croatian), a Waffen-SS division composed largely of Bosnian Muslims and Croats with mostly German officers. For about six months the division included about 1,000 ethnic Albanians from Kosovo and the Sandžak who made up the 1st Battalion of the 2nd Regiment (I/2), which later became the 1st Battalion of the 28th Regiment (I/28).
The formation of an Albanian Waffen-SS division was Fitzthum's idea, initially opposed by the German Foreign Ministry representative Hermann Neubacher and the head of the SS-Reichssicherheitshauptamt (Reich Main Security Office) SS-Obergruppenführer und General der Polizei (Lieutenant General) Ernst Kaltenbrunner, who influenced Himmler to shelve it. But the Albanian government supported the idea; in the face of increasing difficulties Himmler soon changed his mind, and in February 1944 the idea received Adolf Hitler's approval.
Formation[edit | edit source]
In February 1944, Hitler approved the creation of an Albanian Waffen-SS division that was to serve only inside Kosovo, and was intended to protect ethnic Albania but remain under German control. It was meant to be one of three Muslim Waffen-SS divisions serving in the Balkans, the other two being the 13th Waffen Mountain Division of the SS Handschar (1st Croatian) and the 23rd Waffen Mountain Division of the SS Kama (2nd Croatian). Himmler's goal was to expand Waffen-SS recruiting in the Balkans and form two corps of two divisions each, with one corps to operate in the region of Bosnia in the Independent State of Croatia and the other in Albania. These corps would then be combined with the Volksdeutsche 7th SS Volunteer Mountain Division Prinz Eugen and together would form a Balkan Waffen-SS mountain army of five divisions.
In March 1944, Bedri Pejani, the chairman of the Second League of Prizren, an organization created after the Italian surrender to advance the interests of Kosovo Albanians, proposed to Hitler that a force of 120,000 to 150,000 Kosovo Albanian volunteers be raised to fight the Yugoslav and Albanian Partisans. Pejani asked the German leadership to give the Albanians equipment and supplies to fight the communist insurgency, and requested the expansion of the borders of the German puppet state of Albania at the expense of the German-occupied Territory of the Military Commander in Serbia and the German puppet state of Montenegro. These requests were not fulfilled, but in April 1944 Himmler ordered the establishment of a new Albanian volunteer division, which was subsequently named after the medieval Albanian warrior George Kastrioti Skanderbeg. The SS had initially envisioned a force of 10,000–12,000 men, and Himmler saw the Muslim Albanians as a potential source of manpower in Germany's war against the Yugoslav Partisans, who faced significant difficulties in recruiting Kosovo Albanians to join their ranks. The Germans found that Kosovo Albanians were more cooperative than Albanians in Albania itself, mainly because they feared a return to Yugoslav rule, and many of the division's recruits were Albanians from Kosovo. The quality of most of these recruits was poor, with only 6,000 being considered suitable to receive training. Those that were accepted were a combination of about 1,500 former Royal Yugoslav Army prisoners of war, elements of the failed Albanian army and gendarmerie, volunteers from both pre-war and expanded Albania, and conscripts from families that had more than two sons.
On 17 April 1944, the Albanian battalion of the 13th SS Division was transferred via rail directly from combat in Bosnia to Kosovo to form part of the Skanderbeg division. The head of Waffen-SS recruitment, SS-Obergruppenführer Gottlob Berger, reported to Himmler that the Albanians "... were quite sad about leaving." On 23 May, Fitzthum reported the failure of Albanian units used in operations against the Partisans, and that he had dissolved four Albanian battalions organized by the Wehrmacht. He described most Albanian army and gendarmerie officers as "totally corrupt, unusable, undisciplined and untrainable."
Operations[edit | edit source]
The division was founded as the 21. Waffen-SS Gebirgsdivision der SS Skanderbeg (albanische Nr.1) on 1 May 1944 as part of the XXI Mountain Corps. Most or all of the division's officers, non-commissioned officers (NCOs), and specialists were German, and were mainly provided by the 7th and 13th SS Divisions, which noticeably weakened those formations. The divisional artillery regiment was formed from the 1st Albanian Artillery Regiment. The division was placed under the command of SS-Standartenführer (Colonel) August Schmidhuber, who was promoted to SS-Oberführer (senior colonel) in June. Estimates of the size of the division range from 6,000 to 6,500 men. Members took a religious oath using the Quran, pledging "jihad against unbelievers." The division was originally equipped with captured Italian Carro Armato M15/42 tanks, which proved to be unreliable. Its garrison was located in the town of Prizren.
Early on, it became clear that most of the division's Muslim Albanian members seemed to be interested only in settling scores with their Christian Serb adversaries and numerous atrocities were committed. The Germans had to disarm battalions of the division in the towns of Peć and Prizren and arrest the Albanian officers, with one commanding officer even being sent to prison in Germany. On 14 May 1944, members of the division raided Jewish homes in Pristina and arrested 281 Jews and handed them over to the Germans, who sent them to the Bergen-Belsen concentration camp, where many were killed. In general, units of the division were better known for murdering, raping, and looting, mainly in ethnic Serb areas, and for arresting Jews, than for participating in combat operations on behalf of the German war effort. In addition to indiscriminately killing Serbs and Montenegrins, the division was responsible for the expulsion of up to 10,000 Slavic families from Kosovo as new Albanian settlers arrived from the poor areas of northern Albania. The arrival of these Albanians was encouraged by Italian authorities, and it is estimated that as many as 72,000 Albanians were settled or re-settled in Kosovo during the war.
In June 1944, the division engaged in large-scale field manoeuvres between the towns of Berane and Andrijevica in Montenegro, and participated in Operations Endlich (Finally) and Falkenauge (Hawkeye) in June and July, as well as Draufgänger (Daredevil), during which it was the main force used by the Germans. These operations were focused on the destruction of strong Partisan forces in the Đakovica, Peć and Mokra Gora areas. According to Neubacher, the division was carelessly committed to fighting in the early stages of its training and performed poorly. By the end of August 1944, the Germans had decided that the division was only of use for basic guarding duties. Subsequently, some members were charged with guarding chromium mines near Kosovo before the area was overrun by the Partisans. In the ensuing clashes, one of the division's regiments lost more than 1,000 men and many Albanians deserted, some after Serb Partisan attacks on areas northeast of Gusinje. Army Group E claimed that the performance of the division showed that it had "absolutely no military value."
On 1 September 1944, troops of the division in Tetovo and Gostivar mutinied, killing their German officers and NCOs. By this time, the division numbered fewer than 7,000 men, which was less than one-third of its intended strength. Within two months of its initial deployment, 3,500 men had deserted. Himmler brought in 3,000 to 4,000 Kriegsmarine (German navy) personnel from Greece to make up the numbers, but this had little effect on the division's fighting ability. By the beginning of October 1944, the division's strength had fallen to about 4,900 men, fewer than 1,500 of whom were fit for combat. Schmidhuber held his men in contempt, and he, his superiors, and Fitzthum explained their failure to create an effective security force by denigrating the Albanian culture and military reputation. Later, less-involved members of the Wehrmacht stated that the principal issue regarding the unit's reliability may have been that the Germans did not work closely with the Albanians at the local level. In mid-October, it was engaged in heavy fighting around Đakovica. By this time, desertions had significantly affected the division's strength and its 86 officers and 467 NCOs were left with a force of only 899 men, about half of whom were Albanian. On 24 October, Generaloberst Alexander Löhr, the commander of Army Group E, ordered that all Albanian members of the division be disarmed and released.
On 1 November 1944, the division was disbanded. At the same time, Albanians in Kosovo took up arms against the Partisans when they learned that the region would not be unified with Albania after the war, despite earlier Partisan promises. Atrocities occurred when 30,000 Partisans were sent to Kosovo to quell Albanian resistance in the region. Thousands of Kosovo Albanians were killed in the ensuing violence, with estimates ranging from 3,000 to 25,000. Claims that the number of Albanians killed were as high as 36,000–47,000 have been described by historians such as Noel Malcolm as greatly exaggerated.
Aftermath[edit | edit source]
The remaining German troops and former naval personnel were reorganized as the regimental Kampfgruppe Skanderbeg under the command of SS-Obersturmbannführer Alfred Graaf. The unit withdrew from the Kosovo region in mid-November along with the rest of the German troops in the area. Many Serbs and Montenegrins then took revenge against the region's ethnic Albanians, especially collaborators and those who had been members of the division. When Kampfgruppe Skanderbeg reached Ljubovija on the Drina river, it was placed under the command of the 7th SS Volunteer Mountain Division Prinz Eugen, which was securing the river crossings in that area. Kampfgruppe Skanderbeg held the towns of Zvornik and Drinjača during the first half of December 1944 as part of the Ljubovija bridgehead. It withdrew across the Drina and fought its way northward, towards Brčko on the Sava river, where it relieved the Wehrmacht forces holding the town. In late December the assault gun battery of Kampfgruppe Skanderbeg was committed to the Syrmian Front at Vinkovci, and the remainder of the Kampfgruppe was deployed to Bijeljina.
In January 1945, the handful of naval personnel that survived were transferred to the 32nd SS Volunteer Grenadier Division 30 Januar, and the remnants of the former division were reorganized as II Battalion of the 14th SS Volunteer Mountain Infantry Regiment of the 7th SS Volunteer Mountain Division Prinz Eugen. On 21 January 1945, Schmidhuber was promoted to SS-Brigadeführer und Generalmajor der Waffen-SS (brigadier) and placed in command of the 7th SS Volunteer Mountain Division Prinz Eugen. After the war, he was found guilty of war crimes and was hanged in Belgrade on 27 February 1947. The men from II Battalion fought with the Prinz Eugen until February 1945, when they were sent north to defend the Oder-Neisse Line. That month, the battalion was disbanded altogether and its remaining manpower was assigned to the German police regiment near Zagreb.
The division itself was considered to have been a military failure, and not one of its members was ever awarded an Iron Cross while serving in it. Overall, it was better known for committing atrocities than for contributing to the German war effort. Its role in deporting Jews from Kosovo has been questioned by Albanian historian Shaban Sinani, who claims that the division did not participate in any deportations on behalf of the Germans. Prior to the outbreak of the Kosovo War in the 1990s, American journalist Chris Hedges alleged that some of the leaders of the Kosovo Liberation Army (KLA) were directly descended from members of the division and that they were ideologically influenced by it and other Albanian right-wing elements. This claim has been challenged by British historian Noel Malcolm.
Insignia[edit | edit source]
The division's identification symbol was the Albanian double-headed eagle. Despite its short existence, a collar patch depicting a goat-crested helmet was manufactured for the division but there is no evidence that it was ever used. Photographs exist of a machined-woven cuff band with the title Skanderbeg, but this was awarded to the 14th SS Volunteer Gebirgsjäger Regiment of the 7th SS Division in autumn 1944, and not to this division. Members of the cadre staff were photographed wearing an Albanian arm shield depicting a black Albanian double-headed eagle on a red field. Many of the division's Muslim members wore traditional grey-coloured skull caps instead of the standard SS field cap.
Order of battle[edit | edit source]
The principal units of the division were:
- 50th Waffen Gebirgsjäger (Mountain Infantry) Regiment of the SS (1st Albanian) (I, II, III battalions)
- 51st Waffen Gebirgsjäger Regiment of the SS (2nd Albanian) (I, II, III battalions)
- 21st SS Reconnaissance Battalion (four companies)
- 21st SS Freiwilligen (Volunteer) Panzerjäger (Anti-tank) Battalion (three companies)
- 21st SS Gebirgs (Mountain) Artillery Regiment (four battalions)
- 21st SS Freiwilligen Pioneer Battalion (three companies)
- 21st SS Feldersatz (Replacement) Battalion
- 21st SS Freiwilligen Signals Battalion (three companies)
- 21st SS Mountain Supply Troop
See also[edit | edit source]
- List of Waffen-SS units
- Table of ranks and insignia of the Waffen-SS
- Waffen-SS foreign volunteers and conscripts
Notes[edit | edit source]
- Keegan 1970, p. 139.
- Fisk 2006, p. 439.
- Lemkin 2008, pp. 99–100.
- Lemkin 2008, pp. 260–261.
- Judah 2002, p. 27.
- Ramet 2006, p. 141.
- Judah 2002, p. 28.
- Mojzes 2011, p. 95.
- Tomasevich 2001, p. 151.
- Williamson 2004, p. 128.
- Tomasevich 2001, p. 153.
- Lepre 1997, pp. 48–49.
- Tomasevich 2001, p. 498–499.
- Fischer 1999, p. 185.
- Longerich 2011, p. 677.
- Lepre 1997, p. 223.
- Judah 2000, p. 132.
- Lepre 1997, p. 165.
- Stein 1984, p. 184.
- Williamson 2012a, p. 38.
- Nafziger 1992, p. 21.
- Tomasevich 2001, p. 154.
- Kaltenegger 2008, p. 69.
- Williamson 2012b, p. 18.
- Cohen 1996, p. 100.
- Abbott 1983, p. 27.
- Simeunović & Dolnik 2013, p. 94.
- Cappellano & Battistelli 2012.
- Elsie 2010, p. 261.
- Perez 2013, p. 27.
- Mojzes 2011, pp. 94–95.
- Poulton 2003, pp. 127–128.
- Frank 2010, pp. 84–85.
- Tomasevich 1975, p. 410.
- Fischer 1999, p. 224.
- Kaltenegger 2008, p. 251.
- Williamson 2012b, p. 19.
- Kaltenegger 2008, p. 65.
- Fischer 1999, p. 186.
- Judah 2002, pp. 28–29.
- Bishop 2003, p. 71.
- Judah 2002, pp. 27–28.
- Bideleux & Jeffries 2007, p. 526.
- Kumm 1995, p. 236.
- Kumm 1995, p. 239.
- Kumm 1995, p. 245.
- Kumm 1995, p. 255.
- MacLean 1996, p. 141.
- Stein 1984, p. 185.
- Ailsby 2004, p. 169.
- Butler 2001, p. 188.
- Perez 2013, p. 39.
- Zolo 2002, p. 25.
- Malcolm 5 May 1999.
- Bishop 2007, p. 164.
- Kaltenegger 2008, p. 89.
References[edit | edit source]
Books[edit | edit source]
- Abbott, Peter (1983). Partisan Warfare 1941–45. London, England: Osprey. ISBN 978-0-85045-513-7. http://books.google.ca/books?id=z1CNJitx5RkC.
- Ailsby, Christopher J. (2004). Hitler's Renegades: Foreign Nationals in the Service of the Third Reich. Dulles, Virginia: Brassey's. ISBN 978-1-57488-838-6. http://books.google.ca/books?id=J5yfAAAAMAAJ.
- Bideleux, Robert; Jeffries, Ian (2007). The Balkans: A Post-Communist History. London, England: Routledge. ISBN 978-0-203-96911-3. http://books.google.com/?id=5jrHOKsU9pEC.
- Bishop, Chris (2003). SS: Hell on the Western Front: The Waffen-SS in Europe, 1940–1945. Saint Paul, Minnesota: Zenith Press. ISBN 978-0-7603-1402-9. http://books.google.com/?id=iqWZov065T4C.
- Bishop, Chris (2007). Waffen-SS Divisions, 1939–45. London, England: Amber Books. ISBN 978-1-905704-55-2. http://books.google.com/?id=Vc8MAQAAMAAJ.
- Butler, Rupert (2001). SS-Leibstandarte: The History of the First SS Division 1933–45. Saint Paul, Minnesota: Amber Books. ISBN 978-0-7603-1147-9. http://books.google.com/?id=9eI_CXi0h7gC.
- Cappellano, Filippo; Battistelli, Pier Paolo (2012). "Medium Tanks in German Service". Italian Medium Tanks: 1939–45. Oxford, Oxfordshire: Osprey. ISBN 978-1-84908-775-9. http://books.google.com.au/books?id=wt36tDH-YjgC.
- Cohen, Philip J. (1996). Serbia's Secret War: Propaganda and the Deceit of History. College Station, Texas: Texas A&M University Press. ISBN 978-0-89096-760-7. http://books.google.com/books?id=Fz1PW_wnHYMC.
- Elsie, Robert (2010). Historical Dictionary of Kosovo. Lanham, Maryland: Rowman & Littlefield. ISBN 978-0-8108-7483-1. http://books.google.ca/books?id=Pg-aeA-nUeAC&printsec=frontcover.
- Fischer, Bernd Jürgen (1999). Albania at War, 1939–1945. West Lafayette, Indiana: Purdue Research Foundation. ISBN 978-1-55753-141-4. http://books.google.ca/books?id=vTZnAAAAMAAJ.
- Fisk, Robert (2006). The Great War for Civilisation: The Conquest of the Middle East. New York: HarperPerennial. ISBN 978-1-84115-008-6. http://books.google.com.au/books?id=SJHtAAAAMAAJ.
- Frank, Chaim (2010). "Antisemitism in Yugoslavia". In Petersen, Hans-Christian; Salzborn, Samuel. Antisemitism in Eastern Europe: History and Present in Comparison. Bern, Switzerland: Peter Lang. ISBN 978-3-631-59828-3. http://books.google.ca/books?id=k6sqlTGHpsAC.
- Judah, Tim (2000). The Serbs: History, Myth and the Destruction of Yugoslavia. New Haven, Connecticut: Yale University Press. ISBN 978-0-300-08507-5. http://books.google.com.au/books?id=B4YbP0fPcMYC.
- Judah, Tim (2002). Kosovo: War and Revenge. New Haven, Connecticut: Yale University Press. ISBN 978-0-300-09725-2. http://books.google.ca/books?id=sVf1na3FN_UC.
- Kaltenegger, Roland (2008) (in German). Totenkopf und Edelweiss: General Artur Phleps und die südosteuropäischen Gebirgsverbände der Waffen-SS im Partisanenkampf auf dem Balkan 1942–1945 [Skull and Edelweiss: General Artur Phleps and the Southeastern European Mountain Units of the Waffen-SS in the Partisan Struggle in the Balkans 1942–1945]. Graz, Austria: Ares Verlag. ISBN 978-3-902475-57-2.
- Keegan, John (1970). Waffen SS: The Asphalt Soldiers. London, England: Pan/Ballantine. ISBN 978-0-345-09768-2.
- Kumm, Otto (1995). Prinz Eugen: The History of the 7. SS-Mountain Division "Prinz Eugen". Winnipeg, Manitoba: J.J. Fedorowicz. ISBN 978-0-921991-29-8.
- Lemkin, Raphael (2008). Axis Rule in Occupied Europe. Clark, New Jersey: The Lawbook Exchange. ISBN 978-1-58477-901-8. http://books.google.com/books?id=y0in2wOY-W0C.
- Lepre, George (1997). Himmler's Bosnian Division: The Waffen-SS Handschar Division 1943–1945. Atglen, Pennsylvania: Schiffer. ISBN 978-0-7643-0134-6.
- Longerich, Peter (2011). Heinrich Himmler: A Life. Oxford, England: Oxford University Press. ISBN 978-0-19-959232-6. http://books.google.com/?id=GBQchepZ-7EC.
- MacLean, French L. (1996). Quiet Flows the Rhine: German General Officer Casualties in World War II. Winnipeg, Manitoba: J.J. Fedorowicz. ISBN 978-0-921991-32-8.
- Mojzes, Paul (2011). Balkan Genocides: Holocaust and Ethnic Cleansing in the 20th Century. Lanham, Maryland: Rowman & Littlefield. ISBN 978-1-4422-0665-6. http://books.google.ca/books?id=KwW2O7v7CUcC.
- Perez, Daniel (2013). Himka, John-Paul; Michlic, Joanna Beata. eds. Bringing the Dark Past to Light: The Reception of the Holocaust in Postcommunist Europe. Lincoln, Nebraska: Nebraska University Press. ISBN 978-0-8032-4647-8. http://books.google.com/?id=Ya7RMPN9-ZsC.
- Poulton, Hugh (2003). Djokić, Dejan. ed. Yugoslavism: Histories of a Failed Idea, 1918–1992. Madison, Wisconsin: University of Wisconsin Press. ISBN 978-0-299-18610-4. http://books.google.ca/books?id=bAaqxRJiXiEC.
- Ramet, Sabrina P. (2006). The Three Yugoslavias: State-Building and Legitimation, 1918–2005. Bloomington, Indiana: Indiana University Press. ISBN 978-0-253-34656-8. http://books.google.com/books?id=FTw3lEqi2-oC.
- Simeunović, Dragan; Dolnik, Adam (2013). "Security Threats of Violent Islamist Extremism". In Cross, Sharyl; Kentera, Savo; Nation, R. Craig et al.. Shaping South East Europe's Security Community for the Twenty-First Century: Trust, Partnership, Integration. Basingstoke, England: Palgrave Macmillan. ISBN 978-1-137-01020-9. http://books.google.ca/books?id=X6MOMYYeULUC.
- Stein, George H. (1984). The Waffen SS: Hitler's Elite Guard at War, 1939–45. Ithaca, New York: Cornell University Press. ISBN 978-0-8014-9275-4. http://books.google.com/?id=-KEtPlNQJNgC.
- Tomasevich, Jozo (1975). War and Revolution in Yugoslavia, 1941–1945: The Chetniks. Stanford, California: Stanford University Press. ISBN 978-0-8047-0857-9. http://books.google.com/books?id=yoCaAAAAIAAJ.
- Tomasevich, Jozo (2001). War and Revolution in Yugoslavia, 1941–1945: Occupation and Collaboration. Stanford, California: Stanford University Press. ISBN 978-0-8047-3615-2. http://books.google.com/?id=fqUSGevFe5MC.
- Williamson, Gordon (2004). The SS: Hitler's Instrument Of Terror. Saint Paul, Minnesota: Zenith Press. ISBN 978-0-7603-1933-8. http://books.google.com/?id=7gv7yPIdQdsC.
- Williamson, Gordon (2012a). The Waffen SS (3): 11. to 23. Divisions. Oxford, England: Osprey. ISBN 978-1-84176-591-4. http://books.google.com.au/books?id=fSz0UZ3rw2QC.
- Williamson, Gordon (2012b). German Mountain & Ski Troops 1939–45. Oxford, England: Osprey. ISBN 978-1-78096-791-2. http://books.google.com.au/books?id=2_JAwvCTAUQC.
- Zolo, Danilo (2002). Invoking Humanity: War, Law and Global Order. London, England: Continuum. ISBN 978-0-8264-5655-7. http://books.google.com/?id=20kxq_Au3H8C.
Websites[edit | edit source]
- Malcolm, Noel (5 May 1999). "Response by Noel Malcolm". Bosnian Institute. http://www.bosnia.org.uk/news/news/050599_2.cfm. Retrieved 20 July 2013.
- Nafziger, George (1992). "Organizational History of the German SS Formations 1939–1945". Combined Arms Research Library Digital Library. http://usacac.army.mil/cac2/CGSC/CARL/nafziger/939GXWA.pdf. Retrieved 18 June 2013
Further reading[edit | edit source]
- Malcolm, Noel (1998). Kosovo: A Short History. London: Pan Macmillan. ISBN 978-0-333-66613-5. http://books.google.ca/books?id=3gPEQgAACAAJ.
- Vickers, Miranda (1998). Between Serb and Albanian: A History of Kosovo. New York: Columbia University Press. ISBN 978-0-231-11383-0. http://books.google.ca/books?id=BSRkkgEACAAJ.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).| |
Paper aeroplanes could fly by flapping their wings thanks to smart paper that bends when bathed in an electric field. The material raises the prospect of swarms of tiny lightweight aircraft carrying sensors that act as the eyes and ears of a surveillance network.
Electroactive paper (EAPap) is ordinary cotton-based paper, similar to the material used to make US bank notes, coated on each side with a thin layer of gold. The smart paper has been made by researchers from Inha University, South Korea, and Texas A & M University, US
Unlike ordinary paper, EAPap bends as a result of two effects working together. When a voltage is applied, the gold coating on one side of the paper becomes a positively charged while the other side becomes negatively charged. Sodium ions in the paper move towards the negative electrode, taking water molecules with them. This makes that side of the paper expand, causing it to bend. |
What is rosemary? What is it used for?
Rosemary is a medium-sized evergreen shrub that grows to a height of seven feet. Native to Portugal, the plant takes its name from the Latin "ros marinus," which means "sea dew."
Rosemary shrubs consist of stiff branches with long, needle-like leaves that are dark green above and white underneath. Pale blue flowers grow on the ends of the leaves. The leaves and parts of the flowers contain a volatile oil and are used medicinally. It is also used as a spice in cooking.
Traditionally, rosemary has been used to increase urine production, reduce muscle spasms and stimulate menstrual blood flow. Externally, the plant has been used as a poultice to promote wound healing.
In clinical studies, rosemary oil has displayed antibacterial and antifungal properties. Two of the oil's constituents, carnosol and ursolic acid, appear to work as antioxidants. The oil has also been shown to reduce spasms in smooth muscle (such as the gallbladder and intestines) and, to a lesser extent, cardiac muscle. In other research, carnosol inhibited the growth of bronchial cancer cells.
How much rosemary should I take?
Depending on the way rosemary is prepared, the following daily doses are recommended:
Tincture (1:5): 2-4 ml
Infusion: 2-4 grams
Fluid extract (1:1 in 45% alcohol): 1-2 ml
Rosemary wine: 20 grams of rosemary added to one liter of wine and allowed to stand for five days
Essential oil (6-10%): two drops semisolid or liquid in one tablespoon base oil
Infusion: 50 grams of rosemary in one liter of hot water added to bath water
What forms of rosemary are available?
Rosemary comes only from the rosemary plant. The leaves and twigs are used for both culinary and medicinal purposes.
Rosemary is available as a powder or dry extract. Some liquid preparations, such as tinctures and rosemary wine, are made using the plant's leaves and volatile oils.
What can happen if I take too much rosemary? Are there any interactions I should be aware of? What precautions should I take?
When taken as directed, rosemary is generally considered safe and devoid of adverse side-effects. However, there have been occasional reports of allergic reactions to rosemary. Large quantities of rosemary leaves can cause serious side-effects, including coma, spasm, vomiting and pulmonary edema.
Women who are pregnant or lactating should not use rosemary. In addition, some topical preparations containing rosemary may cause adverse reactions in patients who are allergic to camphor. Excessive quantities of rosemary oil taken internally can cause convulsions. As always, make sure to consult with a health care provider before taking rosemary or any other dietary supplement or herbal remedy.
- Aqel MB. Relaxant effect of the volatile oil of rosmarinus officinalis on tracheal smooth muscle. J Ethnopharmacol 1991;33(1-2):57-62.
- Huang MT, Ho CT, Wang ZY, et al. Inhibition of skin tumorigenesis by rosemary and its constituents carnosol and ursolic acid. Cancer Res 1994;54(ISS3):701-708.
- Lemonica IP, Damasceno DC, di-Stasi LC. Study of the embryotoxic effects of an extract of rosemary (rosmarinus officinalis L.) Braz Med Biol Res 1996;19(2):223-227.
- Offord EA, Macz K, Ruffieux C, Malnše A, Pfeifer AM. Rosemary components inhibit benzo[a]pyrene-induced genotoxicity inhuman bronchial cells. Carcinogenesis 1995;16(ISS9):2057-2062.
- Schulz V, Hansel R, Tyler V. Rational Phytotherapy: A Physician's Guide to Herbal Medicine, 3rd ed. Berlin, Germany: Springer; 1998:105. |
Faith has established Jhulelal as the Asht Dev (community God) of sindhis. His Birthday "Cheti Chand" second tithi of Chaitra auspicious for sindhis and is celebrated the world over with traditional pomp and gaiety. But how, when and where in history was the lord of sind born?
The Hindu legend of Jhulelal or the River Diety has its historical or semi-historical beginnings in Sind, an erstwhile province of united India and now a state of Pakistan. During the days of Sapt-Sindhu (land of seven rivers), the mainstream Sindhu and its tributaries were considered life-givers to the people who lived on its banks and drew sustenance from its waters. It was precisely the lure of plentiful water that brought invading hordes of Muslim rulers from the neighbouring Arabian Kingdoms to Sind and India. Having conquered Sind and its adjoining territories, they spread Islam at the point of the sword. In the 10th century A.D. Sind came under the rule of Samras. The Samras being converts from Hinduism to Islam were neither bigots nor fanatics. However, there was no exception in the Sumra region. Being far away from its capital, Thatta maintained its separate identity and influence. Its rulers Mirkshah was not only a tyrant but also a religious fanatic. And as in the wont of many a tyrant, Mirkshah too was surrounded by sycophants. These friends advised him one day : "Spread Islam and you will be granted 'Janat' or eternal bliss after death."
Swayed by the promise, Mirkshah summoned the 'panchs' (representatives) of the Hindus and ordered them : "Embrace Islam or prepare to die". The terrified Hindus begged Mirkshah for time to consider the 'shahi firman' or royal edict. The pompous Mirkshah relented and agreed to give the desperate Hindus forty days to plead with their God.
Faced with imminent death, the Hindus turned to God Varuna, the God of the River, to come to their aid. For forty days, they underwent penance. They neither shaved nor wore new clothes, praying and fasting and singing songs in the praise of God Varuna. They beseeched him to deliver them from the hands of their persecutor.
On the fortieth day, a voice was heard from Heaven : "Fear not, I shall save you from the wicked Mirkshah. I shall come down as a mortal and take birth in the womb of Mata Devki in the house of Ratanchand Lohano of Nasarpur". After forty days of chaliho, the followers of Jhulelal even today celebrate the occasion with festivity as Thanksgiving Day.
The oppressed Hindus now anxiously awaited the birth of their deliverer. After three months, the second tithi of Asu month, they got confirmation of the news that Mata Devki has indeed conceived. The River God has incarnated himself in her womb. The Hindus rejoiced and praised the Lord.
On Cheti Chand, two tithis from the new moon of Chaitra, Mata Devki gave birth to a boony boy, A miracle hailed the child's birth. The babe opened his mouth and behold! there flowed the Sindhu with an old man sitting cross-legged on a pala fish. The pala fish as everyone knows is a tasty fish which always swims against the current.
To welcome the newborn 'avatar', unseasonal clouds gathered and brought down torrential rains. The child was named 'Udaichand' (Uday in Sanskrit means moon-beams). Udaichand was to be the light in the darkness. An astrologer who saw the child predicted that he would grow up to be a great warrior and his fame would outlive the child. Udaichand was also called 'Uderolal' (Udero in Sanskrit means 'one who has sprung from water'). Inhabitants of Nasarpur lovingly called the child 'Amarlal' (immortal) child. The cradle where little Udero rested began to sway to and fro on its own. It is because of this that 'Uderolal' became popularly known as 'Jhulelal' or the swinging child. Soon after the child's birth Mata Devki passed away. A little later Ratanchand remarried.
News of the birth of the mysterious child reached Mirkshah who once again summoned the Panchs and repeated his royal threat. Hindus, now quite confident that their saviour had arrived, implored him for some more time informing him that their saviours was none other than the Water God himself. Mirkshah scoffed at the very idea of a child saving the Hindus. "Neither am I going to die nor are you, people going to leave this land alive", he jeered. "I shall wait. When your saviour embraces Islam, I am sure you will also follow suit." With this remark, the haughty Mirkshah threw a challenhe to his Hindu subjects.
The maulvis pressed Mirkshah hard not to let the Hindus of the hook. But the very thought of the child proving more than a match for him amused the conceited ruler. He therefore told the maulvis to wait and watch. As a token precaution, he asked one of his ministers Ahirio, to go to Nasarpur to see things first hand, Ahirio did not want to take any chances. So he took along a rose dipped in deadly poison.
At the very first glimpse of the child, Ahirio was astonished. He had never seen a child so dazzling or more charming. He hesitated, then mustering courage proferred the rose to the child. The child gave a meaningful smile while accepting the rose. He then blew away the flower with a single breath. The flower fell at Ahirio's feet. Ahirio watched stupefied as the babe changed into an old man with a long beard. All of a sudden the old man turned into a lad of sixteen. And then he saw Uderolal on horseback with a blazing sword in his hand. There were row upon row warriors behind him. A cold shiver ran down Ahirio's spine and he bowed his head in reverence. "Have mercy on me Sindhu Lord", he prayed "I am convinced".
On his return Ahirio narrated the miraculous happening to Mirkshah. But Mirkshah was not convinced. He hardened his heart even more. "How can a little baby turn into an old man ? " he mocked. "It looks like you have been fooled by simple magic." But in his heart, Mirkshah was afraid. That night he dreamt a dreadful dream. A child was sitting on his neck. The vision changed to an old man with a flowing beard. And again to a warrior with a drawn sword confronting Mirkshah on the battlefield. Next morning Mirkshah called for Ahirio and gave him orders to counter the threat posed by the child. Ahirio, however, advised Mirkshah not to rush matters.
Meanwhile, the child Uderolal grew in stature and spirit performing miracles and comforting the sick. Residents of Nasarpur wre fully convinced that God had come to save them. Uderolal also received the 'Gur Mantar of 'Alakh Niranjan' from Goraknath.
To earn money for the family, Udero's stepmother would send him to the market to sell baked beans, Instead of going to the market, Uderolal would go to the banks of the Sindhu. There he would distribute half of the beans among beggars, the poor and the sadhus. The other half, he would offer to the Sindhu. He would them spend the rest of the speaking to little children and the elderly about spiritual wealth. In the evening when it was time to go home, Udero would fish out from the river a container full of fine quality rice. This he would take home and give it to his step mother.
Growing suspicious about her step son's behaviour, the step mother one day despatched Ratanchand to follow him. When Ratanchand witnessed the miracle, he bowed to Uderolal froma distance and accepted him as the Saviour.
Mirkshah on the other hand was being pressurised by the Maulvis to bring Hindu infidels into the fold of Islam. They gave him the ultimatum. "Order the Hindus to convert or be branded as associate of kafirs." Fearing the wrath of the clerics, Mirkshah decided to meet Uderolal face to face. He asked Ahirio to arrange for a private meeting with Udero.
Ahirio who had in the meantime become a devotee of Daryashah, went to the banks of the Indus and pleaded with the Water God to come to his rescue. To Ahirio's amazement, he saw the same old man with a white beard floating on a pala fish. Ahirio's head bowed in adoration and he understood that Uderolal, the Water God, was in fact the other form of Khwaja Khirz. Ahirio then saw Udero leap onto a horse and gallop away with a sword in one hand and a flag in the other.
Udero appeared before Mirkshah and explained to the stubborn ruler : "Whatever you see around you is the creation of only one God, whom you call 'Allah' and the Hindus call 'Ishwar'." The maulvis urged Mirkshah not to pay any heed to the infidels's talks and to arrest him. Mirkshah dithering as usual ordered hos soldiers to arrest Udero.
As the officials of the court moved towards Udero, great waves of water leaped forth inundating the courtyard and crowning Mirkshah and his courtiers. Fire too broke our and the palace was consumed by the flames. All escape routes were sealed. Udero spoke again, "Mirkshah, think it over. Your God and mine are the same. Then, why did you persecute my people ?"
Mirkshah was terrified and begged Udero, "My Lord, I realise my foolhardiness. Please save me and my courtiers." All at once the water receded and the fire died away. Mirkshah bowed respectfully and agreed to treat Hindus and Muslims alike. Before they dispersed, Uderolal told the Hindus to think of him as the embodiment of light and water. He also told them to build a temple in memory of transformation of Mirkshah. "Day in and out", he said "light a candle in the temple and always keep available water for daat (holy sip)".
Uderolal named his cousin, Pagad, as the first Thakur (Priest of the religious sect that believes in Water God). Pagad followed Uderolal wherever he went. Uderolal gave seven sysmbolic things to Pagad. These seven from the essential elements of the Daryahi sect. Uderolal asked Pagad to continue the sacred work of building temples and spread the message.
Selecting a place near village Thijahar, Uderolal gave up his earthly form. Both Hindus and Muslims were present in the large number to witness this mysterious happening. Mirkshah's representatives were also there. No sooner Uderolal's soul left his body, they took charge and wanted to build a 'Turbat' or 'Qaba" at the site according to the dictates of Islam. The Hindus wanted to erect a 'Samadhi' according to Hindu custom. While the debate regard, heavy rains came down a voice said : "Behold ! You shall make my shrine acceptable both to Hindus and Muslims. Let its one face be a temple and the other a Dargah (Shrine). I belong to all of you."
Jhulelal continues to be the unifying force and the centre of all cultural activities of the Sindhi community. The word Sindhi is derived from the river Sindhu (now in Pakistan)." When Sindhi men venture out to sea their women pray to him for their safe return. They offer the Lord prasad of akha, a sweet made from rice, ghee, sugar and flour. Sindhis all over the world greet each other with "Jhulelal Bera-Hee-Paar". |
Alternate name: Garden Vetch
Family: Fabaceae, Pea view all from this family
Description This trailing or climbing vine, a common weed of cropland, bears purple or pink pea flowers, each held singly.
Habit: native annual vine.
Height: stems to 42 in (1.1 m).
Leaf: alternate, pinnately compound; leaflets in 4-8 pairs, linear to wedge-shaped, 0.5-1.5 in (1.5-4 cm) long; small stipules at base of leaf stalk, 0.1-0.4 in (2-10 mm) long.
Flower: purple to pink, rarely white, to 1.25 in (3 cm) long; on long stalk from leaf axil.
Fruit: pod, 1-3 in (2.5-7.5 cm) long, 0.1-0.3 in (2.5-8 mm) wide; initially hairy, becoming smooth.
Warning The seeds of this Vicia contain cyanide compounds and are toxic to humans and animals if eaten. Sensitivity to a toxin varies with a personís age, weight, physical condition, and individual susceptibility. Children are most vulnerable because of their curiosity and small size. Toxicity can vary in a plant according to season, the plantís different parts, and its stage of growth; and plants can absorb toxic substances, such as herbicides, pesticides, and pollutants from the water, air, and soil.
Flower April to July.
Habitat cropland, fields, pastures, landscaping, roadsides, disturbed sites; usually below 5000 ft (1500 m).
Range Native to Europe and Asia; introduced; naturalized in every U.S. state except Utah; in Canada, the Yukon, British Columbia, and from Manitoba to Newfoundland and Nova Scotia.
Discussion Also called garden vetch, common vetch, slimleaf vetch, "the vetch", tare. Up to five subspecies are generally accepted. |
New law aims to reduce bovine flatulance, but will the cows obey?
Eric Boehm|Nov. 30, 2016 11:48 am
Caro / Frank Sorge/NewscomLivestock are responsible for roughly 15 percent of the world's greenhouse gases, but if you think getting people to stop driving their cars or using electricity is a difficult task, good luck preventing cows from farting.
California is going to try.
"This bill curbs these dangerous pollutants and thereby protects public health and slows climate change," said Gov. Jerry Brown said in a statement when he signed the bill in September, against the wishes of the state's farmers.
The law won't stop cows from farting, of course, because cows are notoriously disrespectful of human-passed laws. Instead, it will make life more difficult for dairy farmers in California.
Dairy farms will be required to reduce methane emissions to 40 percent below their 2013 levels by 2030. The state will spend $50 million help offset the cost of so-called "dairy digesters," which are intended to capture methane spewed from cows and convert it into electricity. After that, the state's Air Resources Board will have the authority to set whatever regulations they deem necessary to reach the stated goal.
Cow farts—or "bovine entric fermentation" if you want to sound smart—pump a lot of methane into the environment. A single cow can produce up to 130 gallons of methane in a single day (even that's not as bad as what dinosaur fartscould do), and methane is a more potent greenhouse gas than carbon dioxide.
Even if California were to find a way to stop cows from farting—or, more likely, if it were to regulate all its dairy farms out of existence—there would be a miniscule impact on global methane levels. California isn't even the leading producer of agricultural methane in the United States, according to the Environmental Protection Agency.
On a global scale, the tiny microbes that grow on the roots of rice plants produce 30 percent of all agricultural methaneon Earth.
California's not the first to target cows in an effort to rein-in global warming. Some ethical vegetarian groups have allied with global warming activists to call for reducing the number of cows in Africa.
The attack on dairy cows is part of a broader effort to reduce California's greenhouse gas emissions to 40 percent below 1990 levels by 2030. Doing that means giving a lot more power ot the state's Air Resources Board, which now finds itself in the business of regulating what comes out of bovine buttocks. According to an Associated Press report this week, the board is hoping California's proposal will be a model for other states to follow. |
2001 there was an Anthrax attack which created an alert of how bioterrorism had an impact on the public health emergencies. These types of emergencies can not only spread illnesses but also cause several deaths. The can also affect government operations which include the economic growth, creating fear which can cause International crisis. There has been an alert on illnesses that have previously been curbed reappearing with most of them resisting the drugs in the market. There has also been an alert of the food supplies in the market due to the terrorists because they can be used to spread infections.
The public health system is highly responsible for detecting any bioterrorist attacks enabling the government to prepare for any attacks. This means that the government should enhance all infrastructure connected to health systems in order to integrate any threats related to biological or chemical terror attacks (Hamburg 2003).This is when the congress granted the government the Public Health Securities and Bioterrorism Preparedness and Response act in 2002 in order to stay alert of any bioterrorist attacks.
Public Health Infrastructure
The public health fully depends on the type of infrastructure of the health department and its agencies. It also depends on the laws, regulations, both public and private laboratories, health care providers including hospitals, statistics, and lastly communication programs. The whole system operates via unified activities from the local, through state, to federal levels.
The preparedness activities can be categorized in to three levels which include prevention, discovery and the reaction. In prevention, the environmental and agricultural conditions are regulated so that the threats can be minimized. The access to some biological agents is also limited in order to prevent the situation. Lastly the intelligence to uncover any planned attacks is enhanced so as to uncover the plans before the attacks (Koblentz 2003). Detecting the attacks has also been enhanced by offering special training to improve diagnosis. Surveillance has also been enhanced to not only detect outbreaks but to also improve laboratory potentials. Response plans have been established through drills. They have also offered medical skills through immunization, decontamination and medication. All these capacities can be applied in attacks or just general ailments.
Once a breakout has been detected, the local health agencies are on the frontline whereby they act after getting information from the traditional responders, through to medical providers and hence to the government. Sometimes treatment may be offered from the local level before communicating to the other levels. They take the responsibilities of detecting the attack through watch, epidemiology, and essential laboratory services.
The preparedness of a bioterrorist attack has the state directly responsible through the public health. There are cases when the government directly gives authority while at times it uses a centralized method. However, most of the detection activities are handled by the government. Other than providing enhanced laboratories, they also offer epidemiological know-how. (Hamburg 2003).They are also responsible for organizing surveillance, organizing the localities, enforcing laws, and any other state agencies. The government also advises on analysis, and treatment of dangerous conditions. The state is also responsible for funding the local health agencies.
Federal government has also taken responsibility for preparedness actions such as organic research, pharmaceutical, healthy food assurance, and also intelligence actions. It is also responsible for providing support to both local and state efforts in detecting and responding to these attacks. They do this by providing some training programs, national scrutiny, early warning detection signals, and both funding and technical laboratory support, developing and maintaining the vaccines stocks, and also giving the financial support.
The physicians within the hospitals and other health care should be able to detect any arising health crisis. The people on the ground treating the victims should report any suspected outbreaks. In case of an outbreak, these health providers are called upon to put into practice both state and local preparedness strategies and nurse the victims. This means they have to go through trainings and exercises to enable them handle any type of influx (Heinrich 2003).
Some problems were highlighted by the institute of medicine in 2002 in the public health infrastructure. They included obsolete technologies, workforce lacked good training and enforcement, outdated laboratory facilities, lack of real-time watch and epidemiological systems, unsuccessful and fragmented communication networks, and partial emergency responsive potentials.
Other researchers have shown that there are gaps between the state and the local public health systems regarding the basic needs. For instance, most of the local health agencies did not have any access to the internet. Some of the heads in both local and state departments did not have a graduate training. Most of the hospitals lacked basic commodities like beds, medicines, ventilations among other facilities. Recommendations for addressing the threats were as crucial as the improvement of the awareness programs.
Federal program's support for state and local preparedness
Most of the federal agencies have the mandates over activities linked to bioterrorism or any other infectious diseases. However, today's support at the state and local level is being handled by Department of Health and Human Services. A greatest federal exertion to support state preparedness comes from Public Health Security and also Bioterrorism Preparedness and Response Act of 2002 (Heinrich 2003). The law has provided for the Secretary of the Health and Human Services to build up and put into practice a coordinated method to prepare and respond to bioterrorism attacks or any other public health crisis. The same law has emphasized the need for the federal government to coordinate the same with the state. The law has allowed the secretary to give funding to states for emergency preparation and evaluation, and infrastructure development. These funds can also be used for improving communication and trainings. All the states are receiving these funds and the cooperation agreement programs work through Centers for Disease Control and Prevention (CDC). They also operate through Health Resources and Services Administration (HRSA).
The states and localities apply for funding annually by giving a detailed work plan to the agencies. There is the per capita allocation plus the base distributed to each one of them. These funding have cost up to 3.7billion dollars by the year 2004. The CDC and HRSA are responsible for identifying whatever amount each state requires. The CDC looks into seven crucial areas which include assessment of preparedness, readiness and planning. They also look at surveillance and epidemiology capability (Heinrich 2003). They also check on both the biological and chemical capacities of their laboratory. CDC also checks the IT and communication network on health alerts. They communicate on the health risks, and lastly, on education and training.
HRSA similarly identifies some specific areas like administration, surge in the number of victims, emergency medical services, connection to public health departments, education and preparedness training, and terrorism preparedness drills. These two programs provide for a standard mode of identifying progress in not only preparedness, but also deadlines of reporting guidelines. These benchmarks may differ from one year to the other depending on the activities they have put in to consideration (Heinrich 2003).
Progress towards preparedness
Allocations of these funding differ with some of the states spending everything while others spending less than half of the amount. This unspent money can be carried forward to the next year at the request of the state. These programs allow the state to determine how the allocation to localities ill be done although they also direct the states to plan together with the local health agencies on the proper use of these funds in order to benefit the localities.
Most of the states managed to meet the targets as per the report by CDC for the cooperative agreements in the financial year of 2002. Some of the areas that highly progressed included designation of directors in the preparedness programs, setting up of bioterrorist advisory committee, creating interim plans to supervise the stocks, expanding coverage of epidemiologists, and improving communication between laboratories. Most of the states reportedly met the targets of the basic regions. However, no hospital had fully developed a plan on how to respond to a large scale epidemic (Koblentz 2003). No state came up with a plan on how to ensure that perfect medication got to pregnant women, children, and the elderly people. However there are good indications that the targets will soon be met. By 2004, HRSA had reported that most hospitals had put up more beds, and other procedures that would allow bigger capacities, with enhanced training and education to both members of staff and the community. More evaluations confirmed an enhanced communication between the states and the local health agencies with advanced systems.
The areas with most problems like the laboratories have often hired personnel in cases of large scale emergencies or during vaccination programs and area coordination. Some assessments have shown a shortage of staff who can handle stock taking, laboratory capability, testing of the preparedness plans, communicating across different government levels, and training private personnel.
Problems in preparedness
However, there have been challenges encountered by… |
Further vs. FartherDid the golfer hit the ball farther or further than his competitor?
If you answered farther, you are correct. If you answered further or were unsure why farther was correct, the explanation of this word battle is for you. Let me explain further. Did you catch that?
Farther is used when indicating physical distance. In other words, use farther when the distance can be measured (e.g., yards, miles, feet).
Farther is correct in the example sentence above because the distance can be measured to determine if the golfer did indeed hit his ball farther than his competitor.
On the other hand, further is used when indicating a metaphorical or figurative distance. For example, when I wrote “Let me explain further” above, I was referring to taking our discussion deeper in regards to the two differences between these two words. This figurative distance cannot be measured, so further is the correct word to use.
Here are some more examples of each word’s use:
Which city is farther?
Unfortunately, we had to drive farther than the map indicated.
Nothing could be further from the truth.
The seminar will further your understanding of the topic.
Follow these simple rules for using farther vs. further. If you need help in using these two words in your writing, you can trust our expert proofreaders.
Word Battle: Who Vs. Whom
Word Battle: Effect Vs. Affect
Word Battle: i.e. Vs. e.g. |
Advancing Basic Science for Humanity
Massachusetts Institute of Technology
MIT Kavli Institute for Astrophysics and Space Research
Building on more than four decades of leadership in space science, the MIT Kavli Institute for Astrophysics and Space Research (MKI) probes the universe with satellites, earth-based observatories and laboratory experiments. MKI got its start in 1965 as the MIT Center for Space Research and joined the Kavli network in 2004. It engages in a mix of longstanding research activities, such as satellite-based X-ray astronomy, and newer projects including the search for dark matter and the study of distant planets. Key initiatives include:
- Detection of dark matter. Data from the Big Bang and observation of vast structures such as galaxy clusters indicate that most of the mass in the universe exists in a form that cannot be seen or measured like ordinary matter. MKI scientists are developing new methods to detect this “dark matter,” including a gas-based technology that may show not only the presence of dark-matter particles but the direction that they travel.
- Observing extra-solar planets. MKI is a leader in the study of planets outside our Solar System, one of the booming fields in astronomy. With a critical mass of theorists in this area, it is planning a future satellite mission to find more planets pass (transit) in front of their stars and enable astronomers to collect unusually rich data on their mass, atmosphere and other features. Only about a dozen such planets are now known. Through TESS (Transiting Exoplanet Survey Satellite), MKI hopes to discover as many as a thousand.
- Studying the “Dark Ages” of the universe. MKI is engaged in space- and earth-based projects to study the universe as it was just before the first stars and galaxies appeared. Neutral hydrogen present at the time produced radio waves that are arriving billions of years later on a frequency just above the FM radio band. Kavli researchers are building an array of receivers in Western Australia – far from interfering radio broadcasts – to pick up those signals and observe the universe just before its first light.
- Gravitational astrophysics. When black holes collide or supernovas collapse, these violent events send out ripples in space-time. These gravity waves are predicted by Einstein’s General Theory of Relativity, but only now are researchers developing tools sensitive enough to detect them. MIT and now MKI have played a key role in building facilities such as LIGO, the Laser Interferometer Gravitational Wave Observatory. With LIGO now in the fine-tuning stage, Kavli scientists look forward to an explosion of new knowledge about the nature of gravity and the dynamics of the cosmos.
Leading the MIT Kavli Institute for Astrophysics and Space Research is Jacqueline N. Hewitt, Professor of Physics. The Institute is affiliated with the MIT’s Lincoln Laboratory as well as the departments of Physics, Chemical Engineering, Aeronautics and Astronautics, Electrical Engineering and Computer Science, and Earth, Atmospheric and Planetary Sciences. It participates in major space-based research projects including the Chandra X-Ray Observatory and the Rossi X-Ray Timing Explorer. |
Papaya health benefits and nutritional values includes combating inflammation, papaya also is a good source of antioxidant, does well to heal wound faster, fights the progression of Alzheimer’s disease, decreases the risk of heart disease, fights cancer, supports digestive health, protect against skin damage, prevents arthritis and more.
What Is Papaya?
Papaya is a fruit which is extremely rich in Vitamin C and has a wide range of health benefits and nutritional values making it great among other fruits. It is one of the favorites of fruit lovers for its health benefits and nutritional values, papaya is probably thought to have originated in the Central Americas.
Papaya plant is grown extensively all over the tropical regions under cultivated farms for its fruits as well as for latex, Botanically, the plant belongs to Caricaceae family of flowering plants, in the genus; Carica. Scientific name: Carica papaya.
It is also used as a meat tenderizer and in the manufacturing of several cosmetic, skin, and beauty products, as well as certain chewing gums. They are available for consumption throughout the year.
The whole fruit, including other parts of the tree, are beneficial to health in several ways. Papaya in raw form contains enzymes, which are used in the preparation of dietary supplements and chewing gums.
Papaya Nutritional Values.
Raw papaya pulp contains 88% water, 11% carbohydrates, and negligible fat and protein(table). In a 100 gram amount, papaya fruit provides 43 kilocalories and is a significant source of vitamin C (75% of the Daily Nutritional Values, DNV) and a moderate source of folate (10% DNV), but otherwise has low content of nutrients.
Vitamins In Papaya.
A 1-cup serving of cubed papaya provides 137.5 international units of vitamin A, which is 28 percent of the daily nutritional values. Vitamin A is essential for healthy vision, immune function and keeping your kidneys, heart, lungs and other organs working properly. The vitamin A in papaya is in the form of carotenoids, including beta-carotene, which act as antioxidants and help limit damage to your cells from substances called free radicals.
Papaya also provides significant amounts of another antioxidant — vitamin C. Each cup of papaya contains 88.3 milligrams of vitamin C, or 147 percent of the DNV. Vitamin C helps heal wounds and repair damaged tissues in your body. You also need it for forming collagen, an essential component in blood vessels, skin, ligaments, cartilage and tendons.
A serving of papaya provides 53.7 micrograms of folate, or 13 percent of the DV. You need folate for cell division and forming DNA. Getting enough of this vitamin is especially important during early pregnancy because folate helps prevent neural tube birth defects. Papaya also contains small amounts of thiamine, riboflavin, niacin, pantothenic acid.
Vitamin B6 is supports the prevention or treatment of acne and other skin conditions, alcohol hangover, anxiety, age-related macular degeneration (AMD), allergies, Alzheimer’s disease, arthritis, asthma, attention deficit-hyperactivity disorder (ADHD), autism, bladder infections (cystitis). Also handles issues like blood clots (thrombosis), breast milk reduction, breast tenderness, cancer, carpal tunnel syndrome, convulsions due to fever and depression.
Vitamin E helps in supporting our immune system by stimulating the production of antibodies and immune mediators, and helping to buffer the effects of free radical damage on the cells. Our immune system may be compromised if we do not consume enough of the important antioxidant vitamins.
Vitamins k supports in the prevention or treatment of age-related vision loss (age-related macular degeneration), Alzheimer’s disease, amyotrophic lateral sclerosis, angina pectoris (heart-related chest pain), asthma, atherosclerosis (artery hardening), cancer (breast, prostate or other), cataracts, cerebellar ataxia (uncoordinated movements).
Others are congestive heart failure, coronary heart disease, dry mouth, cyclic vomiting syndrome, cystic fibrosis, dental (periodontal) disease, diabetic cardiomyopathy, endothelial dysfunction, fibromyalgia, Friedreich’s ataxia, gum disease and hair loss.
Minerals In Papaya.
A pawpaw provides you with almost as much potassium as a banana, containing approximately 7 percent of the potassium you need to consume each day. Potassium is essential for turning the food you eat into energy, as well as transmitting nerve impulses, proper heart functioning and contracting your muscles. Consuming more potassium may lower your risk for stroke and osteoporosis.
A pawpaw fruit will provide men with 27 percent of the magnesium they need each day and women with 35 percent of their recommended dietary allowance for this mineral. You need magnesium for strong bones, a healthy immune system and properly functioning nerves and muscles. Magnesium helps to maintain normal blood sugar and blood pressure levels and helps turn the food you eat into energy.
The manganese content of pawpaw fruit is higher than that found in apples, bananas or oranges. You can meet the adequate daily recommended intake for this mineral with just one serving of pawpaw. Your body uses this mineral in very small amounts for maintaining normal nerve and brain function, metabolism, bone formation, regulating blood sugar, forming connective tissue and forming sex hormones.
One serving of pawpaw also provides you with more than half of your daily requirement for the mineral copper. Copper is essential for healthy bones and is also used by your body for maintaining the proper functioning of your blood vessels, immune system and nerves. You need both copper and iron for your body to make red blood cells.
Here are the break down of papaya nutritional values.
|Principle||Nutrient Value||Percentage of RDA|
|Total Fat||0.26 g||1%|
|Dietary Fiber||1.70 g||4%|
|Pantothenic acid||0.218 mg||4%|
|Vitamin A||950 IU||32%|
|Vitamin C||60.9 mg||102%|
|Vitamin E||0.30 mg||2%|
|Vitamin K||2.6 µg||2%|
Papaya Health Benefits.
Papaya is rich in fibre, Vitamin C and antioxidants which prevent cholesterol build up in your arteries. Too much cholesterol build-up can lead to several heart diseases including heart attack and hypertension.
Papayas have been known to be effective against rheumatoid arthritis and osteoarthritis. One of the enzymes found in papayas, called chymopapain, has a significant effect on controlling rheumatoid arthritis and osteoarthritis.
Papaya consumption has also been linked an improvement in the immune system of the body. Research proofs that the antioxidants present in papaya play an important role in improving the immunity of people. Also the flowers and roots of the plant have been proven to be beneficial against jaundice, bronchitis, kidney colic, and other illnesses.
Those looking to lose weight must include papaya in their diet as it is very low in calories. The fibre content in papaya leaves you feeling full and also clears your bowel movement making your weight loss regime easier.
Helps In Aging:
All of us would love to stay young forever, but no one in this world has managed to do it. Still, healthy habits like eating a papaya daily will prolong the process and may make you look 5 years younger than you are. Papaya is rich in Vitamin C, Vitamin E and antioxidants like beta-carotene which helps prevent your skin from free radical damage keeping wrinkles and other signs of ageing at bay.
It is a rich source of antioxidants, phytonutrients and flavonoids that prevent your cells from undergoing free radical damage. Some studies have also linked the consumption papaya to reduced risk of colon and prostate cancer.
The presence of folate, vitamin C, and vitamin E in papayas reduces motion sickness by producing a tonic effect in the stomach and in the intestines. Papaya juice and the ripened form of papaya also aid in digestion. The fiber obtained from the fruit helps increase bowel movements. Improved bowel movements help ease the passage of stool, thereby reducing the effects of constipation.
Papaya juice can be of great help for women with irregular menses. Consumption of green, unripe papayas can normalize the irregularity in one’s periodic cycle. they are considered as a ‘hot food’, meaning that they produce heat in the body. This excessive production of heat in the body stimulates the estrogen hormone. This induces periods in the females. Hence, papayas can be beneficial in handling difficult menses.
Boosts your immunity:
Good for diabetics:
Papaya for your eyes Health:
Papaya is rich in Vitamin A which helps protect your vision from degenerating. Nobody wants to lose their ability to see due to diseases like age-related macular degeneration, and eating papayas will ensure that you do not see a day where you cannot see.
Add papaya to your daily menu to stay energized and top in health, Papaya health health benefits and nutritional values has placed it above other fruits. Papaya will give you the required daily nutritional values (DVN) to maintain a healthy line of life.
However, consult your health officer before you embark on any medical applications. |
There are quite a few idioms using the words arms, hands and fingers. Although giving a comprehensive list of all of these expressions is beyond the scope of this post, it does provide an overview of the most popular among them.
All hands on deck
Used to imply that a given circumstance requires everyone’s participation or attention
When you are all thumbs and no fingers, you are very clumsy. In other words, you lack the dexterity to handle things properly.
Have something at hand
When you have something at hand, it is easily accessible to you.
Be hand in hand
When two or more people are hand in hand, they work in close association.
A backhanded compliment
A backhanded compliment is a remark that denigrates the recipient. The expression a left-handed compliment also means the same.
Be in safe (or good) hands
When you are in safe or good hands, you are in a secure position.
Be on hand
When you are on hand, you are available when your service is needed.
Bite the hand that feeds you
To bite the hand that feeds you is to be ungrateful to a person who has helped you in the past.
The devil makes work for idle hands / An idle mind is a devil’s workshop
Used to imply that if a person does not occupy himself with meaningful activities, he will soon find himself indulging in illicit behaviour
Did not lift a finger
Used to criticize people for not helping you |
Choosing the replacement bulb only by their wattage is no longer a easy task like in the old times when the incandescent bulbs were the only option, and everyone understood the bulb brightness by wattages like 60 watt, 80 watt or 100 watt.
The WATTS is a measure of the amount of energy used by bulbs and the LUMENS is the measure of brightness provided by a light bulb (more lumens, the brighter the bulb is)
Starting with energy efficient bulbs coming along in the market, the most crucial step in understanding the amount of light generated by the energy saving light bulbs like CFL Bulbs and LED is to understand the Lumens
Beginning with 2012 FTC required for the light bulbs labels to Emphasize on Lumens, Not Watts, as a Measure of Bulb Brightness
In general a simple rule to replace an incandescent with an equivalent in light output CFL bulb is to select the CFL bulb that have 1/4 watts compared with the replaced incandescent bulb. So for example if you are looking for replacing a 60w incandescent bulb than the right CFL bulb will need to be a 15 watt bulb.
While the math for the CFL bulbs is simple, the LED bulbs are even more energy-efficient and more durable than compact fluorescent light bulb. LED requires less wattage than CFL for the same amount of light.
On the left side is the comparison table for the most common light bulbs used in the households, useful in selecting the right replacement lamp for your application. |
Land is life
MANILA, Philippines - The original inhabitants of a territory usually do not have land titles to prove ownership of their ancestral domains.
Because of this, many IP communities are displaced.
On April 24, 1980, Philippine Army soldiers open-fired at two houses in the village of Bugnay, Tinglayan, Kalinga.
The attack instantly killed Macli’ing Dulag, a respected pangat (tribal chieftain) of the Butbut tribe.
The soldiers were later convicted and the day of the attack declared as Cordillera Day to celebrate the memory of Macli’ing.
The story of how Macli’ing Dulag led the fight to defend the ancestral lands of the Bontok and Kalinga peoples was told again by Dr. Nestor T. Castro, Chair of the University of the Philippines Anthrolopogy Department, during his talk last August at the Lopez Museum.
Dr. Castro recalled that Macli’ing was a target because he led the Kalinga and Bontok peoples in a fight to oppose the construction of the National Power Corporation’s Chico River Basin Hydroelectric Dam Project of the late dictator Ferdinand Marcos.
Because of this proposed project, 2,753 hectares of land would have been submerged, displacing numerous Kalinga and Bontok peoples.
“For the Kalingas and most of the indigenous peoples (IPs) of the Philippines, land is a source of life,” Dr. Castro explains. “It is sacred because it is nourished by the blood of ancestors and protected by their spirits.”
The way the IPs view land is different from how modern Pinoys see it: as property bought for investment or use, to be disposed of at will.
Nikki Luna, visual artist and founder of Start Art Project, a non-profit organization that gives art workshops for the women and youth victims of armed conflict and human rights violations, also delivered a short talk during the event.
She shared about how she uses art as a tool to directly help the victims of human rights violations, political prisoners and those who are caught in conflict.
As someone who has been in contact with members of indigenous peoples' communities for some time, Luna understands that these Filipinos will always defend their lands and their rights because they are truly attached to their lands.
“They don’t want money,” she says, “They want to grow their crops because they believe that as long as you plant something, no one will go hungry.”
Beat, Luna’s exhibit then in the Lopez Museum tackled the issue of land ownership. In an installation titled “Soil” for instance, she collected soil from 7 IP areas in Mindanao and placed them in jewelry boxes. This is from areas that are highly militarized because of the presence of mining operators.
“For the children there, the land they step on is their jewel; it was theirs way before other people came and they have nothing else,” Luna explains. “They only want their land back.”
Luna uses her art to make people think and question their own beliefs. “As an artist, I’ve always wanted to create art that tells something about our current times,” she shares, “Art is a tool to make people think about where they stand in (any) issue.”
The most common factors that displace IPs, according to Dr. Castro, are:
- Forestry or logging projects
- Hydropower projects
- Armed conflict between the military and rebel groups
The Philippines’ Indigenous People’s Rights Act (IPRA) declares that IPs have rights, and that the customary laws of the place should be respected and treated as part of the laws of the land.
“There is a need to document these (customary) laws so that outsiders will become familiar with these laws,” he says.
For most — if not all — of the IPs of the Philippines, land is life.
Their natural environment is deeply embedded into their culture and their identity.
The IPs believe that people are not the owners of land, but only its steward.
In the words of Dulag himself, “How can you own that which will outlive you?” - Rappler.com |
Miss Caroline, Scout's first grade teacher, scolds Scout because she already knows how to read. "Your father does not know how to teach" (24) Miss Caroline pronounces of Atticus. She forbids Scout from reading with Atticus and begins the year upset with, perhaps, her smartest student. Miss Caroline is new to Maycomb so she doesn't know any of the students, their families, or their family's eccentricities...
If at our website you can not find any essay you need for your study, you can order a paper on any topic with us.
Our company employs only qualified writers that are Master's and PhD holders.
Order custom written essay
Research papers are written by professional writers
Requirements are always met
Posibility to control the working process of your paper
A chance of becoming the best student in your class.
Miss Caroline is new to Maycomb so she doesn't know any of the students, their families, or their family's eccentricities. Determined to help her learn Maycomb's ways and egged on by her fellow students, Scout offers Miss Caroline pointers on how to get along with folks such as Walter Cunningham.
Miss Caroline offers a quarter to Walter (whose father's name is also Walter Cunningham) who did not bring a lunch to school with him... |
A copolymer is a polymer derived from more than one species of monomer. The polymerization of monomers into copolymers is called copolymerization. Copolymers obtained by copolymerization of two monomer species are sometimes called bipolymers. Those obtained from three and four monomers are called terpolymers and quaterpolymers, respectively.
Commercial copolymers include acrylonitrile butadiene styrene (ABS), styrene/butadiene co-polymer (SBR), nitrile rubber, styrene-acrylonitrile, styrene-isoprene-styrene (SIS) and ethylene-vinyl acetate, all formed by chain-growth polymerization. Another production mechanism is step-growth polymerization, used to produce the nylon-12/6/66 copolymer of nylon 12, nylon 6 and nylon 66, as well as the copolyester family.
Since a copolymer consists of at least two types of constituent units (also structural units), copolymers can be classified based on how these units are arranged along the chain. Linear copolymers consist of a single main chain, and include alternating copolymers, statistical copolymers and block copolymers. Branched copolymers consist of a single main chain with one or more polymeric side chains, and can be grafted, star shaped or have other architectures.
The reactivity ratio of a growing copolymer chain terminating in a given monomer is the ratio of the reaction rate constant for addition of the same monomer and the rate constant for addition of the other monomer. That is, and , where for example is the rate constant for propagation of a polymer chain ending in monomer 1 (or A) by addition of monomer 2 (or B).
The composition and structural type of the copolymer depend on these reactivity ratios r1 and r2 according to the Mayo–Lewis equation, also called the copolymerization equation or copolymer equation, for the relative instantaneous rates of incorporation of the two monomers.
that has at least one feature which is not present in the adjacent portions.
Note: Where appropriate, definitions relating to macromolecule may also be applied to block.
Block copolymers comprise two or more homopolymer subunits linked by covalent bonds. The union of the homopolymer subunits may require an intermediate non-repeating subunit, known as a junction block. Diblock copolymers have two distinct blocks; triblock copolymers have three. Technically, a block is a portion of a macromolecule, comprising many units, that has at least one feature which is not present in the adjacent portions. A possible sequence of repeat units A and B in a triblock copolymer might be ~A-A-A-A-A-A-A-B-B-B-B-B-B-B-A-A-A-A-A~.
Block copolymers are made up of blocks of different polymerized monomers. For example, polystyrene-b-poly(methyl methacrylate) or PS-b-PMMA (where b = block) is usually made by first polymerizing styrene, and then subsequently polymerizing methyl methacrylate (MMA) from the reactive end of the polystyrene chains. This polymer is a "diblock copolymer" because it contains two different chemical blocks. Triblocks, tetrablocks, multiblocks, etc. can also be made. Diblock copolymers are made using living polymerization techniques, such as atom transfer free radical polymerization (ATRP), reversible addition fragmentation chain transfer (RAFT), ring-opening metathesis polymerization (ROMP), and living cationic or living anionic polymerizations. An emerging technique is chain shuttling polymerization.
The synthesis of block copolymers requires that both reactivity ratios are much larger than unity (r1 >> 1, r2 >> 1) under the reaction conditions, so that the terminal monomer unit of a growing chain tends to add a similar unit most of the time.
The "blockiness" of a copolymer is a measure of the adjacency of comonomers vs their statistical distribution. Many or even most synthetic polymers are in fact copolymers, containing about 1-20% of a minority monomer. In such cases, blockiness is undesirable. A block index has been proposed as a quantitative measure of blockiness or deviation from random monomer composition.
An alternating copolymer has regular alternating A and B units, and is often described by the formula: -A-B-A-B-A-B-A-B-A-B-, or -(-A-B-)n-. The molar ratio of each monomer in the polymer is normally close to one, which happens when the reactivity ratios r1 and r2 are close to zero, as can be seen from the Mayo–Lewis equation. For example, in the free-radical copolymerization of styrene maleic anhydride copolymer, r1 = 0.097 and r2 = 0.001, so that most chains ending in styrene add a maleic anhydride unit, and almost all chains ending in maleic anhydride add a styrene unit. This leads to a predominantly alternating structure.
A step-growth copolymer -(-A-A-B-B-)n- formed by the condensation of two bifunctional monomers A–A and B–B is in principle a perfectly alternating copolymer of these two monomers, but is usually considered as a homopolymer of the dimeric repeat unit A-A-B-B. An example is nylon 66 with repeat unit -OC-( CH2)4-CO-NH-(CH2)6-NH-, formed from a dicarboxylic acid monomer and a diamine monomer.
Periodic copolymers have units arranged in a repeating sequence. For two monomers A and B, for example, they might form the repeated pattern (A-B-A-B-B-A-A-A-A-B-B-B)n.
In statistical copolymers the sequence of monomer residues follows a statistical rule. If the probability of finding a given type monomer residue at a particular point in the chain is equal to the mole fraction of that monomer residue in the chain, then the polymer may be referred to as a truly random copolymer (structure 3).
Statistical copolymers are dictated by the reaction kinetics of the two chemically distinct monomer reactants, and are commonly referred to interchangeably as “random” in the polymer literature. As with other types of copolymers, random copolymers can have interesting and commercially desirable properties that blend those of the individual homopolymers. Examples of commercially relevant random copolymers include rubbers made from styrene-butadiene copolymers and resins from styrene-acrylic or methacrylic acid derivatives. Copolymerization is particularly useful in tuning the glass transition temperature, which is important in the operating conditions of polymers; it is assumed that each monomer occupies the same amount of free volume whether it is in a copolymer or homopolymer, so the glass transition temperature (Tg) falls between the values for each homopolymer and is dictated by the mole or mass fraction of each component.
A number of parameters are relevant in the composition of the polymer product; namely, one must consider the reactivity ratio of each component. Reactivity ratios describe whether the monomer reacts preferentially with a segment of the same type or of the other type. For example, a reactivity ratio that is less than one for component 1 indicates that this component reacts with the other type of monomer more readily. Given this information, which is available for a multitude of monomer combinations in the “Wiley Database of Polymer Properties”, the Mayo-Lewis equation can be used to predict the composition of the polymer product for all initial mole fractions of monomer. This equation is derived using the Markov model, which only considers the last segment added as affecting the kinetics of the next addition; the Penultimate Model considers the second-to-last segment as well, but is more complicated than is required for most systems. When both reactivity ratios are less than one, there is an azeotropic point in the Mayo-Lewis plot. At this point, the mole fraction of monomer equals the composition of the component in the polymer.
There are several ways to synthesize random copolymers. The most common synthesis method is free radical polymerization; this is especially useful when the desired properties rely on the composition of the copolymer rather than the molecular weight, since free radical polymerization produces relatively disperse polymer chains. Free radical polymerization is less expensive than other methods, and produces high-molecular weight polymer quickly. Several methods offer better control over dispersity. Anionic polymerization can be used to create random copolymers, but with several caveats: if carbanions of the two components do not have the same stability, only one of the species will add to the other. Additionally, anionic polymerization is expensive and requires very clean reaction conditions, and is therefore difficult to implement on a large scale. Less disperse random copolymers are also synthesized by ″living″ controlled radical polymerization methods, such as atom-transfer radical-polymerization (ATRP), nitroxide mediated radical polymerization (NMP), or Reversible addition−fragmentation chain-transfer polymerization (RAFT). These methods are favored over anionic polymerization because they can be performed in conditions similar to free radical polymerization. The reactions require longer experimentation periods than free radical polymerization, but still achieve reasonable reaction rates.
In stereoblock copolymers the blocks or units differ only in the tacticity of the monomers.
In gradient copolymers the monomer composition changes gradually along the chain.
There are a variety of architectures possible for nonlinear copolymer. Beyond grafted and star polymers discussed below, other common types of branched copolymers include brush copolymers and comb copolymers.
Graft copolymers are a special type of branched copolymer in which the side chains are structurally distinct from the main chain. Typically the main chain is formed from one type of monomer (A) and branches are formed from another monomer (B), or else the side-chains have constitutional or configurational features that differ from those in the main chain.
The individual chains of a graft copolymer may be homopolymers or copolymers. Note that different copolymer sequencing is sufficient to define a structural difference, thus an A-B diblock copolymer with A-B alternating copolymer side chains is properly called a graft copolymer.
For example, polystyrene chains may be grafted onto polybutadiene, a synthetic rubber which retains one reactive C=C double bond per repeat unit. The polybutadiene is dissolved in styrene, which is then subjected to free-radical polymerization. The growing chains can add across the double bonds of rubber molecules forming polystyrene branches. The graft copolymer is formed in a mixture with ungrafted polystyrene chains and rubber molecules.
As with block copolymers, the quasi-composite product has properties of both "components". In the example cited, the rubbery chains absorb energy when the substance is hit, so it is much less brittle than ordinary polystyrene. The product is called high-impact polystyrene, or HIPS.
Star copolymers have several polymer chains connected to a central core.
Block copolymers (but not exclusively) are interesting because they can "microphase separate" to form periodic nanostructures, as in the styrene-butadiene-styrene block copolymer shown at right. The polymer is known as Kraton and is used for shoe soles and adhesives. Owing to the microfine structure, the transmission electron microscope or TEM was needed to examine the structure. The butadiene matrix was stained with osmium tetroxide to provide contrast in the image. The material was made by living polymerization so that the blocks are almost monodisperse, so helping to create a very regular microstructure. The molecular weight of the polystyrene blocks in the main picture is 102,000; the inset picture has a molecular weight of 91,000, producing slightly smaller domains.
Microphase separation is a situation similar to that of oil and water. Oil and water are immiscible - they phase separate. Due to incompatibility between the blocks, block copolymers undergo a similar phase separation. Because the blocks are covalently bonded to each other, they cannot demix macroscopically as water and oil. In "microphase separation" the blocks form nanometer-sized structures. Depending on the relative lengths of each block, several morphologies can be obtained. In diblock copolymers, sufficiently different block lengths lead to nanometer-sized spheres of one block in a matrix of the second (for example PMMA in polystyrene). Using less different block lengths, a "hexagonally packed cylinder" geometry can be obtained. Blocks of similar length form layers (often called lamellae in the technical literature). Between the cylindrical and lamellar phase is the gyroid phase. The nanoscale structures created from block copolymers could potentially be used for creating devices for use in computer memory, nanoscale-templating and nanoscale separations. Block copolymers are sometimes used as a replacement for phospholipids in model lipid bilayers and liposomes for their superior stability and tunability.
Polymer scientists use thermodynamics to describe how the different blocks interact. The product of the degree of polymerization, n, and the Flory-Huggins interaction parameter, , gives an indication of how incompatible the two blocks are and whether or not they will microphase separate. For example, a diblock copolymer of symmetric composition will microphase separate if the product is greater than 10.5. If is less than 10.5, the blocks will mix and microphase separation is not observed. The incompatibility between the blocks also affects the solution behavior of these copolymers and their adsorption behavior on various surfaces.
Block (co)polymers are able to self-assemble in selective solvents, to form micelles among other structures.
In thin films, block (co)polymers are of great interest as masks in the lithographic patterning of semiconductor materials for applications in high density data storage. A key challenge is to minimise the feature size and much research is in progress on this
Copolymerization is used to modify the properties of manufactured plastics to meet specific needs, for example to reduce crystallinity, modify glass transition temperature, control wetting properties or to improve solubility. It is a way of improving mechanical properties, in a technique known as rubber toughening. Elastomeric phases within a rigid matrix act as crack arrestors, and so increase the energy absorption when the material is impacted for example. Acrylonitrile butadiene styrene is a common example.
- McNaught, A. D.; Wilkinson, A. (1996). "Glossary of basic terms in polymer science (IUPAC Recommendations 1996)". Pure and Applied Chemistry. 68: 2287–2311. doi:10.1351/goldbook.C01335. ISBN 978-0-9678550-9-7.
- Nylon-12/6/66 Copolymer Cosmetics Info. Find an Ingredient.
- Jenkins, A. D.; Kratochvíl, P.; Stepto, R. F. T.; Suter, U. W. (1996). "Glossary of Basic Terms in Polymer Science". Pure Appl. Chem. 68 (12): 2287–2311. doi:10.1351/pac199668122287.
- Cowie, J.M.G. (1991). Polymers: Chemistry and Physics of Modern Materials (2nd ed.). Blackie (USA: Chapman and Hall). pp. 104–106. ISBN 978-0-216-92980-7.
- Mayo, Frank R.; Lewis, Frederick M. (1944). "Copolymerization. I. A Basis for Comparing the Behavior of Monomers in Copolymerization; The Copolymerization of Styrene and Methyl Methacrylate". J. Am. Chem. Soc. 66 (9): 1594–1601. doi:10.1021/ja01237a052.
- Jenkins, A. D.; Kratochvíl, P.; Stepto, R. F. T.; Suter, U. W. (1 January 1996). "Glossary of basic terms in polymer science (IUPAC Recommendations 1996)". Pure and Applied Chemistry. 68 (12): 2287–2311. doi:10.1351/pac199668122287.
- Cowie, p.4
- Hadjichristidis N., Pispas S., Floudas G. Block copolymers: synthetic strategies, physical properties, and applications – Wiley, 2003.
- Fried, Joel R. (2003). Polymer Science and Technology (2nd ed.). Prentice Hall. pp. 41–43. ISBN 978-0-13-018168-8.
- Chum, P. S.; Swogger, K. W. (2008). "Olefin Polymer Technologies-History and Recent Progress at the Dow Chemical Company". Progress in Polymer Science. 33: 797–819. doi:10.1016/j.progpolymsci.2008.05.003.
- Shan, Colin Li Pi; Hazlitt, Lonnie G. (2007). "Block Index for Characterizing Olefin Block Copolymers". Macromol. Symp. 257: 80–93. CiteSeerX 10.1.1.424.4699. doi:10.1002/masy.200751107.
- Painter P. C. and Coleman M. M., Fundamentals of Polymer Science, CRC Press, 1997, p 14.
- Chanda, M. Introduction to Polymer Science and Chemistry. Second Edition. CRC Press, 2013.
- Overberger, C. ″Copolymerization: 1. General Remarks; 2: Selective Examples of Copolymerizations″. Journal of Polymer Science: Polymer Symposium 72, 67-69 (1985).
- Greenley, Robert. ″Free Radical Copolymerization Reactivity Ratios″. The Wiley Database of Polymer Properties. 2003. doi:10.1002/0471532053.bra007
- Ruchatz, Dieter; Fink, Gerhard (1998). "Ethene−Norbornene Copolymerization with Homogeneous Metallocene and Half-Sandwich Catalysts: Kinetics and Relationships between Catalyst Structure and Polymer Structure. 3. Copolymerization Parameters and Copolymerization Diagrams". Macromolecules. 31 (15): 4681–3. Bibcode:1998MaMol..31.4681R. doi:10.1021/ma971043b. PMID 9680398.
- Cao, Ti and Stephen E. Webber. ″Free-Radical Copolymerization of Fullerenes with Styrene″. Macromolecules, 1996, 28, pp 3741-3743.
- Matyjaszewski, Krzysztof (1996). "Controlled radical polymerization". Current Opinion in Solid State and Materials Science. 1 (6): 769–776. Bibcode:1996COSSM...1..769M. doi:10.1016/S1359-0286(96)80101-X.
- Jenkins, A. D; Kratochvíl, P; Stepto, R. F. T; Suter, U. W (1996). "Glossary of basic terms in polymer science (IUPAC Recommendations 1996)". Pure and Applied Chemistry. 68 (12): 2287–2311. doi:10.1351/pac199668122287.
- Rudin, Alfred (1982). The Elements of Polymer Science and Engineering (1st ed.). Academic Press. p. 19. ISBN 978-0-12-601680-2.
- Hamley, I.W. "The Physics of Block Copolymers" – Oxford University Press, 1998.
- Hamley, I.W. "Developments in Block Copolymer Science and Technology" – Wiley, 2004.
- Gazit, Oz; Khalfin, Rafail; Cohen, Yachin; Tannenbaum, Rina (2009). "Self-assembled diblock copolymer "nanoreactors" as catalysts for metal nanoparticle synthesis". Journal of Physical Chemistry C. 113 (2): 576–583. doi:10.1021/jp807668h.
- Meier, Wolfgang; Nardin, Corinne; Winterhalter, Mathias (2000-12-15). "Reconstitution of Channel Proteins in (Polymerized) ABA Triblock Copolymer Membranes". Angewandte Chemie International Edition. Wiley. 39 (24): 4599–4602. doi:10.1002/1521-3773(20001215)39:24<4599::aid-anie4599>3.0.co;2-y. ISSN 1433-7851.
- Zhang, Xiaoyan; Tanner, Pascal; Graff, Alexandra; Palivan, Cornelia G.; Meier, Wolfgang (2012-03-11). "Mimicking the cell membrane with block copolymer membranes". Journal of Polymer Science Part A: Polymer Chemistry. Wiley. 50 (12): 2293–2318. doi:10.1002/pola.26000. ISSN 0887-624X.
- Bates, Frank S.; Fredrickson, Glenn H. (2014). "Block Copolymer Thermodynamics: Theory and Experiment". Annual Review of Physical Chemistry. 41: 525–557. Bibcode:1990ARPC...41..525B. doi:10.1146/annurev.pc.41.100190.002521. PMID 20462355.
- Chremos, Alexandros; Nikoubashman, Arash; Panagiotopoulos, Athanassios (2014). "Flory-Huggins parameter χ, from binary mixtures of Lennard-Jones particles to block copolymer melts". J. Chem. Phys. 140 (5): 054909. Bibcode:2014JChPh.140e4909C. doi:10.1063/1.4863331. PMID 24511981.
- Hershkovitz, Eli; Tannenbaum, Allen; Tannenbaum, Rina (2008). "Adsorption of block co-polymers from selective solvents on curved surfaces". Macromolecules. 41 (9): 3190–3198. Bibcode:2008MaMol..41.3190H. doi:10.1021/ma702706p. PMC 2957843. PMID 20976029.
- Hamley, I.W. "Block Copolymers in Solution" – Wiley, 2005.
- Hamley, IW (2009). "Ordering in Thin Films of Block Copolymers: Fundamentals to Potential Applications". Progress in Polymer Science. 34 (11): 1161–1210. doi:10.1016/j.progpolymsci.2009.06.003.
- Muzammil, Iqbal; Li, Yupeng; Lei, Mingkai (2017). "Tunable wettability and pH-responsiveness of plasma copolymers of acrylic acid and octafluorocyclobutane". Plasma Processes and Polymers. 14 (10): 1700053. doi:10.1002/ppap.201700053.
|Wikimedia Commons has media related to Copolymers.| |
While mapping out his genealogy of Ṣaḥīḥ al-Bukhārī, Ibn Ḥajar al-ʿAsqalānī (d. 852 AH) identifies nine routes of transmission from Muḥammad ibn Yūsuf al-Firabrī (d. 320 AH), the primary transmitter of the Ṣaḥīḥ from its author. These routes further multiply as the transmission spreads out in every successive generation. The invention of the printing press has allowed for the production of countless identical copies of a book with ease, but that is a privilege unheard of not too long ago. Hence, due to a range of factors related to methodology, memory, comprehension, attendance, and scribal oversight, the recensions of the Ṣaḥīḥ naturally differed in their details. In the 7th century AH, one Levantine scholar set out to collate the variants of the major recensions to produce the most accurate rendition of the work.
The legendary audition of Ṣaḥīḥ al-Bukhārī in Damascus around the year 666 AH headed by the renowned Ḥadīth scholar, Sharaf al-Dīn al-Yūnīnī (d. 701 AH), with the aid of the celebrated linguist, Ibn Mālik (d. 672 AH), in a gathering of scholars who utilized critically acclaimed manuscripts of the Ṣaḥīḥ for cross-referencing is an awe-inspiring episode of literature preservation in human history. Al-Yūnīnī’s role in latter-day scholarship on the Ṣaḥīḥ by collating the variants of its major recensions into one manuscript cannot be overemphasized. Starting with al-Yūnīnī’s biography, this article will explore this phenomenal project on the Ṣaḥīḥ. Three folios from manuscripts related to the Yūnīniyyah have been appended for the purpose of illustration.
Born in the year 621 AH, Abū al-Ḥusayn Sharaf al-Dīn ʿAlī belonged to a scholarly family that hailed from a small town in the region of Baʿlabakk known as Yūnīn—hence, the sobriquet al-Yūnīnī. With the Reconquista in the West and the Mongol conquest of the Eastern Islamic lands, the political landscape during al-Yūnīnī’s day was highly turbulent. His father was Taqī al-Dīn al-Yūnīnī (d. 658 AH), a Hanbalī jurist and Ḥadith scholar, and his brother was the renowned historian Quṭb al-Dīn al-Yūnīnī (d. 726 AH). Naturally, his educational upbringing was exceptional. From a tender age, he frequented the gatherings of experts and enjoyed the tutelage of over seventy teachers. In the constant pursuit of education, he traveled repeatedly to hubs of knowledge like Damascus and Egypt where he studied under Ibn al-Ṣalāḥ (d. 643 AH) and al-Mundhīrī (d. 656 AH), respectively.
It goes without saying that his prominence in the field of Ḥadīth drew countless students to his study circle. Notable among his lengthy list of students are Taqī al-Dīn Ibn Taymiyyah (d. 728 AH), al-Qāsīm al-Birzālī (d. 739 AH), and Shams al-Dīn al-Dhahabī (d. 748 AH). Without exception, his biographers only have positive things to say about him. Al-Ṣafadī (d. 764 AH) describes him as “unparalleled” and al-Dhahabī states that he was “the teacher of the scholars.” His oeuvre comprises merely of a Mashyakhah and a collection of elevated ḥadīths, but his major contribution to the academic world was his extraordinary work on Ṣaḥīḥ al-Bukhārī. In the span of one year, he cross-referenced the Ṣaḥīḥ with its various recensions and then dictated the entire work eleven times.
On Friday the 5th of Ramaḍān, 701 AH, after entering a local library, al-Yūnīnī was physically assaulted by a deranged assailant, which eventually led to his demise several days later at the age of 80. Having received his first authorization as early as four and spent his final days surrounded by books, al-Yūnīnī’s life was a personification of the famous adage: acquire knowledge from the cradle to the grave—Allah have mercy on his soul.
Al-Yūnīnī’s Project on the Ṣaḥīḥ
Around the year 666 AH in Damascus, al-Yūnīnī convened a gathering of scholars over 71 sessions in order to prepare a critically evaluated manuscript of Ṣaḥīḥ al-Bukhārī. For this purpose, al-Yūnīnī obtained five valuable manuscripts (nuskhahs) of the Ṣaḥiḥ, making one of them the mother-text and alluding to variations in the remainder through symbols. By stipulating one manuscript as the mother-text, al-Yūnīnī did not make changes to the main text even if he deemed an alternative variant to be more accurate, in which case he noted the variant in the margins and then marked it as more accurate. He prefaces his work with an introduction where he outlines his modus operandi.
The mother-text was based on ʿAbd al-Ghanī al-Maqdisī’s manuscript, which in turn used Abū al-Waqt’s manuscript as an exemplar and contained other variants. Until the 9th century, al-Maqdisī’s manuscript was the most authoritative for the Levantines, with attendance signatures from al-Mundhirī (d. 656 AH), al-Dhahabī, and al-ʿAlāʾī (d. 761 AH). Al-Yūnīnī had Ibn Zayd (d. 702 AH), a qualified scribe known for his calligraphic handwriting, pen a copy of this manuscript to use as the mother-text for the aforementioned cross-analysis. The following manuscripts were then utilized to note variants:
- Abū Dharr al-Harawī (d. 434 AH), for which he used the symbol hā’. Given that Abū Dharr narrates via al-Mustamlī (d. 376 AH), al-Ḥammuwayh (d. 381 AH), and al-Kushmīhanī (d. 389 AH) from al-Firabrī, further symbols distinguish the source of the variant.
- ʿAbd Allāh al-Aṣīlī (d. 392 AH) via Abū Zayd al-Marwazī (d. 371 AH) from al-Firabrī, for which he used the symbol ṣād.
- Ibn ʿAsākir (d. 571 AH) via multiple routes leading back to al-Firabrī, for which he used the symbol sīn.
- Abū Saʿd al-Samʿānī (d. 562 AH) via Abū al-Waqt (d. 553 AH) via al-Dāwūdī (d. 467 AH) via al-Ḥammuwayh from al-Firabrī, for which he used the symbol ẓāʾ, interestingly on account of al-Samʿānī’s precision and phenomenal memory (ḥifẓ).
Other symbols include lā to indicate the omission of something in a given source and ṣād/ḥā’ to show the preferability of a variant. By way of illustration, some of the variants in figure 1 are noted as follows: hā’ and sīn (Abū Dharr and Ibn ʿAsākir) contain rasūl Allāh instead of al-nabī; ṣād (al-Aṣīlī) contains akhbaranā instead of akhbaranī; and hā’, ṣād, sīn, ṭā (Abū Dharr, al-Aṣīlī, Ibn ʿAsākir, and Abū al-Waqt) omit hādhā and this is accompanied by ṣād/ḥā’ (i.e., the most accurate version). It is worth noting that Abū Dharr collating the variants of his three teachers from al-Firabrī into one manuscript is the first attempt at doing what, centuries later, al-Yūnīnī’s project aimed to accomplish, albeit in a much larger scale.
Ibn Mālik’s Role
As part of his project, al-Yūnīnī’s sought the expertise of Ibn Mālik (d. 672 AH), the celebrated Andalusian grammarian, who attended the sessions, playing a crucial role in explicating abstruse linguistic issues. On the nature of Ibn Mālik’s role, al-Yūnīnī, who was the primary reciter, writes in his concluding remarks that the cross-analysis and amendments were completed in the presence of Ibn Mālik, who “keenly observed my recitation and acutely noted my enunciation. I amended and marked as authoritative whatever he selected, preferred, and corrected. And I marked the words that he said lend themselves to two or three desinential inflections (iʿrāb) per his instruction and preference.”
Ibn Mālik writes, “Whenever they came across a complicated passage, I explained what I deemed correct and vowelized it based on my knowledge of Arabic.” Passages that required detailed grammatical exegesis were relegated to an independent treatise entitled “Shawāhid al-Tawḍīḥ wa al-Taṣḥīḥ li Mushkilāt al-Jāmiʿ al-Ṣaḥīḥ.” The said treatise comprises 71 sections based on the number of sessions he supervised. For instance, under section 27 on the ḥadīth about hastening funerals so that the deceased may immediately receive their compensation, Ibn Mālik states that the pronoun in ilayhā should be masculine (i.e., ilayhi) because it refers back to the word khayr. Citing Qurʿānic verses, ḥadīths, and Arabic poetry, he explains that it is grammatically correct to use a feminine pronoun to refer back to a masculine word when what is intended is feminine. Although the word khayr is masculine, what is intended is raḥmah, ḥusnā, or yusrā, all of which are feminine.
As is clear from a close reading of Shawāhid al-Tawḍīḥ and his comments noted in the margins of al-Yūnīnī’s manuscript, Ibn Mālik did not alter any alleged grammatical errors in the text of Ṣaḥīḥ al-Bukhārī. He only vowelized and explicated abstruse passages. Even passages that ostensibly conflicted with conventional grammar laws, once proven that they were part of the transmission, he provided explanations for them. That being said, not every passage ostensibly conflicted with conventional grammar laws. In many instances, he simply presented the grammatical origins of passages that already conformed to these laws, highlighted points of disagreement among grammarians, and used certain passages as a pretext to elucidate concepts that were not adequately addressed in other books.
Subsequent Scholarship on the Exemplar
During and after al-Yūnīnī’s lifetime, his manuscript was accessible and countless secondary copies were written. It was then transferred as an endowment to the Mamlūk official ʿAlāʾ al-Dīn Aqbughā’s (d. 843 AH) madrasah in Cairo, during which time al-Qasṭallānī (d. 923 AH) used it for his commentary on the Ṣaḥīḥ, Irshād al-Sārī. After remaining in the possession of Muḥammad al-Rūdānī (d. 1094 AH), the author of Jamʿ al-Fawāʾid, it passed into the hands of the Meccan Ḥadīth expert, ʿAbd Allah ibn Sālim al-Baṣrī (d. 1134 AH), who is on record for spending twenty years in meticulously refining and cross-referencing his personal copy of Ṣaḥīḥ al-Bukhārī with multiple manuscripts including the Yūnīniyyah.
In 1893 CE, the Ottoman Sultan, ʿAbd al-Ḥamīd II (d. 1918), issued an imperial decree to the Cairene publishing house al-Maṭbaʿah al-Amīriyyah to print a meticulously evaluated edition of the Ṣaḥīḥ. Using a range of invaluable manuscripts, particularly the Yūnīniyyah that was sent from the imperial library of Istanbul for this purpose, the project was complete by 1895 CE and the first edition of the work was released in nine volumes. A committee of 16 Ḥadīth scholars from al-Azhar—under the auspices of the Grand Shaykh of al-Azhar, Ḥassūnah al-Nawāwī—were then tasked with reviewing the work. It is uncertain whether the Yūnīniyyah remained in Cairo after the revision or was returned to Istanbul. Its exact whereabouts are currently unknown.
Be that as it may, there are multiple secondary copies of the manuscript on par or even superior to the original, as al-Qasṭallānī explains in respect to Muḥammad al-Ghazūlī’s (d. 777 AH) copy. Perhaps the most valuable secondary copy is that of Shihāb al-Dīn al-Nuwayrī (d. 733 AH), who had written with great accuracy at least eight copies of al-Yūnīnī’s manuscript. Another valuable and accessible secondary source is al-Qasṭallānī’s Irshād al-Sārī, which utilized both the original manuscript as well as excellent secondary copies.
Given that Ṣaḥīḥ al-Bukhārī plays such a pivotal role in documenting the ḥadīths of the Prophet (peace and blessings be upon him), it comes as no surprise that scholars have historically given unprecedented attention to maintaining its textual integrity. In the 7th century, the Damascene Ḥadīth expert, Sharaf al-Dīn al-Yūnīnī, carried out a unique project, ensuring that this task was accomplished in a manner that would adorn the annals of history. Al-Yūnīnī’s effort in preserving the various recensions of the Ṣaḥīḥ, and by extension the Ṣaḥīḥ itself, although highly laudable, is only part of successive, collective efforts by Muslim scholars since the students of al-Bukhārī to ensure that his magnum opus remains unadulterated. There is much that can be said about al-Yūnīnī’s project, but it is hoped that the foregoing discussion will help students to develop a basic understanding and appreciation of his efforts as well as subsequent scholarship that built upon his work.
Figure 1: Al-Nuwayrī’s 5th Handwritten Copy of the Yūnīniyyah
Ibn Ḥajar, Fatḥ al-Bārī, vol. 1, pp. 5-7.
On the nature and categories of these predominantly negligible differences, see ʿAbd al-Qādir Jalāl, Iʿlāʾ al-Bukhārī, pp. 65-71. The Cordoban Ḥadīth scholar, Abū ʿAlī al-Jayyānī (d. 498 AH), authored “Taqyīd al-Muhmal wa Tamyīz al-Mushkil” which is regarded as the most notable classical study on these variants. For a list of classical and contemporary studies on the variants between the recensions of the Ṣaḥīḥ, see Shifāʾ, Riwāyāt al-Jāmiʿ al-Ṣaḥīḥ li al-Imām al-Bukhārī: Riwāyat Abī Dharr Namūdhajan, pp. 30-35.
Although the town is famously known as Yūnīn, it also takes the name Yūnān. See al-Zabīdī, Tāj al-ʿArūs, vol. 36, p. 314.
Rosemarie Quiring-Zoche, “How al-Bukhārī’s Ṣaḥīḥ was Edited in the Middle Ages: ʿAlī al-Yūnīnī and His Rumūz,” Bulletin D’études Orientales, 50 (1998), p. 193.
Tadmurī, “Introduction,” in Mashyakhat Sharaf al-Dīn al-Yūnīnī, pp. 5-7.
Ibn Rajab, Dhayl ʿalā Ṭabaqāt al-Ḥanābilah, vol. 4, p. 332.
Al-Ṣafadī, Aʿyān al-ʿAṣr, vol. 3, p. 476.
Al-Dhahabī, al-Muʿjam al-Mukhtaṣṣ, pp. 168-69.
Tadmurī, “Introduction,” Mashyakhat Sharaf al-Dīn al-Yūnīnī, p. 27.
Al-Dhahabī, al-Muʿjam al-Mukhtaṣṣ, p. 169; idem, Muʿjam al-Shuyūkh al-Kabīr, vol. 1, p. 40.
Al-Dhahabī, Muʿjam al-Shuyūkh al-Kabīr, vol. 2, p. 40; Ibn Rajab, Dhayl ʿalā Ṭabaqāt al-Ḥanābilah, vol. 4, p. 332; Rosemarie, “How al-Bukhārī’s Ṣaḥīḥ was Edited in the Middle Ages,” p.196
His earliest teachers, al-Ḥasan al-Jawālīqī and Ibn Ghufayjah, both passed away in 625 AH. Therefore, he received his first authorization, albeit a general one, at latest by the age of four. See Jumuʿah, Riwāyāt al-Jāmiʿ al-Ṣaḥīḥ wa Nusakhuhu, p. 657. Given his age, he was obviously brought to these Ḥadīth sessions by his father. On the presence of children in Ḥadīth dictation sessions, see Davidson, Carrying on the Tradition: An Intellectual and Social History of Post-Canonical Hadīth Transmission, p. 95 f.
Linguistically, the word nuskhah refers to a copied manuscript. In the post-transmission phase, it is often used synonymous to the recensions (riwāyāt) of a book, e.g. Abū Dharr’s nuskhah of Ṣaḥīḥ al-Bukhārī. See Jumuʿah, Riwāyāt, p. 42.
By contrast, some latter-day scholars—like Ibn al-Sarrāj (d. 782 AH) and al-Biqāʿī (d. 885 AH) in their respective manuscripts—wrote authenticating manuscripts (nusakh al-taṣḥīḥ) where the objective is to establish the most accurate version of any given recension in the main text. Al-Yūnīnī’s methodology conforms to mainstream Ḥadīth scholarship. See al-ʿUtaybī, Kitāb Jabr, p. 335.
In his introduction, al-Yūnīnī explains that the mother-text for the cross-analysis was copied from the manuscript used for the authorization he received from his teacher Abū ʿAbd Allāh al-Ḥusayn al-Zabīdī in the citadel of Damascus in the year 630 AH. Abū Hāshim al-ʿUtaybī argues that the mother-text was copied from ʿAbd al-Ghanī al-Maqdisī’s manuscript, which in turn was copied from Abū al-Waqt’s manuscript and contained variants from other recensions. Based on the attendance signatures on al-Maqdisī’s manuscript, al-ʿUtaybī continues, it is clear that this was the manuscript al-Zabīdī utilized in 630 AH when teaching al-Yūnīnī. Hence, al-Zabīdī’s authorization of Ṣaḥīḥ al-Bukhārī described in al-Yūnīnī’s introduction was based on al-Maqdisī’s manuscript, and therefore, it was the source of the mother-text. See al-ʿUtaybī, Kitāb Jabr, pp. 68, 122, 163, 401; cf. Jumuʿah, Riwāyāt, p. 678. Since al-Zabīdī was authorized by Abū al-Waqt, using al-Maqdisī’s manuscript—i.e. not the manuscript he used when studying under Abū al-Waqt—would not be an issue because al-Maqdisī’s manuscript was copied from Abū al-Waqt’s manuscript.
Al-ʿUtaybī, Kitāb Jabr, pp. 29, 33, 122.
Ibid., pp. 9-10.
Al-Ṣafadī, Aʿyān al-ʿAṣr, vol. 4, p. 545.
Al-ʿUtaybī, Kitāb Jabr, pp. 29, 122.
This manuscript was also read to Karīmah al-Marwaziyyah (d. 463 AH) via al-Kushmīhanī from al-Firabrī. As such, it contains both the variants of Abū al-Waqt and Karīmah al-Marwaziyyah. See al-ʿUtaybī, Kitāb Jabr, p. 150; Jumuʿah, Riwāyāt, pp. 673, 679.
On al-Yūnīnī’s symbols, see al-Qasṭallānī, Irshād al-Sārī, vol. 1, p. 40; al-ʿUtaybī, Kitāb Jabr, pp. 145-53; Jumuʿāh, Riwāyāt, pp. 683-90.
The symbols ṭāʾ and ẓāʾ are used interchangeably. See Zuhayr Nāṣir, “Introduction,” in al-Jāmiʿ al-Musnad al-Ṣaḥīḥ, vol. 1, pp. 39, 45.
In her landmark study “Riwāyāt al-Jāmiʿ al-Ṣaḥīḥ li al-Imām al-Bukhārī: Riwāyat Abī Dharr Namūdhajan,” Dr. Shifāʾ ʿAlī studies the variants of Abū Dharr in detail. See, for instance, pp. 281 f.
Al-Qasṭallānī, Irshād al-Sārī, p. 40.
As recorded in Shihāb al-Dīn al-Nuwayrī’s (d. 733 AH) 5th copy of the Yūnīniyyah where these comments are originally found. See al-ʿUtaybī, Kitāb Jabr, p. 158.
Al-Qasṭāllānī quotes Ibn Mālik’s remarks from the margins of the Yūnīniyyah’s cover page. See Qasṭallānī, Irshād al-Sārī, vol. 1, p. 41; cf. al-ʿUtaybī, Kitāb Jabr, p. 161.
Ṭāhā Muḥsin, “Introduction,” in Shawāhid al-Tawḍīḥ, p. 13.
Ibn Mālik, Shawāhid al-Tawḍīḥ, p. 142-45.
Al-Qasṭallānī, Irshād al-Sārī, vol. 1, p. 40.
Ṭāhā Muḥsin, op. cit., pp. 15-16.
Al-Qasṭallānī writes that he completed his commentary on Ṣaḥīḥ al-Bukhārī using an impeccable secondary copy and the second part of the original; the first half of the Yūnīniyyah had been lost for 50 years. After completing his commentary, the lost portion resurfaced, so he used it to edit the relevant parts of his commentary. See Qasṭallānī, Irshād al-Sārī, vol. 1, p. 40; Aḥmad Shākir, al-Naqd li al-Nuskhah al-Yūnīniyyah min Ṣaḥīḥ al-Bukhārī, p. 9. In his commentary on Ṣaḥīḥ al-Bukhārī, at least in place Ibn Ḥajar al-ʿAsqalānī mentions that he consulted al-Yūnīnī’s manuscript for clarification. However, the extent of his usage and the nature of the copy he consulted require further study. See Ibn Ḥajar, Fatḥ al-Bārī, vol. 1, p. 224/ cf. vol. 10, p. 97; cf. al-Rayyān, al-Imām al-Yūnīnī wa Juhūduhū fī Ḥifẓ Ṣaḥīḥ al-Imām al-Bukhārī wa Taḥqīq Riwāyātihī, Majallat al-Jāmiʿah al-Islāmiyyah, vol. 10 (2002) p. 244.
Al-Manūnī, Ṣaḥīḥ al-Bukhārī fī al-Dirāsāt al-Maghribiyyah, Majjallat al-Lughah al-ʿArabiyyah, vol. 29 (1394 AH), p. 533; al-ʿUtaybī, Kitāb Jabr, pp. 231-32.
Al-Kattānī, Fahras al-Fahāris, vol. 1, p. 198; ʿAwwāmah, “Introduction,” in Sunan Abī Dāwūd, pp. 99-103. ʿAbd Allāh al-Baṣrī had written at least eight copies of the Ṣaḥīḥ. One of these manuscripts—some sources state that it was his commentary on the Ṣaḥīḥ, not the actual manuscript—was bought by Muḥmmad Asʿad al-Makkī, who sent it to Aurangabad, India. Another was in the possession of Ṭāhir Sunbul in Madīnah, which was used for the Amīriyyah edition. See al-Kattānī, Fahras al-Fahāris, vol. 1, p. 199; al-Ḥasanī, Nuzhat al-Khawāṭir, vol. 6, p. 802.
Al-Maṭbaʿah al-Amīriyyah was opened in 1820 CE in Būlāq, a district in Cairo, under the rule of Muḥammad Ali Pasha, the Ottoman Khedive of Egypt. Ownership of the press shifted over the decades as did the name. Prominent names include Maṭbaʿat Būlāq and Maṭbaʿat al-ʿĀmirah. See Iḥsānoghlū, al-Atrāk fī Miṣr wa Turāthuhum al-Thaqāfī, pp. 427-28.
It is difficult to say with absolute certainty that the manuscript used was al-Yūnīnī’s original or a secondary copy. Although al-Nawāwī’s introductory remarks to the Amīriyyah edition give the impression that the original was used, comments from the committee seem to suggest otherwise. See Aḥmad Shākir, al-Naqd, p. 11; Jumuʿah, Riwāyāt, pp. 694-95. Ṣalāḥ Fatḥī succinctly summarizes the various opinions, concluding that they definitely did not use the original Yūnīniyyah but rather important secondary sources like ʿAbd Allāh al-Baṣrī’s manuscript. See Ṣalāḥ Fatḥī, Taḥrīr al-Aṣl al-Muʿtamad dī al-Ṭabʿah al-Sulṭāniyyah, p. 15
Aḥmad Shākir, al-Naqd, pp. 11-12.
Aḥmad Shākir inclines to the position that it was returned to the imperial library in Istanbul. See ibid.
Al-Qasṭallānī, Irshād al-Sārī, vol. 1, p. 41.
Al-Ṣafadī, Aʿyān al-Aʿṣār, vol. 1, p. 281.
Recently, Dār al-Ghawthānī published a critically edited version of Irshād al-Sārī in 10 volumes with editorial work by Shaykh Zuhayr Nāṣir.
Even Franz Rosenthal referred to al-Yūnīnī’s work on Ṣaḥīḥ al-Bukhārī as a “masterpiece of Muslim theological scholarship.” See Rosenthal, The Technique and Approach of Muslim Scholarship, p. 27. |
Cold drugs send 7,000 U.S. children to ERs: study
By Maggie Fox, Health and Science Editor
WASHINGTON (Reuters) - Over-the-counter cough and cold drugs send an estimated 7,000 U.S. children under the age of 12 to emergency rooms every year, most for overdoses, the Centers for Disease Control and Prevention reported on Monday.
Because parents will continue to buy such drugs, better packaging might help protect young children, the researchers reported in the journal Pediatrics.
Two-thirds of the cases were children who took the drugs without supervision, but just under 26 percent were children who acted unusually sleepy, had an allergic reaction or other ill effect after a parent gave them the recommended dose, the CDC team found.
Evidence suggests parents want to give these drugs, including cough suppressants, antihistamines and decongestants, to their children, even though they have never been shown to benefit young children.
They cited a national survey that showed 64 percent of parents consider cough and cold medications to be safe and 20 percent plan to continue to give them to their children under 2 years, even though the U.S. Food and Drug Administration earlier this month "strongly recommended" against it.
"However, if these medications are removed from the market, caregivers may be tempted to substitute products that are labeled for use by older children and adults," the CDC team wrote.
Dr. Melissa Schaefer and colleagues looked at a nationally representative sample of 63 U.S. emergency departments in 2004 and 2005.
"Annually, an estimated 7,091 patients aged under 12 years were treated in emergency departments for adverse drug events from cough and cold medications, accounting for 5.7 percent of emergency department visits for all medications in this age group," they wrote.
More than 90 percent of the children were sent home quickly. The researchers did not look in-depth at the specific symptoms the children had.
Companies that make the drugs might consider changes to packaging to keep small children from getting into the medications, which are often flavored and colored to make them more appealing, Schaefer's team said.
"One packaging innovation is incorporating adaptors onto bottles of liquid medication such that medication can only be accessed with a needle-less syringe, which prevents unsupervised preschool-aged children from drinking directly from the bottle," they suggested.
"We had also considered the idea of taking coloring out of these medications," Schaefer said in a telephone interview.
"Parents need to be vigilant about keeping these medicines out of their children's reach," said Dr. Denise Cardo, director of CDC's Division of Healthcare Quality Promotion.
"They should refrain from encouraging children to take medicine by telling the children that medication is candy." Also, adults should avoid taking adult medications in front of young children, she said.
(Editing by Will Dunham) |
On 25 February 2021, the Chinese government announced that extreme poverty had been abolished in China, a country of 1.4 billion people. This historic victory is a culmination of a seven-decade-long process that began with the Chinese Revolution of 1949.
Dossier No. 42: Defending our sovereignty: U.S. military bases in Africa and the future of African unity
Neo-colonialism, Nkrumah noted, seeks to fragment Africa, weaken African state institutions, prevent African unity and sovereignty, and thereby insert its power to subordinate the aspirations of the continent for pan-African consolidation. |
Polynesia was one of the last places on Earth to be settled by humans, and new techniques reveal that this settlement first occurred within a 16 year window nearly 3000 years ago. The research, published November 7 in the open access journal PLOS ONE by David Burley and colleagues from Simon Fraser University, Canada, reveals that the first human settlers lived in a founder colony on the islands of Tonga between 2830 to 2846 years ago.
To arrive at this precise figure, the researchers used a high-precision technique to estimate the age of coral files that early settlers used to sculpt and smooth wood and shell surfaces. As Dr. Burley states, "This degree of precision is impossible using radiocarbon and other dating techniques. It provides significant new opportunities for our understanding of the exploration and settlement of the far distant islands spread across the South Pacific."
Burley D, Weisler MI, Zhao J-x (2012) High Precision U/Th Dating of First Polynesian Settlement. PLoS ONE 7(11): e48769. doi:10.1371/ journal.pone.0048769
Public Library of Science: http://www.plos.org
This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.
Claims that Ai Hin was faking pregnancy to get better treatment have been debunked by leading panda expert
The recent release of Susan Greenfields new book and the film Lucy, both of which are dependent on tired misconceptions or dubious theories about the brain, suggest one worrying conclusion: we are running out of myths about the brain. So here are some new ones, to keep things mysterious
These are the siphonophores, some 180 known species of gelatinous strings that can grow to 100 feet long, making them some of the longest critters on the planet. But instead of growing as a single body like virtually every other animal, siphonophores clone themselves thousands of times over into half a dozen different types of specialized cloned bodies, all strung together to work as a team---a very deadly team at that.
Researchers who study memory have had a thrilling couple of years. Some have erased memories in people with electroshock therapy, for example. Others have figured out, in mice, how to create false memories and even turn bad memories into good ones.
Hunting bats don't just listen out for male frogs' mating calls: they can also use echolocation to detect when the frogs inflate their throat sacs
A crèche of 30 dinosaur infants looked over by an older animal shows that even terrible lizards needed a night away from the kids
Families have identifiable collections of microbes that travel with them. It can take just 24 hours for the microbes to take over a new house
When rabbits were domesticated, around 100 regions of their genome changed to make them less fearful, but the variations are not fixed
Scientists never understood what became of the Paleo-Eskimos who once peopled the north. Now they know—and there's new reason to miss them
NOAA whittles down initial list of 66 species to be covered by Endangered Species Act |
|Back to Articles List|
Preparing for the SAT
None of us enjoy taking exams. Unfortunately, they are a necessary part of getting through high school and often a necessary part of college admissions processes. Almost all colleges and universities require that students submit standardized test (SAT or ACT) scores with their applications. This requirement can cause a lot of anxiety, but performing well on the SAT mainly just takes some practice and preparation. Students should give themselves plenty of time to become familiar with the structure of the tests.
There are a number of courses offered by different organizations to help students prepare for the SAT. However, these courses tend to be expensive and there are no guarantees that they will improve your score. The tips and strategies offered by prep courses are based on general assumptions and won't be helpful for everyone.
Although there is no surefire trick that will guarantee your high score, there are a number of useful tips and tools to help you perform well.
Here are a few things you can do to prepare for your exam:
1) Take the Preliminary SAT (PSAT/NMSQT"). It has the same type of questions and is a good way to prepare for the SAT I.
2) Do practice tests on real SATs. There are lots of books and software programs available with sample and old SATs for practice. There's no better way to get ready than to try the real thing.
3) Review your math textbooks from the last few years. If the information you learned is fresh in your mind, you'll perform better under pressure.
It is important to pace yourself, as each section has a time limit. However, it is equally important not to rush through the test, as you're more likely to make inaccurate guesses rather than thinking your way through.
To use your time effectively, flip through your section at the beginning to see what type of questions you have. (See "Know what to expect.")
The SAT is structured with a progression of questions from easy to medium to difficult. Each question is weighted equally, so don't spend too much time puzzling out the hard questions - make sure you focus on the easy and medium-difficulty questions and answer them first.
Many students circle the questions that they haven't answered. Then, if there is time before moving on to the next section, go back to the circled questions and give them a try.
Remember that you can move around within a section, but you are not allowed to jump back and forth between sections. You are also not allowed to return to earlier sections to change answers.
Predict the Answers
The best way to approach multiple choice questions is to cover the answer choices while you read the question. See if you can figure out what the answer should be before you look at the choices-that can save you time and keep you from second-guessing yourself.
If your answer isn't there, don't give up. On most multiple choice tests, there is one correct answer, one choice that seems like a possibility and is a bit tricky, and a couple "fluff" answers. If the correct answer doesn't come to you immediately, try to eliminate at least two choices, and guess between the remaining choices. Although there is a small penalty for wrong answers, it can still be to your advantage to guess.
Know what to expect
Learn the test directions ahead of time. If you already know what to expect on the test, you won't waste valuable time reading instructions rather than answering questions.
There are three types of verbal questions: analogies (19 questions), sentence completions (19 questions) and critical reading (40 questions); and three types of math questions: 5-choice multiple choice (35 questions), 4-choice quantitative comparisons (15 questions that emphasize the concepts of equalities, inequalities and estimation), and student-produced response (10 questions with no answer choices provided).
Analogy questions measure your:
Sentence completions measure your:
Critical reading questions measure your:
Math concepts you should know:
|Back to Articles List|
| Universities and Colleges
Agriculture and Bio-resources | Allied Health and Health Sciences | Applied Business Technology | Architecture
Business Administration | Computer Science | Cosmetology and Esthetics | Culinary, Travel &Hospitality | Dance
Engineering Technology & Applied Technology |Engineering | Film | Fine Arts and Design | Humanities and Liberal ArtsJustice and Security
Music | Natural and Applied Sciences | Naturopathic and Holistic MedicineNursingPublic Administration & PolicyReligious and Theological Studies
Sport Sciences and Physical Education | Teacher Education | Theatre
College News |
Copyright 2003- 2017 QuinStreet, Inc. All Rights Reserved. |
If you’ve ever donated or received blood, you know what an impactful thing it can be. Even if you haven’t, you’ve surely seen posts and commercials urging people to donate.
Just as humans sometimes need blood, so do dogs.
And, just like humans, they too can donate blood.
In a study done by VetRecord, it was found that 70% of pet owners were completely unaware they could donate their pet’s blood, while 89% said they’d allow their pet to do so if it were suitable.
You’re probably wondering what the process looks like.
Many veterinary schools have programs in which a dog can donate blood, but there are typically requirements the donor must meet, such as:
- Being current on vaccinations
- Being free of parasites
- Being free of any medications except those for heartworm and/or flea prevention
- Having no murmur in the heart
- Being the universal blood type
- Being healthy
- Being friendly
- Being of a certain age
If the dog meets those requirements, the blood is sent to be tested for infectious diseases.
So what happens during the actual blood draw? According to Petfinder, it's quite simple.
No anesthesia is required and the blood is taken from the jugular vein. The procedure takes a total of about 30 minutes.
Though your furry friend won’t be restricted from his normal everyday activities, it is suggested that you give him some rest and TLC.
It's worth noting that different areas may have varying requirements, but if you'd like to learn more about having your puppy pal donate blood, contact your local vet for more information.
Would you consider letting your dog donate blood? Have you done so in the past? Tell us about it in the comment section below.
[READ NEXT: Best movie theater ever? This cinema wants you to bring your dog along | Mama duck proudly struts new babies through nursing home -- again | 9 questions you’ve been too embarrassed to ask about CBD, answered] |
ᑕᖃᕐᒪᓂᕐᒥᒃ ᐊᓯᖏᓐᓂᒡᓗ ᐃᒃᐱᖕᓂᐊᓂᕐᓂᒃ ᑲᒪᑦᑎᐊᕐᓂᖅ
Managing Stress and Other Emotions
ᐃᓕᔅᓯᓐᓂ ᐅᑯᐊ ᐱᓕᕆᐊᕆᒃᑭᑦ!
Try these activities at home!
ᐱᓕᕆᖃᑎᒌᓪᓗᓯ ᓴᐃᓕᓇᖅᑐᓕᐅᕆᔅᓯ ᐃᓕᔅᓯᓐᓂ ᓱᕈᓯᕐᓄᑦ ᓴᐃᓕᕕᐅᔪᓐᓇᕐᓗᓂ, ᐃᓱᒪᕕᐅᔪᓐᓇᕐᓗᓂ, ᐃᒃᐱᖕᓂᐊᓂᖏᓐᓂᒡᓗ ᐅᔾᔨᕈᓱᕝᕕᐅᔪᓐᓇᕐᓗᓂ. ᓱᕈᓰᑦ ᑕᐃᑯᖖᒐᐃᔪᓐᓇᖅᑎᓪᓗᒋᑦ ᓴᐃᓕᓇᖅᑐᒧᑦ ᓴᐃᓕᔾᔪᑎᒋᔪᓐᓇᖅᑕᖏᓐᓂᒃ, ᓲᕐᓗ ᕿᐲᑦ, ᐊᑭᓰᑦ, ᐅᖃᓕᒫᒐᐃᑦ, ᐆᒪᔪᖖᒍᐊᑦ ᑲᐃᒻᒥᐊᒐᐃᑦ, ᐊᒥᐊᕆᔾᔪᑏᑦ, ᐊᔾᔨᖖᒍᖏᓐᓂᒡᓗ ᓇᒡᓕᒋᔭᖏᑕ.
ᐃᓗᖕᒧᑦ ᓂᐅᕐᔪᐊᖅᐸᓪᓗᑎᑦ ᓱᒃᑲᐃᑦᑐᒥᒃ. ᑕᑯᓐᓇᖖᒍᐊᕐᓗᑎ ᑎᒦᑦ ᑕᑕᑎᕐᓗᒍ ᐳᓪᓚᕐᒥ ᐳᕕᒐᖅᑎᑐᑦ. ᓯᓚᖕᒧᑦ ᐊᓂᖅᓵᓕᕐᒥᓗᑎᑦ ᓱᒃᑲᐃᓪᓗᑎᑦ. ᑎᒥᖕᓂ ᐳᓪᓚᖅ ᐊᓂᑎᑕᐃᓐᓇᕆᓗᒍ. ᐅᔾᔨᕆᕕᐅᒃ ᖃᓄᑎᒋ ᓴᐃᓪᓕᐊᓪᓚᒻᒪᖔᖅᐱᑦ. ᑕᐃᒪᐃᓕᐅᖏᓐᓇᕆᑦ ᐃᒃᐱᖕᓂᐊᓃᑦ ᐃᒃᐱᒋᕐᔪᐊᖅᑲᐅᔭᑎᑦ ᖄᖏᕋᓱᖕᓂᖏᓐᓂᒃ.
ᓯᑯᖖᒋᕐᓗᑎᑦ ᑎᒥᖕᓃᑦᑐᓕᒫᑦ ᓄᑮᑦ ᐃᓱᒪᒋᒃᑭᑦ. ᐊᐅᓚᑎᒃᑭᑦ ᓄᑭᓕᒫᑦ ᑎᒥᓐᓃᑦᑐᑦ ᓇᓪᓕᒃᑭᑕᕐᓗᒋᑦ, ᑮᓇᕐᓂᑦ ᐱᒋᐊᕐᓗᑎᑦ ᑕᐅᓄᖓ ᐃᓯᒐᖕᓄᑦ. ᐊᓂᖅᓵᖅᑐᕐᔪᐊᕐᓗᑎᑦ ᐃᓱᒪᑦᑕᐃᓕᒪᓗᑎᑦ ᑭᓱᓕᒫᑦᑎᐊᓂᒃ. ᑎᒥᓕᒫᑦᑎᐊᑦ ᓱᑲᑦᑐᐊᓘᑎᑲᐃᓐᓇᕈᒃ ᓈᓴᐃᓗᑎᑦ ᐱᖓᓱᓄᑦ ᓱᒃᑲᐃᓪᓗᑎᑦ, ᖃᓱᑎᓪᓗᒍ ᐊᓂᖅᓴᐅᒥᕐᔪᐊᕐᓗᑎᑦ. ᑎᒥᓐᓃᑦᑐᓕᒫᑦ ᓄᑮᑦ ᓱᑲᑎᑖᓗᒋᖃᑦᑕᒃᑭᑦ ᓇᓪᓕᒃᑭᑕᕐᓗᒋᑦ, ᖃᓱᑎᑉᐸᓪᓗᒋᑦ ᐊᓂᖅᓴᐅᒥᕐᔪᐊᕐᓗᑎᑦ. ᐊᓂᖅᓵᖅᑐᕐᔪᐊᕆᑦ ᓱᒃᑲᐃᓪᓗᑎᑦ ᐅᐃᕋᔮᓪᓗᑎᓪᓗ. ᖃᓄᖅ ᐃᒃᐱᖕᓂᐊᓕᖅᐱᑦ?
Create a Peace Place
Work together to create a quiet space in your home where children can relax, think, and reflect on their feelings. Encourage children to put things in the Peace Place that help them feel calm, such as comfortable blankets and pillows, books, stuffed toys, colouring supplies, or photos of loved ones.
Breathe in slowly and deeply. Imagine that you are filling your body up with air like a balloon. Then breathe out slowly. Let all the air out of your body. Notice how calm you feel after breathing deeply. Keep doing this until your strong emotions have passed.
Let It Go
Close your eyes and think about all the muscles in your body. Wiggle all the muscles in your body one by one, starting with your face and moving all the way down to your toes. Breathe deeply and try not to think about anything at all. Squeeze your whole body tight for three seconds, then let it go with a big, loud sigh. Squeeze all the muscles in your body tightly one by one, and then let them go with a big, loud sigh each time. Take three deep breaths and slowly open your eyes. How do you feel now?
ᐅᕝᕙ ᐅᑯᐊ ᐱᓕᕆᔾᔪᑎᑦ ᐊᑐᕈᓐᓇᖅᑕᑎᑦ ᕿᑐᕐᖓᓐᓄᑦ ᐃᒃᐱᖕᓂᐊᓂᕐᓂᒃ ᐅᖃᓪᓚᐅᑎᖃᖅᑎᓪᓗᑎᑦ.
Here are some resources that can help you talk with your children about the emotions they may be experiencing:
ᐊᑖᓂ, ᓇᕿᑐᐃᓐᓇᕆᐊᓕᖕᓂᒃ ᓇᓂᓯᓂᐊᖅᑐᑎᑦ ᐱᓕᕆᔾᔪᑎᓂᒃ ᓱᕈᓰᑦ ᐃᓕᓐᓂᐊᕈᓐᓇᕐᓂᐊᕐᒪᑕ ᐃᓱᐊᕐᓂᕐᒥᒃ ᖃᓄᐃᖏᓐᓂᕐᒥᒡᓗ ᐊᖏᕐᕋᒥ.
ᐊᐅᓪᓚᖅᓯᒪᓂᖅ ᓄᓇᒧᑦ, ᐊᖑᓇᓱᖕᓂᖅ, ᐃᖃᓪᓕᐊᕐᓂᖅ, ᒥᖅᓱᕐᓂᖅ, ᓴᐸᖖᒋᕆᓂᖅ, ᓂᕿᓕᕆᓂᕐᓗ ᐱᓕᕆᐊᖑᔪᓐᓇᕆᕗᑦ.
Below, you will find links and resources for students to learn about health and wellness at home.
Spending time on the land, hunting, fishing, sewing, beading, and preparing country food are also encouraged activities.
Kids Help Phone (COVID-19) ᓇᕿᑐᐃᓐᓇᕆᐊᓕᖃᕐᒥᔪᑦ ᑐᑭᓯᒋᐊᕈᑎᒃᓴᓂᒃ ᒪᒃᑯᒃᑐᓄᑦ ᐊᒃᓱᕉᓴᑐᐃᓐᓇᕆᐊᓕᖕᓄᑦ ᓄᕙᖕᓇᕐᔪᐊᖅ-19 ᐊᑐᖅᑎᓪᓗᒍ, ᓱᓕ 24/7 (ᐅᓪᓗᓕᒫᖅ ᐅᓐᓄᐊᓕᒫᖅ ᐱᓇᓱᐊᕈᓯᓕᒫᖅ) ᐅᖄᓚᕕᒃᓴᐅᔪᖅ, ᖃᕋᓴᐅᔭᒃᑯᑦ ᑎᑎᕋᐅᑎᕕᒃᓴᖅ, ᑎᒍᒥᐊᒐᒃᑯᓪᓗ ᑎᑎᕋᐅᑎᓗᓂ ᐅᖃᓪᓚᐅᔾᔭᐅᕕᒃᓴᖅ.
Peak Resilience (COVID-19) ᐸᕐᓇᐅᑎᖃᕆᕗᖅ ᐱᓕᕆᔾᔪᑎᖃᖅᑐᓂᓗ ᐊᓂᒍᐃᔪᓐᓇᖁᓪᓗᒋᑦ ᒪᑭᒪᓕᖅᐸᓪᓕᐊᔪᓐᓇᖅᓯᖁᓪᓗᒋᓪᓗ.
GoNoodle for Kids ᑕᕐᕆᔮᒃᓴᖃᐅᖅᐳᖅ ᔫᒐᕈᑎᓂᒃ, ᐃᒃᐱᒍᓱᒃᑎᐊᕐᓂᕐᒥᒃ, ᐊᓯᖏᓐᓂᒡᓗ ᐃᖃᐃᓕᓴᕈᑎᓂᒃ.
Headspace ᓴᐃᓕᔾᔪᑕᐅᔪᓐᓇᖅᑐᖅ ᐃᒃᐱᒍᓱᒃᑎᐊᕆᐅᖅᓴᔾᔪᑕᐅᓪᓗᓂᓗ ᑎᒍᒥᐊᒐᒃᑯᑦ ᑐᖅᑯᕋᒃᓴᖅ.
The Canadian Centre for Child Protection ᑲᓇᑕᒥ ᓱᕈᓯᕐᓂᒃ ᓴᐳᒻᒥᔩᑦ ᐱᓕᕆᔾᔪᑎᒃᓴᖃᐅᕆᕗᑦ ᐃᓕᓴᐃᔨᓄᑦ ᐊᑦᑕᕐᓇᖏᑦᑐᒃᑯᑦ ᐃᑭᐊᖅᑭᕕᒃᑎᒍᑦ ᐃᓕᓐᓂᐊᕐᓂᕐᒥᒃ, ᐃᓕᓐᓂᐊᒃᑲᓐᓂᕈᒪᔪᓄᓪᓗ ᐃᓕᓐᓂᐊᒃᑲᓐᓂᒐᒃᓴᖃᐅᖅᑐᖅ. ᑖᓐᓇ ᐃᑭᐊᖅᑭᕕᒃᑰᕈᑎ ᑐᓴᒐᒃᓴᖃᐅᖅᐳᖅ ᓱᕈᓯᕐᓂᒃ ᐊᑦᑕᕐᓇᖏᑦᑐᒦᑦᑎᓂᕐᒥᒃ ᐱᓂᕐᓗᒍᑕᐅᔪᓐᓇᖅᑐᓂᒃ ᐃᑲᔪᖅᓱᕆᐊᕈᑎᖃᐅᕆᓪᓗᓂ ᐱᓂᕐᓗᒃᑕᐅᓚᐅᖅᓯᒪᔪᓄᑦ ᐃᓚᔮᖏᓐᓄᓪᓗ.
MediaSmarts ᓴᖅᑮᔪᑦ ᖃᕋᓴᐅᔭᒃᑰᕈᓐᓇᖅᑐᓂᒃ ᑎᑎᖅᑭᕆᔾᔪᑎᓄᑦ ᐊᔪᕈᓐᓃᖅᑕᐅᔭᕆᐊᓕᖕᓂᒃ ᑎᓴᒪᐃᓕᖅᑲᖓᔪᓂᒃ ᓄᓇᕗᒻᒥ ᐃᓕᓴᐃᔾᔪᑎᓄᑦ K-12ᒨᖓᔪᓂᒃ.
The Canadian Red Cross Be Safe Guide provides useful information for parents and caregivers about abuse prevention, healthy relationships, internet safety, and other subjects. You can download it in Inuktitut, English, or French.
Kids Help Phone (COVID-19) now has links and trustworthy information for youth that may be struggling during COVID-19, as well as their 24/7 phone line, online chat, and text counseling.
Peak Resilience (COVID-19) is a source of strategies and resources about coping and building resiliency.
GoNoodle for Kids includes videos for yoga, mindfulness, and other exercises.
Headspace is a meditation and mindfulness practice app.
The Canadian Centre for Child Protection has a number of resources for educators on safe online schooling, as well as professional development opportunities. This site also has information about keeping children safe from abuse and supporting survivors and their families.
MediaSmarts has developed digital and media literacy outcomes to support the four strands of the Nunavut curriculum for grades K-12. |
Bees Don't Always Listen to the Hive
Honey bees are known for their fascinating social structure. A honey bee colony is in fact a well-organized machine, running on good communication, defense and division of labor. As social insects, honey bees have also been shown the communicate to their fellow foragers, a dance to tell their counterparts where food is located.
But listening to other bees isn't always the name of the game. Sometimes the honeybee just wants to do its own thing.
According to new research by ecologists Ellouise Leadbeater and Claire Florent, if a foraging bumblebee knows where good food can be found, it will ignore the advice of the other bees.
As Leadbeater and Florent write, "All bees in our study had personal information that one species of artificial flower was rewarding, and bees in the scent group then experienced social information about an alternative-scented species inside the nest, while a control group did not. On their next foraging bout, bees in both groups overwhelmingly used personal information when deciding where to forage."
We like to think of honeybees as social creatures, but this new research shows that they've also got an independent streak.
So how did the researchers track whether or not a bee was informed by its bee friends or from personal experience?
A group of 42 bees was let loose in an experimental garden. In that garden, there were artificial flowers scented with essential oils of geraniums, as well as a small well with 50 microliters of a nectar-like sugar solution, i.e. bee food. Once they had hung out in the garden, the bees were divided into two groups. One group returned to their colony to deposit the nectar and found their colony exactly the same as when they had left it. The other group, however, returned to a colony laced with essential oils of lavender, as if their fellow bees had been foraging in a lavender field.
When they went out on their next foraging tour, there were both geranium-scented artificial flowers and lavender-scented ones. Which ones did the bees choose?
Continue reading at ENN affiliate, Care2.
Bee image via Shutterstock. |
Find topics of interest and explore encyclopedia content related to those topics
Find articles, photos, maps, films, and more listed alphabetically
Recommended resources and topics if you have limited time to teach about the Holocaust
Explore the ID Cards to learn more about personal experiences during the Holocaust
A transport of 200 Jewish children, fleeing postwar antisemitic violence in Poland, arrives at the Prague railroad station. The children are on their way to displaced persons camps in the American-occupied zone of Germany. Prague, Czechoslovakia, July 15, 1946.
Jewish displaced persons receive food aid from the United Nations Relief and Rehabilitation Administration (UNRRA), at the Bindermichl displaced persons camp in the US zone. Linz, Austria, date uncertain.
Jewish orphans in a displaced persons center in the Allied occupation zone. Lindenfels, Germany, October 16, 1947.
Jewish refugees in the barracks at Feldafing displaced persons camp. Germany, after May 1945.
A US flag hangs from the ceiling of the main dining room at the Landsberg displaced persons camp. Germany, December 6, 1945.
A Jewish child refugee who fled eastern Europe as part of the organized postwar flight of Jews (the Brihah). Pictured here as an apprentice at the Selvino children's home for Jewish displaced persons. Italy, October 20, 1946.
Medical staff attend to infants at the children's clinic in the Zeilsheim displaced persons camp, which was in the American occupation zone of Germany. Zeilsheim, Germany, postwar.
Hot food is served at the displaced persons camp on Arzbergerstrasse. Vienna, Austria, March 1946.
This photograph shows Dina Sarna in front of a sign saying "Jewish DP Camp" in the Bad Reichenhall camp for Jewish displaced persons. Bad Reichenhall, Germany, 1947.
British soldiers guard Jewish refugees, forcibly removed from the refugee ship Exodus 1947, on trucks leaving for Poppendorf displaced persons camp. Photograph taken by Henry Ries. Kuecknitz, Germany, September 8, 1947.
Polish Jewish refugees arrive in Vienna after the war. They will be sheltered at the Rothschild Hospital displaced persons camp. A building badly damaged by bombing is visible in the background. Vienna, Austria, 1946.
Barracks in the Ebelsberg camp for Jewish displaced persons. Ebelsberg, Austria, July 1947.
View of a displaced persons camp in Salzburg, in the American occupation zone. Salzburg, Austria, May 25, 1945.
View of the Zeilsheim displaced persons camp. Zeilsheim, Germany, 1945.
View of the Zeilsheim displaced persons camp. Zeilsheim, Germany, 1947-1948.
The Zeilsheim camp was located 12 miles west of Frankfurt in the American-occupied zone of Germany.
Jewish survivors in a displaced persons camp post signs calling for Great Britain to open the gates of Palestine to the Jews. Germany, after May 1945.
We would like to thank The Crown and Goodman Family and the Abe and Ida Cooper Foundation for supporting the ongoing
work to create content and resources for the Holocaust Encyclopedia.
View the list of all donors. |
Unusual Recipes During World War II
Saturday, March 2nd 2-4 pm
In this final At the Kid's Table session, we will explore the wartime diets of 1940s New Yorkers. During WWII, families were encouraged to grown their own food in "Victory Gardens" to free up more of the food supply for the troops. In this workshop, families will explore the WWII & NYC exhibit, plant their own windowsill Victory Gardens of spinach and tomatoes, and learn how to use their vegetables to cook a delicious 1940s dish.
RSVP required at [email protected]; $10 materials fee, for ages 8 and up.
ABOUT SARAH LOHMAN
Sarah Lohman is an "historic gastronomist" featured on William Grimes' show Appetite City (NYC life, channel 25). Find episodes here. She is currently an educator at the Lower East Side Tenement Museum. Visit her blog on the history of food at www.fourpoundsflour.com
ABOUT AT THE KIDS’ TABLE
This is a series of three deep-dive, family programs on New York City's food history. Each two-hour program allows participants to experience historic foodways through an exploration of kitchen objects based on the New-York Historical Society's collection and cooking. The first program focuses on seventeenth-century Dutch food traditions, the second on how kitchen tools have changed since the early nineteenth
century, and the third on how food rationing affected families during WWII. Sign up for one or all programs in the series! |
by Thulaja, Naidu Ratnala
Phillip Street (or Philip Street) is a short one-way street in Chinatown that connects Chulia Street to Church Street. It was named either after William Edward Phillips,1 the governor of Penang (1820–26) or after Charles Phillip,2 the superintendent of the Sailors’ Home.
Phillip Street, one of the older streets in Singapore, ran along the coastal area in the early 19th century. The street is home to the Yueh Hai Ching Temple (Wak Hai Cheng Bio in Teochew), one of the oldest Chinese temples in Singapore.3 In the 1800s, a group of Teochew immigrants built a shrine dedicated to Mazu, Goddess of the Sea, on the street.4 The shrine was then near the sea before land reclamation pushed the coastline out. Newly arrived Teochew immigrants visited the shrine to give thanks for their safe journey and seek blessings from the deity.5 In 1826, a proper temple was built on the site of the shrine. In the mid-1850s, the temple was rebuilt by the Nee Ann Kongsi, which had taken over its management.6
In 1830, Phillip Street and one side of Market Street were razed by a fire that had begun in a blacksmith's shop. This paved the way for the construction of shophouses and terrace houses in 1931 to replace the badly-built houses.7 In the 1980s, the area encompassing Phillip Street, Market Street and some nearby streets underwent urban redevelopment, and the shophouses were replaced by high-rise buildings.8 Today, Phillip Street is part of the Central Business District.
OCBC Centre East, a commercial building, is located at the junction of Phillip Street and Chulia Street. It was designed by world renowned architect I. M. Pei, and construction of the building was completed in the 1990s.9 The Yueh Hai Ching Temple, which was gazetted as a national monument on 28 June 1996, is located beside it.10
Buildings on the other side of Phillip Street are the Royal Group Building (former Commerce Point), Tan Ean Kiam Building, Grand Building and a portion of the Golden Shoe carpark.11
(1) Lau la keng khau, which means “mouth of the lau la temple” (lau la means “grandfather”).12
(2) Ma-miu kai (Cantonese), which means “double temple street”. The Yueh Hai Ching Temple is built in such a way that two temples are enclosed within one outer wall.13
Naidu Ratnala Thulaja
1. Dunlop, P. K. G. (2000). Street names of Singapore. Singapore: Who's Who Publications, p. 242. (Call no.: RSING 959.57 DUN-[HIS])
2. Savage, V. R., & Yeoh, B. S. A. (2013). Singapore street names: A study of toponymics. Singapore: Marshall Cavendish Editions, p. 295. (Call no.: RSING 915.9570014 SAV-[TRA])
3. Edwards, N., & Keys, P. (1988). Singapore: A guide to buildings, streets, places . Singapore: Times Books International, p. 451. (Call no.: RSING 915.957 EDW-[TRA])
4. National Heritage Board. (2015, July 2). Yueh Hai Ching Temple. Retrieved 6 May, 2016, from National Heritage Board website: http://www.nhb.gov.sg/places/sites-and-monuments/national-monuments/yueh-hai-ching-temple; 170-year-old temple to be preserved. (196, June 28). The Straits Times, p. 20. Retrieved from NewspaperSG.
5. Back to former glory after facelift. (1997, April 10). The Straits Times, p. 3. Retrieved from NewspaperSG.
6. National Heritage Board. (2015, July 2). Yueh Hai Ching Temple. Retrieved 6 May, 2016, from National Heritage Board website: http://www.nhb.gov.sg/places/sites-and-monuments/national-monuments/yueh-hai-ching-temple
7. Edwards, N., & Keys, P. (1988). Singapore: A guide to buildings, streets, places. Singapore: Times Books International, p. 395. (Call no.: RSING 915.957 EDW-[TRA]); Buckley, C. B. (1984). An anecdotal history of old times in Singapore: 1819–1867. Singapore: Oxford University Press, p. 209. (Call no.: RSING 959.57 BUC-[HIS])
8. Step terrace design for the Matterhorn. (1982, April 26). The Straits Times, p. 17; Rashiwala, K. (2008, June 20). CDL sells Commerce Point for $2,200 psf. The Business Times, p. 8. Retrieved from NewspaperSG.
9. OCBC group forking out $ 194m to build 15-storey block. (1994, November 12). The Business Times, p. 6. Retrieved from NewspaperSG.
10. 170-year-old temple to be preserved. (196, June 28). The Straits Times, p. 20. Retrieved from NewspaperSG.
11. Street directory. (n.d.). Phillip Street. Retrieved 6 May, 2016, from http://www.streetdirectory.com/sg/phillip-street/20749_1.html
12. Savage, V. R., & Yeoh, B. S. A. (2013). Singapore street names: A study of toponymics. Singapore: Marshall Cavendish Editions, p. 296. (Call no.: RSING 915.9570014 SAV-[TRA])
13. Firmstone, H. W. (1905, January). Chinese names of streets and places in Singapore and the Malay Peninsula. Journal of the Straits Branch of the Royal Asiatic Society, 4, 120–121. (Call no.: RQUIK 959.5 JMBRAS)
The information in this article is valid as at 6 May 2016 and correct as far as we are able to ascertain from our sources. It is not intended to be an exhaustive or complete history of the subject. Please contact the Library for further reading materials on the topic.
Arts>>Architecture>>Public and commercial buildings
Architecture and Landscape>>Streets and Places
Streets and Places |
Use the to write a letter in the blue frame. Look around the room to find objects that begin with that letter. Press to take a picture and then to resize it and put it in a box. Try to fill all 4 boxes. Press and use the to record what you found, or add labels to the pictures. When you are done, press to save your work. |
Develop online library and research skills
Nowadays, a lot of quality research sources exist on the Internet. As always, the source of the information is just as important as the information itself. One of the major problems with citing Internet sources is that information on them can easily be changed from one day to the next. This must be taken into consideration when citing such sources.
The Cal State Fullerton library offers access to several full-text article databases. Some of the included services are:
- Remote access to the library's databases.
- Remote access to full-text journal articles.
- Integrated online interlibrary loan (ILLiad).
- Home delivery of books.
Google Scholar searches several library databases for journal articles; however, site login may be required to view the full text of the article |
Earth from Space: Cradle of humankind
This Envisat image of the Horn of Africa shows parts of Ethiopia, Eritrea, Djibouti and, to the northeast across the Red Sea, a portion of Yemen’s west coast.
The region is widely considered to be where early Homo sapiens emerged some 400 000 years ago.
The lighter-coloured area to the east is known as the Afar Triangle and includes the Danakil Desert. Extremely hot and dry, the deepest point in this volcano-ridden depression lies 100 m below sea level.
Continuous volcanic activity produces hot springs and major minerals. Salt mining is the main industry in the desert, cut by hand and loaded onto camels for transport.
Further west we can see the somewhat heart-shaped Lake Tana. With a surface area of over 2000 sq km, the average depth is only 14 m owing to high levels of sediment.
Lake Tana is used for fishing, farming and transportation, and has a thriving tourist industry centred on the more than 30 islands, home to numerous Ethiopian Orthodox Church monasteries dating back more than five centuries.
This image was acquired on 13 November 2011 by the MERIS instrument on ESA’s Envisat satellite.
The Image of the Week is featured on ESA Web-TV, broadcast online every Friday at 10:00 CET. |
Let’s get the basics out the way (yup, it’s another science lesson. Just go with it people).
What is ‘Atmosphere’?
It’s a layer of gas that circles the planet. Actually, it’s a mix of different gases and it’s held in place by gravity.
Earth’s atmosphere contains around 21% oxygen, 78% nitrogen, 1% argon and trace amounts of other gases such as carbon dioxide, neon, helium, hydrogen, ozone, and others.
Tell me about gas
Gas is a fluid substance that expands to fill available space. So if contained, it will fill the container in which it is held in a uniform density, irrespective of the amount of gas.
Gas molecules are able to move freely, they are not trapped in a structure. They are always in motion and bounce off each other.
The higher the temperature, the more violent the movement – the molecules become “excited” so vibrate and rotate faster (and the higher the temperature the faster they move too!)
What about escape velocity?
Since we are talking about the gases in the atmosphere, we need to discuss escape velocity.
Remember the atmosphere is gas, and gas is not bound in a structure, so gravity is holding it in place.
However, these molecules are moving fast and so we need to address escape velocity, which is the minimum speed an object needs to reach in order to break free from the gravitational pull of a massive body (such as a planet).
So these tiny molecules of gas can reach speeds (especially if heated) that allow them to escape.
Now, there is always a certain amount of gas that will escape into space. However, if the percentage increases too much then larger amounts of the atmosphere can start leaking into space.
Not to mention, some gases are heavier than others so the lighter gases such as helium and hydrogen might escape whereas the heavier gases such as oxygen remain.
As well as gravity you need to consider the temperature of the exosphere (outer atmosphere).
If it’s too hot, say you create a world and give it like 3 huge suns… that outer atmosphere is going to be filled with incredibly excited gas molecules that could be zipping off into space.
So, if you have a massively high temperature in the exosphere, then you need more gravity to compensate.
This can be an interesting concept to bring in for say a sci-fi idea, whereby a sun could be growing hotter (which occurs as suns age) and cause a devastating effect on the atmosphere.
If we use our Sun as an example, fusion is where hydrogen is fused into helium. However, helium is a denser gas than hydrogen so the Sun becomes denser as more helium is produced.
This will make the Sun hotter (though the process takes millions of years).
Therefore, over a long period of time, the Earth will get hotter (due to the increasing temperature of our sun) and the atmosphere will be affected (e.g. because lighter molecules and atoms will escape more easily, the atmosphere may slowly become denser).
Different Atmospheric conditions
When we look at the Earth and the atmosphere, we often do so from our own human perspective. However, there are many other animals that can survive in very different atmospheres than us.
In fact, back in 2010, the microscopic marine animal (phylum Loricifera) was reported as being the very first oxygen-free multi-cellular organism.
Discovered at the bottom of the Mediterranean sea, these animals go through their whole life cycle in the complete absence of oxygen and light.
For more on this, check out the Wiki article
The Ozone Layer is a thin layer in the stratosphere heavy in the gas ozone (O3). This layer is an important barrier that protects the Earth. Ozone partially absorbs UV-B radiation that comes from the Sun.
UV radiation has high energy and is capable of damaging living cells. Heavy exposure to this radiation increases risks to humans such as cancer as well as causing damage to other life on Earth.
The discovery of the hole in the ozone layer over Antarctica had a large impact on the world.
After a report was published by the United States National Academy of Sciences, concluding there was evidence of ozone depletion several countries took steps. The first being a move to eliminate CFCs in aerosol cans.
So this (comparatively) thin layer of gas shook the world when it was shown to be depleting. Something as simple as a hole in a layer of gas could have damning results.
The Greenhouse Effect
This is a natural process where the atmosphere traps in some of the Sun’s energy. This energy warms the Earth. However, this effect has been increased artificially by human activity. Many different activities have increased this effect.
The most well-known greenhouse gas is carbon dioxide. This can be increased by burning fossil fuels such as coal. When coal is burned in a power station the carbon it contains combines with oxygen in the atmosphere and forms carbon dioxide.
The increase of the Greenhouse Effect means more heat trapped, and the Earth gets warmer, hence the term Global Warming (now referred to as Climate Change).
Global warming harms the environment in a number of ways, the one we read about the most is the melting of the polar ice caps. There is also desertification, a rise in sea level and extreme storms.
There is also the issue of ocean acidification. The greater carbon dioxide levels have increased the acidity of the world’s oceans by over 30%.
If you remember at the start of the article, I mentioned that CO2 is only present in trace amounts in the atmosphere.
This gives you some idea of how delicate the balance is. All the problems caused by increasing CO2 are due to an increase from around 0.028 % (around 250 years ago) to 0.041 % (today).
Venus is a great planet to study if you want to make some horrifically uninhabitable planet in your novel… or if you want to have your world BECOME a horrifically uninhabitable planet.
100 times hotter than the Earth, Venus is not the beauty it’s named after. It has no protective magnetosphere so (according to NASA) in 2006 the Sun sent a small, slow-moving CME (coronal mass ejection) out into space.
Four days later this solar material hit Venus and ripped away huge amounts of oxygen out of Venus’ atmosphere.
It has a crushing atmosphere, so thick (around 90 times more massive than Earth’s) that a little over 2 hours, is the longest any spacecraft has managed to survive on its surface.
The atmosphere is around 96% CO2 and 3% nitrogen, with a little water vapour thrown in. Weather on Venus is a balmy 460 °C helped by the thick sulphuric acid clouds.
So, when you are world building, give some thought to the atmosphere of your planet(s). It’s kinda important 🙂
Want more articles on my World Builder Series? |
Current WHO pesticide classifications are based on toxicity in rats but basing regulation on human toxicity will make pesticide poisoning less hazardous and prevent hundreds of thousands of deaths globally without compromising agricultural needs. These are the key findings from a study by Andrew Dawson (South Asian Clinical Toxicology Research Collaboration, University of Peradeniya, Sri Lanka) and colleagues published in this week's PLoS Medicine.
The single most common means of suicide worldwide is agricultural pesticide poisoning. The authors examined the proportion of patients dying (case fatality) of different agricultural pesticides among patients who presented with pesticide self-poisoning at two Sri Lankan referral hospitals. Between April 2002 and November 2008, 9,302 people were admitted to the hospitals after ingesting a single pesticide. The authors identified the pesticide ingested in 7,461 cases by asking the patient what he/she had taken or by identifying the container brought in by the patient or their relatives. Ten percent of the patients died but there was a large variation in case fatality between the pesticides taken. Compounds in the same chemical class and/or the same WHO toxicity class sometimes had very different toxicities. For example, dimethoate and malathione, both class II organophosphate insecticides, had case fatalities of 20.6% and 1.9%, respectively. Similarly, pesticides used for similar agricultural purposes sometimes had very different case fatalities.
These important findings are likely to be generalizable to other hospitals and to other parts of rural Asia as the systematically collected prospective human data enable reliable estimates of relative toxicity for pesticides.
The authors say that "the data are much more directly relevant to human risk assessment than the existing animal data from which the WHO/EPA classifications of toxicity used in regulation are derived." They continue: "Moreover, it provides evidence of very large differences in acute human toxicity within these widely used classifications. These data provide a basis for refining further public health, regulatory, and clinical responses to the problem of acute pesticide poisoning. "
In an accompanying Perspective on the research article, Matthew Miller and Kavi Bhalla from the Harvard School of Public Health, Boston, USA (uninvolved in the research), call for urgent reclassification of agricultural pesticides to help reduce suicides by pesticide poisoning.
They say: "The findings from the current study by Dawson and colleagues have helped refine human toxicity estimates for pesticides in use today. Better surveillance data and additional research will, eventually, lead to additional refinements. In the meantime, while we wait for these refinements, we must not ignore what, thanks to Dawson and colleagues, we already know."
Funding: This study was supported by the South Asian Clinical Toxicology Research Collaboration, which is funded by the Wellcome Trust/National Health and Medical Research Council International Collaborative Research Grant GR071669MA. The study sponsor had no role in study design, data collection, data analysis, data interpretation, or writing of the report.
Competing Interests: ME has received financial support to attend a scientific meeting of a study funded by Syngenta. NAB and AHD have received travel expenses from Syngenta (a manufacturer of paraquat and some other pesticides) to attend meetings of a scientific advisory group in relation to studies of new paraquat formulations.
Citation: Dawson AH, Eddleston M, Senarathna L, Mohamed F, Gawarammana I, et al. (2010) Acute Human Lethal Toxicity of Agricultural Pesticides: A Prospective Cohort Study. PLoS Med 7(10): e1000357. doi:10.1371/journal.pmed.1000357
IN YOUR COVERAGE PLEASE USE THIS URL TO PROVIDE ACCESS TO THE FREELY AVAILABLE PAPER: http://www.
PRESS-ONLY PREVIEW OF THE ARTICLE: www.plos.org/press/plme-07-10-dawson.pdf
South Asian Clinical Toxicology Research Collaboration (SACTRC)
Department of Clinical Medicine
University of Peradeniya
Related PLoS Medicine Perspective by Miller and colleagues:
Funding: The authors received no specific funding for this article.
Competing Interests: The authors have declared that no competing interests exist.
Citation: Miller M, Bhalla K (2010) An Urgent Need to Restrict Access to Pesticides Based on Human Lethality. PLoS Med 7(10): e1000358. doi:10.1371/journal.pmed.1000358
IN YOUR COVERAGE PLEASE USE THIS URL TO PROVIDE ACCESS TO THE FREELY AVAILABLE PAPER:
PRESS-ONLY PREVIEW OF THE ARTICLE: http://www. |
Researchers from the University of California, San Francisco and University of Washington Medical Center have shown that consumption of a fat-rich diet increases the number of brain immune cells called microglia which triggers a local inflammation within the mediobasal hypothalamus (MBH) and causes an individual to eat more food, burn fewer calories, and gain more weight.
A series of experiments were conducted on two groups of mice. One group was fed a fat-rich diet for four weeks and the other with a healthier low-fat diet. Comparing the results, the group that was fed with fat-rich diet consumed more food, burnt fewer calories and exhibited substantial weight gain.
The researchers further gave the mice on a fatty diet an experimental drug called PLX5622 which depleted the number of microglia in the mice. These mice ate 15 percent less appetite and gained 20 percent less weight than untreated mice on the same diet.
The results were confirmed by giving microglial inflammation activating drug to the mice fed with healthy, low-fat diet. This resulted in the mice eating 33 percent more food, burning 12 percent less energy and 400 percent increase in weight gain.
“It can be confidently concluded that the inflammatory activation of microglia is sufficient to alter the regulation of energy balance in the hypothalamus, leading to overeating and weight gain,” said Joshua Thaler, associate professor of medicine at the UW Medicine Diabetes Institute and senior co-author of the study. |
How To Learn Fast And Better,Find Out
A person can’t be aloof from different types of activities in his/her life. At the time of continuing education, a student may need to work as well as manage social life. With the advent of social media, people have crossed their social life’s boundary from real to virtual, so coping up with all these things becomes a dilemma for most of the students. But balancing your life while you’re being educated is necessary in order to develop good learning habits. This article will deal with how to balance your work life, your social life and your social media life while continuing your education. Read on to grab this valuable information in order to manage your life properly.
Schedule Well. First and foremost, you’ve to make a perfect routine for your daily life. Without maintaining a viable routine, and strictly following that, you can never expect a prosperous life. You know your working hours, your required study time, your college or university’s attending days and time. Don’t make your daily routine so hard and fast, and so boring. Give some twists in your daily life.
Take the Help of Technology. Nowadays, more or less, everybody uses a phone and most of the phones have note taking and alarm setting facilities. Utilize these features to have some important notes and reminder set up for to-do as to meet up all your daily necessary tasks on time. Moreover, the syncing facility on different devices will give you ample room for working seamlessly with the same data.
Concentrate on a Single Matter. As you’ve segregated your daily life into many segments, you’ll have to do different things at different times in a day. It’s a common problem for the people those who work at the same of their studies that they amalgamate one thing with another. Never do this, and if your routine reads that now you’ll have to study, just stop thinking of your work life and study attentively without being lazy. You must follow the similar approach during your working time.
Categorize Everything.Life is all about prioritizing. You should categorize everything according to its importance for the betterment of your life. You know what will create more value, so study as well as work accordingly.
Make Some Time for Recreation.Mange some time and share your time with people who matter most to you. Spending time with your friends and family will obviously bring happiness in your life. In addition, through this habit, you could be a social person.
As it’s hard to manage much time for meeting every single people regularly in your day to day life, the solution for this problem is social media. Keep some time for sitting on your PC or engaging with your Smartphone for communicating with your near and dear ones with the help of social media. While social media is helpful for connecting us, it may become addictive and spoil our valuable time for doing other things such as studying or working. So check yourself, and go for social media once daily for a little time as to get the update of your friends and family.
Don’t Engage yourself in One Thing. Never be a die-hard student or worker. Always balance your life by adopting adequate time for studies, work and communication. By this way, you can develop good learning habits in your life. |
Presenter(s): Michael Weigend (DE)
Summary: Creating and discussing Scratch animations can make chemistry education more interesting and profitable. This contribution presents examples explaining the mechanisms of chemical reactions, properties of organic compounds and general chemical principles. Students get the opportunity to develop creativity while explicating mental models about theoretical concepts.
Type of participation: Paper |
From a Creighton Student's Perspective
June 13, 2012
Sophomore, Nursing Major
When I read this passage, this last sentence really reminded me how I think God is calling us to live our lives: he wants us to go out and share his love and acceptance of all people. In the Bible, Jesus calls us to have no other gods besides God and to love one's neighbor as one's self. I think this is particularly important for us to remember when we are going throughout our daily lives, constantly being tempted by materialistic goods and gossiping or tearing others down. We need to remember what Jesus is calling us to live simple lives, not lives filled with so many material objects that we forget to stop and appreciate the things God has already blessed us with.
I also think that it is important that Jesus said that we do not just need to obey this, but we also need to teach it. We are all called to be disciples, and being disciples is not just worrying about how we are doing; it is also looking out for our brothers and sisters. We need to help them also achieve a life in Heaven, and we can do that by teaching them about how God wants us to love. Our actions do speak louder than our words, so we must always be striving to live out God’s commandments, so that we can be examples to others.
Collaborative Ministry Office Guestbook |
The second oldest university in Austria was founded in 1585 by Archduke Charles II of Inner Austria, initially with just two faculties, those of philosophy and theology in a Jesuit college; in 1778, the faculty of law was established. After the college had been turned into a lyceum, Emperor Francis I re-established the institution as Karl Franzens University in 1827, to which in 1863 a faculty of medicine was added. Today’s campus dates back to 1870.
The University of Graz, which was founded in 1585, is Austria's second oldest university and one of the largest in the country. Many excellent scientists, amongst them six Nobel laureates, have taught and researched here.
With 32,500 students and 4,300 employees the University of Graz contributes significantly to the vibrating life of the Styrian capital. Its location in Europe encourages a lively scientific, economic and cultural exchange with South-East Europe, from which not only the city benefits, but also its educational institutions. |
Migrant and refugee women, in particular, can find it difficult to attend classes if they are at home caring for pre-school children. Some have never been to school and therefore have no basic literacy in their own language, making it extremely difficult to learn a new language in a formal educational setting.
Even those people who qualify for and complete government English classes may still require additional help and more opportunities to practice.
In the City of Logan, a group of 13 Burmese women needed support to improve their English, however they didn’t want to do any more formal learning.
Most of the women had two or three children and they felt comfortable in the school-based hub environment. They told the hub leader they wanted to learn practical sewing skills.
Once they were sewing, the hub leader, who was also a trained English teacher, started an informal language group.
The women started to enjoy this and found that their confidence with English was improving. They were happy to come in early and extend the time they had to learn English.
They started the day with informal English practice and then continued practicing their new language skills during sewing class.
The classes were not funded. The hub leader facilitated the English classes and students and volunteers provided free child care.
At Westmead Public School Hub, English classes are organised for about 12–16 parents and grandparents of children attending the school.
The classes are led by volunteers led and provide interactive and practical activities with lots of small group and one-on-one activities. They give participants lots of time to practice their English, seek clarification and increase their confidence to speak to and in front of other people. People get help with their pronunciation and understanding Australian accents.
The volunteers are self-sufficient and highly organised. They run the activities with support from the hub leader, who books rooms and organises equipment.
The classes are not funded and there is no child care provided.
A similar model runs in Victoria, with the local AMEP provider (AMES) supplying a volunteer tutor, and the hub leader and parents sharing child minding duties.
A number of hubs in the City of Hume run a 20-week Mother Child English Program in partnership with a registered training provider (RTO).
The curriculum focuses on English within an early childhood development context. The program allows mothers to come in and settle their children into child care in a nearby room, while they have formal English classes that focus on practical, everyday English about child development, pre-school learning, raising healthy children and raising children in a multicultural society. The children take part in fun child care that is pre-accredited.
After the formal session, the children and parents come together in a playgroup, which has play activities themed to the classes, giving parents the chance to practice what they have learned.
The model requires a partnership with an RTO and is suitable for people with various levels of English proficiency. It is funded with AMEP funds as well as funds from the Foundation Skills stream. Funding to cover child care has been sourced from the philanthropic sector.
One of the challenges of running English classes in community hubs is providing child minding for pre-school children so their parents can attend the lessons.
Deborah from Dandenong South Primary School Hub explains how they’ve addressed this issue at her hub:
“We’ve been running a highly successful English language class for mums with bubs for over a year. The women appreciate the ability to have their children looked after during the session, as most of the other English classes available don’t have any ability for children to attend.
Although the intention was for us to provide a ‘child free’ English language class for the women, some of the children had significant difficulty separating from their mothers. A group of four or five children who were very unsettled caused other children in the group to also become distressed. As the mothers could hear them crying, they too were very uncomfortable and were not able to concentrate.
Some women ended up taking their children into the classes with them, but this created a very noisy learning environment. We decided to trial having one woman per week sit out of classes to assist with child care. This did offer some assistance to our child-care assistant, but children were still distressed.
We then decided to split the class into two groups. In one room, we now have the women whose children are happy to separate from their mothers. These women can quietly concentrate on their learning tasks. In the second room, we provide child care and we also have the women whose children will not separate from their mothers. This is a noisier room, however all of the women in the room have a child. The children are no longer crying and are happy to engage in play activities around the room. The tutor moves between the two rooms, which are next door to each other, assisting all the women.
All the children are more settled and all the women are happy!
My advice to others is to work through solutions with the group. Sometimes what you think will work won’t and what you think won’t work, will. It’s about being flexible and working with your families to best suit their needs.” |
This type of variable capacitor is designed to be set when a circuit is made and then left without further adjustment.
A NOR gate can have two or more inputs. The o on the output means not showing that it is a Not OR gate. The output of a NOR gate is true when none of its inputs are true.
Transistor PNP A transistor amplifies current and can be used with other components to make an amplifier or switching circuit. This symbol is for a bipolar junction transistor (BJT), the type you are most likely to use at first.
Piezo Transducer A transducer which converts electrical energy to sound |
parents Have a dangerous genetic disease, you can have the genome of your unborn children to examine. The cost for the treatment of up to 4,000 euros, you need to wear. The Minister of health, Jens Spahn (CDU) wanted to commit the change, and the health insurance companies to pay for the treatment. But his party is now against the plans.
To give the project it’s still in “discussions,” said Union leader Ralph Brinkhaus (CDU) in Berlin. Spahn announced, to Mature his plans at a later date.
investigations rejected on embryos to strict legal regulations in Germany are subject to. Only under special circumstances, an Embryo prior to the planting of all genetically may be examined; with the aid of pre-implantation genetic diagnosis, in short, PID. Either there must be the risk of serious hereditary diseases or the high probability of a stillbirth or a miscarriage. PID ethics committees to decide in individual cases whether an investigation is allowed.
preimplantation genetic diagnosis (PGD)What is it about? DPA In the method are taken from a in a test tube resulting Embryo one to two cells . It comes to examining their genome . The aim is, among other things, diseases that go on too many or too few chromosomes back. In the Down’s syndrome , the chromosome 21 is, for example, three times. Possible tests on a single mutated genes , which are, for example, for muscle wasting, pulmonary and metabolic diseases, or the blood disease. Procedure 1: diagnosis in blastomeres stage and this is the most common type of test are taken from the Embryo at the third day after fertilization in a test tube one or two cells for the investigation. The Embryo is at this time in the so-called blastomeres stage . That is to say, its four to eight cells are considered to be totipotent – each individual may develop in the uterus, even to a complete organism. Totipotent cells are equal according to the German embryo protection act of an Embryo. Method 2: diagnosis at the blastocyst stage, too, at a later time, a PID, in principle, still possible, for example, in the so-called blastocyst stage . Then, the Embryo consists of about 50-200 cells. The cells of the inner cell mass are considered to be pluripotent , which means you can develop in various tissues. The diagnosis at the blastocyst stage, had applied to the Berlin physician, whose case was brought before the BGH. Alternative: polar body diagnosis In this method, only the oocyte is examined and prior to the completion of the fertilization . In view of the polar body , resulting in the tire of the ovum. They contain a set of maternal inheritance . So that the mothers can, at least, of genetic material of the ovum, indirectly, on the chromosomes-incorrect distributions check. Paternal pre-existing conditions can not be investigated. Because in this method, no Embryo is manipulated, it is not contrary to the law of embryo protection.
the cost of The PID to a takeover by the health insurance companies should be regulated in the framework of the appointment service and pension law (TSVG). The thrust of criticism, because the amendment actually will be shorter waiting times in doctor’s offices. The revision of the PID within a appointment law, acting “under pushed” criticized the Union group, according to a report in the “world”. The working group health of the CDU/CSU-group, therefore, unanimously against Spahns plans.
representatives of the Church had positioned itself recently against Spahns projects. They accused the Minister, to the Change in a “parliamentary heave-Ho procedure” to implement.
“We’ll look at the rest,” announced brink house now. The project, to make the pre-implantation genetic diagnosis, in exceptional cases, to the Fund, will not be included in the schedule of service law, informed the Ministry of health. However, the topic should be called new, when the Federal Ministry of health national this year, a report on the experience with PID. |
When Laura Murray was about 10 years old, she was given a glass vial (small bottle) of dust. Now, almost 50 years later, she’s taking NASA to court to keep that bottle. Why? The dust inside came from the moon.
Many things have happened since she was given the vial of moon dust. Laura Murray has grown up, gotten married, and now her name is Laura Cicco. Her parents have died, but they played an important part in the story.
Ms. Cicco’s father was a pilot, and he was friends with the American astronaut, Neil Armstrong. Neil Armstrong is famous for being the first person to ever walk on the moon.
Mr. Armstrong gave Ms. Cicco’s father the vial of moon dust as a gift for Ms. Cicco. He also wrote a note on the back of one of her father’s business cards: “To Laura Ann Murray, best of luck, Neil Armstrong, Apollo 11”.
As a child, even though she kept Mr. Armstrong’s note in a frame, Ms. Cicco wasn’t too interested in the moon dust. In fact, she forgot all about it. “I was more interested in Barbie dolls and riding my bike,” she told one newspaper.
Ms. Cicco didn’t see the vial again until about five years ago, when she was cleaning out her parents’ house.
Now, Ms. Cicco is suing NASA – taking them to court. Why? Ms. Cicco is afraid that NASA might try to take her moon dust away. She wants to keep that from happening.
NASA is the US government group that made the trips to the moon possible. Neil Armstrong worked for NASA. Until recently, NASA has been in charge of almost all US trips into space. And NASA has rules about the things its astronauts can take with them.
In 2012, about 40 years after Ms. Cicco was given the moon dust, Congress made a law for astronauts. It said that they could take home some small things from their trips. But the law made it clear that this did not include anything collected on the moon.
Rocks and dust from the moon are very valuable because they are so unusual. In 2002, three people stole $21 million worth of moon rocks from NASA. An empty bag that was used to collect samples on the moon sold for $1.8 million last year. The bag had a tiny bit of moon dust inside it.
Since 2012, NASA has taken other people to court and tried to get back any pieces of moon rock that they had. NASA has said that private people “cannot own lunar material”. “Lunar material” means bits of the moon.
So Ms. Cicco and her lawyer, Chris McHugh, are going to court to make sure that NASA doesn’t try to take Ms. Cicco’s moon dust away. Mr. McHugh doesn’t see any reason why a private person can’t own bits of the moon. He says that Ms. Cicco got the moon dust from Mr. Armstrong as a gift, and so it is hers.
NASA has not said anything about the case.
This map has not been loaded because of your cookie choices. To view the content, you can accept 'Non-necessary' cookies. |
Everyone of a certain age remembers logging-on to a noisy dial-up modem and surfing the Web via AOL or AltaVista. Back then, the distinction between offline and online made much more sense. Today, three trends are conspiring to firmly confine this distinction to history. These are the mass proliferation of Wi-Fi, the appification of the Web, and the rapid expansion of the Internet of (smart) Things. Combined they are engineering multi-layered information ecosystems that enmesh around children going about their every day lives. But it’s time to refocus on our responsibilities to children before they are eclipsed by the commercial incentives that are driving these developments.
1. The proliferation of Wi-Fi means when children can use smart phones or tablets in variety of new contexts including on buses and trains, in hotels and restaurants, in school, libraries and health centre waiting rooms.
2. Research confirms apps on smart phones and tablets are now children’s primary gateway to the Web. This is the appification of the Web that Jonathon Zittrain predicted: the WeChat app, popular in China, is becoming its full realisation.
3. Simultaneously, the rapid expansion of the Internet of Things means everything is becoming ‘smart’ – phones, cars, toys, baby monitors, watches, toasters: we are even promised smart cities. Essentially, this means these devices have an IP address that allows to them receive, process, and transmit data on the Internet. Often these devices (including personal assistants like Alexa, game consoles and smart TVs) are picking up data produced by children. Marketing about smart toys tells us they are enhancing children’s play, augmenting children’s learning, incentivising children’s healthy habits and can even reclaim family time. Salient examples include Hello Barbie and Smart Toy Bear, which use voice and/or image recognition and connect to the cloud to analyse, process, and respond to children’s conversations and images. This sector is expanding to include app-enabled toys such as toy drones, cars, and droids (e.g. Star Wars BB-8); toys-to-life, which connect action figures to video games (e.g. Skylanders, Amiibo); puzzle and building games (e.g. Osmo, Lego Fusion); and children’s GPS-enabled wearables such as smart watches and fitness trackers. We need to look beyond the marketing to see what is making this technology ubiquitous.
The commercial incentives to collect children’s data
Service providers now use free Wi-Fi as an additional enticement to their customers, including families. Apps offer companies opportunities to contain children’s usage in a walled-garden so that they can capture valuable marketing data, or offer children and parents opportunities to make in-app purchases. Therefore, more and more companies, especially companies that have no background in technology such as bus operators and cereal manufactures, use Wi-Fi and apps to engage with children.
The smart label is also a new way for companies to differentiate their products from others in saturated markets that overwhelm consumers with choice. However, security is an additional cost that manufactures of smart technologies manufacturers are unwilling to pay. The microprocessors in smart toys often don’t have the processing power required for strong security measures and secure communication, such as encryption (e.g. an 8-bit microcontroller cannot support the industry standard SSL to encrypt communications). Therefore these devices are designed without the ability to accommodate software or firmware updates. Some smart toys transmit data in clear text (parents of course are unaware of such details when purchasing these toys).
While children are using their devices they are constantly emitting data. Because this data is so valuable to businesses it has become a cliché to frame it as an exploitable ‘natural’ resource like oil. This means every digitisable movement, transaction and interaction we make is potentially commodifiable. Moreover, the networks of specialist companies, partners and affiliates that capture, store process, broker and resell the new oil are becoming so complex they are impenetrable. This includes the involvement of commercial actors in public institutions such as schools.
Lupton & Williamson (2017) use the term ‘datafied child’ to draw attention to this creeping normalisation of harvesting data about children. As its provenance becomes more opaque the data is orphaned and vulnerable to further commodification. And when it is shared across unencrypted channels or stored using weak security (as high profile cases show) it is easily hacked. The implications of this are only beginning to emerge. In response, children’s rights, privacy and protection; the particular ethics of the capture and management of children’s data; and its potential for commercial exploitation are all beginning to receive more attention.
Refocusing on children
Apart from a ticked box, companies have no way of knowing if a parent or child has given their consent. Children, or their parents, will often sign away their data to quickly dispatch any impediment to accessing the Wi-Fi. When children use public Wi-Fi they are opening, often unencrypted, channels to their devices. We need to start mapping the range of actors who are collecting data in this way and find out if they have any provisions for protecting children’s data.
Similarly, when children use their apps, companies assume that a responsible adult has agreed to the terms and conditions. Parents are expected to be gatekeepers, boundary setters, and supervisors. However, for various reasons, there may not be an informed, (digitally) literate adult on hand. For example, parents may be too busy with work or too ill to stay on top of their children’s complex digital lives. Children are educated in year groups but they share digital networks and practices with older children and teenagers, including siblings, extended family members, and friends who may enable risky practices.
We may need to start looking at additional ways of protecting children that transfers the burden away from the family and to companies that are capturing and monetising the data. This includes being realistic about the efficacy of current legislation. Because children can simply enter a fake birthdate, application of the US Children’s Online Privacy Protection Act to restrict the collection of children’s personal data online has been fairly ineffectual (boyd et al., 2011). In Europe, the incoming General Data Protection Regulation allows EU states to set a minimum age of 16 under which children cannot consent to having their data processed, potentially encouraging and even larger population of minors to lie about their age online.
We need to ask what would data capture and management look like if it is guided by a children’s framework such as this one developed here by Sonia Livingstone and endorsed by the Children’s Commissioner here. Perhaps only companies that complied with strong security and anonymisation procedures would be licenced to trade in UK? Given the financial drivers at work, an ideal solution would possibly make better regulation a commerical incentive. We will be exploring these and other similar questions that emerge over the coming months.
This work is part of the OII project “Child safety on the Internet: looking beyond ICT actors“, which maps the range of non-ICT companies engaging digitally with children and identifying areas where their actions might affect a child’s exposure to online risks such as data theft, adverse online experiences or sexual exploitation. It is funded by the Oak Foundation. |
Premise #1 = If God does not exist, objective Moral Values and Duties do not exist.
Premise #2 = Objective Moral Values and Duties exist.
Conclusion = Therefore, God exists.
C.S. Lewis (‘Mere Christianity’):
“My argument against God was that the universe seemed so cruel and unjust. But how had I got this idea of ‘just’ and ‘unjust’… what was I comparing this universe with when I called it unjust?
Of course I could have given up my idea of justice by saying it was nothing but a private idea of my own. But if I did that, then my argument against God collapsed too – for the argument depended on saying that the world was really unjust, not simply that it did not happen to please my private fancies… consequently atheism turns out to be too simple.”
Tim Keller, Doctorate in Ministry at Westminster Theological Seminary. Pastor, theologian and Christian apologist; founding pastor of Redeemer Presbyterian Church in New York City:
“Lewis recognized that modern objections to God are based on a sense of fair play and justice. People, we believe, ought not to suffer, be excluded, die of hunger or oppression.
But the evolutionary mechanism of natural selection depends on death, destruction, and violence of the strong against the weak – these things are all perfectly natural. On what basis, then, does the atheist judge the natural world to be horribly wrong, unfair, and unjust?
The nonbeliever in God doesn’t have a good basis for being outraged at injustice, which, as Lewis points out, was the reason for objecting to God in the first place.
If you are sure that this natural world is unjust and filled with evil, you are assuming the reality of some extra-natural (or supernatural) standard by which to make your judgment.” (‘The Reason for God.’)
For Deeper Study:
Book 4, chapter 3
On-line lessons 164-165
Live classroom 25 |
In the past few years we have seen an explosion in our ability to access information at anytime and from just about anywhere. The Internet in general has a lot to do with this explosion. Being able to access the Internet from just about anywhere has simply reinforced its importance.
A secondary development that has impacted our relationship to information is known as "Web 2.0". The central tenant of Web 2.0 is that websites not only facilitate in the sharing of information, but also the interoperability of information across the Internet.
To do this web developers separate out their concerns, the design of the website from its logical behavior, the information from the logic. This allows greater flexibility in developing the over all web-based application, applying computing resources specific to the concern in question, say storage of application data, as needed.
Given a proper interface a web developer can create a website "mashup" pulling data from numerous "outside" resources into a unique and useful application. One of earliest examples of this type of web application was a website called chicagocrime.org that combined Google Maps with the Chicago Police "blotter" to provide a digital map in which a user could locate informtion about criminal activity at a given location in the city.
Recently the Obama Administration launched a number of government transparency initiatives designed to create data stores of federal information, akin to the local police blotter. By providing these data stores the administration's goal was to increase public access to high value information in a format that could be easily incorporated into a larger web application.
Yet, some of the most important technology programs that keep these data stores available are in danger of being eliminated. Data.gov, USASpending.gov, the IT Dashboard and other federal data transparency and government accountability programs are facing a massive budget cut, from $34 million to $8 million or less.
Government information must be available online, in real time and in machine-readable formats. Doing so can increase involvement in our democracy as non-for-profit organizations, for-profit businesses and independent developers find new ways to enable us in accessing and sharing information.
It seems stupid to let these new initiatives go dark. After all, why should we be able to know what is going on in our neighborhood, but not in our country as a whole?
Take action now to Save the Data, http://sunlightfoundation.com/savethedata
Chicagocrimes.org has since morphed into EveryBlock.com, a site focused on collecting all of the news and civic goings-on related to a specific city neighborhoods, As of March 2010 they cover 16 metropolitan cities in America and their neighborhoods, providing a "news feed" for a given city neighborhood or block. |
FOLLOWER OF ROOSEVELT
Few people have had more influence on the early management of fish and game in Northeast Oregon than La Grandes Bill Brown.
Brown became the first manager of the Oregon Department of Fish and Wildlifes northeast region in 1950. Based in La Grande, he served as manager through 1976.
Brown is well known for his work in the region. Less known is his work with Roosevelt elk in Western Oregon.
Brown made history while working with Roosevelt elk in the late 1930s. He was beginning his career with the ODFW, then the Oregon Game Commission.
One of Browns first assignments called for him to conduct the first census of Roosevelt elk in Northwest Oregons Clatsop County. The results were anxiously awaited.
The census was important because many believed that a recent hunting season had decimated the countys Roosevelt elk population. Roosevelt elk hunting had been prohibited until the 1930s in Oregon because of falling numbers.
Brown put fears of the demise of Roosevelt elk in Clatsop County to rest. He discovered that few elk remained around roads but that there were many in the countys numerous roadless areas.
It didnt take long to realize that hunters had not made a dent in the elk population, Brown said.
He explained that Roosevelt elk were not afraid of people because they had not been hunted.
They were not wild, Brown said.
As a result the elk near roads were easy targets for hunters. Few elk near roads could be found.
However, there were plenty left in the timber, Brown said.
After his Clatsop County census, Brown was sent to Southern Oregon where he helped lead a team that conducted a census of Roosevelt elk.
We found out where the elk were, Brown said.
Information from this census was used by the state to establish Roosevelt elk hunting seasons in Southern Oregon. When hunting began, Roosevelt elk were scattered throughout Southern Oregon. Previously they had not traveled far. Roosevelt elk, unlike the Rocky Mountain elk found in Eastern Oregon, prefer not to travel far.
They are not naturally migratory, Brown said.
Later Brown was involved in one of the states first Roosevelt elk trapping and transport programs. The objective was to move Roosevelt elk away from areas where they were damaging property. Large corral-type traps were set up with net. Once the elk entered, the gate closed.
Brown successfully caught many elk with the traps, but said that his first traps were too large. Because of this elk had room to run and sometimes collapsed from exhaustion while running and trying to get out.
This (elk trapping) was all new to us. We were not sure what to do, Brown said.
The elk Brown helped trap were successfully moved to other areas in Western Oregon and the Cascades.
Difficult to hunt
Brown, who grew up in Roseburg and later graduated from Oregon State University, hunted Roosevelt elk while in Western Oregon.
He said that elk hunting in Western Oregon then was challenging because forests were filled with large old growth timber stands.
It was like a jungle, Brown said.
The difficulty of tracking Roosevelt elk in Western Oregon is compounded by the fact that the region has terrain that is often steeper than Eastern Oregons.
Such challenging conditions may be one reason why Roosevelt elk behave differently than Rocky Mountain elk when hunted.
Brown noted that when he was pursuing Rocky Mountain elk, the animals would run for miles if spooked. Roosevelt elk though tend to run up to the nearest ridge and out onto it.
This behavior is so predictable that sometimes Brown would position a hunting partner on a ridge while pursuing an elk. Often the elk would run up to the ridge only to find the hunter waiting for him.
Brown, who has successfully hunted Rocky Mountain elk in Eastern Oregon for years, took his last Roosevelt elk in 1948.
He prefers hunting Rocky Mountain elk in part because it allows him to be in more open spaces.
Today Brown still has a wildlife connection to Western Oregon. He regularly travels to Winston near Roseburg to work as a volunteer at Wildlife Safari. At the game park, animals from throughout the world can be viewed everything from zebras to Roosevelt elk.
Brown helps maintain a nature trail at the park.
Story by Dick Mason
of The Observer |
This article is part of a series on How Historic Laurel Hill Cemetery Is Reinventing Itself. It is based on an interview with Ross Mitchell, Executive Director of Laurel Hill Cemetery in Philadelphia, PA.
Stoneangels: You said death was more common in the 1800s?
Ross Mitchell: The life span was much shorter back then. And before there were antibiotics, people lost children all the time. We have one lot here where [a family] lost eight children in ten years, all under the age of ten.
Stoneangel: They weren’t all stillborn babies?
Ross Mitchell: No, colds would come around, infections would happen and there were no antibiotics. So people died [earlier]. People were laid out in the parlor. In fact I believe that’s one of the reasons they started calling it the “living” room instead of the parlor because the parlor waxs associated with where you would lay out the body when you had a death in the family. So “living” room…
Stoneangels: As opposed to the funeral “parlor.” I brought my daughter here when she was about fifteen-we used to come here together to take photographs. She was surprised to see so many tombstones of children who had died before they were 6 months old. She couldn’t understand why so many children had died that young. It was a great history lesson for her. Hanging around here, I think in some way helped me prepare myself for my father’s death. I have a small family and I was not used to grief and death. But I knew it was inevitable. So I appreciate Laurel Hill from that respect.
Ross Mitchell: One of the programs we’re developing here is in conjunction with St. Joseph’s University [Philadelphia], an Urban Mourning Rituals Program-that’s the working title now. It’s an outreach program into the local community. Unfortunately, with all the shootings that we’re having in Philadelphia–a lot of youth-on-youth murder–everybody in the city knows somebody who’s been shot. So we’re working on developing a program that’s based on the spontaneous memorials–spontaneous roadside memorials that happen, and the Rest In Peace memorials at murder sites, the spray-painted memorial on the back windows of cars, Rest In Peace spray-painted memorial t-shirts, sort of graffitied, modern urban rituals. These are a natural outgrowth of loss and of people trying to deal with loss.
So with Professor Berndt, from St. Joseph’s University, we’re developing a program to go out into the community to help children understand what these mourning rituals are, what they’re for and to help children deal with their loss. We’ll come to Laurel Hill as part of the program–we have 170 years of mourning rituals here and can help kids understand and work through their unfortunate losses. |
Like many people, you probably have a pretty sizeable collection of old electronics — computer monitors, CPUs, keyboards, cell phones, telephones, and batteries — a growing list of items that quickly become outdated and turn into e-waste. But what do you do with them when you don’t need them anymore?
Computer Recycling and More
Now, there's an environmentally-friendly option for cell phone and computer recycling when you upgrade to new models, or when batteries go dead: e-cycling.
E-cycling is the recycling of electronics, which allows the parts to be reused and recycled instead of being dumped into a landfill, where potentially harmful chemicals from electronics can seep into the ground.
Many common electronic items are recyclable, including:
- Computer monitors, CPUs, and keyboards
- Phone batteries (cordless and cell phone)
- Computer, tool, camera, and toy batteries
- Household batteries (all sizes)
- Batteries with lead acid, such as car batteries
- Rechargeable batteries
Note that you'll want to be sure to erase any personal records from computers and other personal electronic devices before e-cycling, to avoid identity theft.
Battery Recycling Specifics
Lead-acid batteries, which are commonly used in cars and other vehicles, can be hazardous to the environment if disposed of along with regular trash. These types of batteries are considered hazardous waste, and federal law prohibits throwing them in the garbage. Many communities offer car battery recycling centers where they will safely recycle the materials for you, and reuse old battery parts to make new batteries. Many auto supply stores will take old car batteries for recycling as well, so call local retailers to find out who will accept your old lead-acid batteries for recycling.
Even household batteries — made with nickel-cadmium, alkaline, and mercury — are potentially dangerous forms of e-waste. They may not always be classified as hazardous waste, but it's still important that they be disposed of properly. There are a number of companies that will recycle batteries of all types so that they don't need to be tossed in the garbage.
There are several ways to recycle batteries, electronics, and computers, depending on what the item is and whether it still works. Here are some environmentally-friendly ways of disposing old, outdated, or unwanted electronics:
- Donate them. Items that still work can be donated to a thrift store, school, church, or charity that accepts functioning electronic equipment.
- Sell them. Some people may be interested in buying your older items, whether to use them for parts or just to have a spare on hand. You might place an ad in your newspaper or try selling them online. There are also retail stores in many cities that buy older computers and refurbish them to sell.
- Give it away to someone who wants it. There are Web sites, such as The Free Cycle Network, Craigslist, and FreeMesa where people list electronics and other items they want to give away or items they're looking to buy. See what matches up, and pass on your unwanted items for reuse.
- E-cycling dropoff. Many communities have electronics and computer recycling centers and may hold a hazardous waste day when they will take care of recycling e-waste for you.
Finding E-Waste Drop-off Locations
To find community or other drop-off locations, look in the phone book under local recycling services and programs. You can also call your local waste management program to find out about recycling locations in your community.
Check out the Web site of your product’s manufacturer or the store where you bought it to see it offers recycling options, or do an online search for computer recycling, electronics recycling, and battery recycling in your area. Web sites like Earth911, myGreenElectronics, and Call2Recycle (Rechargeable Battery Recycling Corporation) offer information on regional drop-off locations and zip code searches.
Taking a few extra steps to dispose of unwanted electronics and batteries will go miles toward creating a greener environment.
Last Updated: 9/3/2009 |
Description This pair of ornaments (with Walters 86.14) and headdress (Walters 86.3) were likely once worn by the empress dowager, the effective ruler of China during the later years of the Qing Dynasty. It is an exquisite example of Chinese decoration and the symbolism used to express one's rank. The small phoenixes emerging from the surface represent the empress, while the myriad of pearls and gemstones mark this piece as something special for the adornment of the highest ranking woman in Chinese society. The brilliant blue feathers of the kingfisher give these accessories an eye-catching quality that anyone interested in being recognized would certainly embrace.
- Bedazzled: 5,000 Years of Jewelry from the Walters Art Museum. Frist Center for the Visual Arts, Nashville; The John and Mable Ringling Museum of Art, Sarasota; The Walters Art Museum, Baltimore. 2006-2009.
Provenance Auguste F. Chamot [date and mode of acquisition unknown]; Henry Walters, Baltimore, 1907 [mode of acquisition unknown]; Walters Art Museum, 1931, by bequest.
Credit Acquired by Henry Walters, 1907
Download Image Add to Collection Share on Twitter Share on Facebook Creative Commons License |
#429 Trail, the bomb, and Blaylock
Codename Project 9: How a Small British Columbia City Helped Create the Atomic Bomb
by Ron Verzuh
CreateSpace Independent Publishing Platform, 2018
$13.08 / 9781720820703
Reviewed by Michael Sasges
First published Nov. 22, 2018
Codename Project 9 is a small book that engenders reflections on some big history.
Since 1945, journalists and scholars have chronicled the midwifery contribution of Consolidated Mining and Smelting and the city of Trail to the nuclear age, a story sparked by the publication of a Trail Times report, seven days after Hiroshima and four after Nagasaki, under the headline “Trail Helped in Atomic Bomb.”
So why might the B.C. reading public generally and small-history buffs particularly want to know anew that between 1943 and 1955 a Teck Cominco predecessor produced heavy water in the West Kootenay for the U.S. war department and its Manhattan Project and for the Canadian government and its nuclear-reactor research? My answers are these:
Firstly, Codename Project 9 is exemplary summary history.
Historian Ron Verzuh ably incorporates what has been told and nicely advances it. His interviews, and those by others, are an especially important addition to the Project 9 story. Ordinary agency is always instrumental in executing extraordinary undertakings.
“We used to just cringe when we went in there,” a retired Consolidated Mining fireman who routinely inspected the sprinklers in the heavy-water production facility told Verzuh.
Secondly Codename Project 9 is an examination of a Manhattan Project anomaly, and anomalies inevitably advance appreciation and understanding.
The Consolidated Mining and Smelting Company of Canada (renamed Cominco in 1966) was the only Manhattan Project supplier located outside the United States. Further, neither the heavy water from Trail nor the heavy water from the three facilities located in U.S. was used to help make an atomic bomb. Project Manhattan military officers and scientists preferred another fission “moderator,” but invested in heavy-water production in case their preference turned out to be a dud. (It didn’t.)
Codename Project 9 was, in other words, a memorable local measure of the vigour of the American pursuit of the first weapons of mass destruction. (The American government spent almost $2 billion US in 1944 dollars on the Manhattan Project, the Brookings Institution estimated twenty years ago, including almost $27 million on four heavy-water plants.)
Thirdly, Project 9 is an opportunity to consider anew the management unto dismissal of the peripheral abilities and ambitions of British Columbia by Canada’s Laurentian metropolis.
The CPR, for example, had to approve the production contract between its subsidiary, Consolidated Mining and Smelting, and the U.S. war department.
And then the Canadian government located its nuclear-research efforts during and after the Second World War in central Canada, far, far, far from the heavy water in British Columbia. There are probably good Laurentian Ascendancy reasons for why the water went to Chalk River, and not Chalk River to the water, doubly so when the water was produced upriver from the pioneering Hanford facilities in Washington state.
On the proverbial other hand, Codename Project 9 meant that some admirably accomplished men lived and worked in the West Kootenay countryside in the years of the Second World War.
The federal government seconded three of them for nuclear-research work back East. The Consolidated Mining and Smelting executive who negotiated the U.S. war department contract epitomizes the commercially and scientifically astute man managing a vital wartime industry and making key decisions far, far removed from the metropolis. The Americans attempted to lowball Consolidated Mining and Smelting, but its chief executive, McGill-educated Selwyn Gwillym Blaylock (1879-1945), countered successfully.
Further, the Americans weren’t asking Consolidated Mining and Smelting to take on the production of an unknown product by an unknown production method. Blaylock knew about heavy water and could offer the Americans a production facility that they only had to modify, not build.
Perhaps Ron Verzuh might consider a biography of S.G. Blaylock for his next book.
Mike Sasges’ favourite trailering trip after retirement was a “WMD wander” that took him from Richland, Washington, where his wife’s American cousin resides, to Santa Fe, New Mexico — from Hanford to Los Alamos. A retired Vancouver newspaper editor and reporter, Mike has written two essays for The Ormsby Review, “From Quilchena Creek to Flanders” (#39, November 7th, 2016) and “Chief Tetlenitsa’s Apples: Commercializing Indigenous Horticulture in British Columbia, 1907-1916,” (#124, April 25th, 2017), as well as several recent book reviews. Mike Sasges has an MA in Graduate Liberal Studies at Simon Fraser University. He lives in Merritt.
The Ormsby Review. More Books. More Reviews. More Often.
Editor/Designer/Writer: Richard Mackie
Publisher/Writer: Alan Twigg
The Ormsby Review is a journal service for serious coverage of B.C. books and authors, hosted by Simon Fraser University. The Advisory Board consists of Jean Barman, Robin Fisher, Cole Harris, Wade Davis, Hugh Johnston, Patricia Roy, David Stouck, and Graeme Wynn. Scholarly Patron: SFU Graduate Liberal Studies. Honorary Patron: Yosef Wosk. As of September, 2018, Provincial Government Patron: Creative BC
“Only connect.” – E.M. Forster |
Causes Of Burning Muscle Pain
A burning muscle pain can be the result of a number of things ranging from overexertion, to one of several disorders, bursitis, or disease, most of which are rather rare. The most common experience most people have with burning muscle pain is during the latter stages of and following a heavy workout, or running. In such activities "getting a burn" is usually considered a good thing, as it means the muscles are being pushed to the point where, although becoming tired, they are at the same time becoming stronger.
One of the characteristics of muscle burning pain when working out is that of the after burn. Burning muscle pain does not necessarily cease when the activity ceases, though it tends to, but may return the following day, the muscle's way of telling us a little additional rest is in order. This is one of the reasons weightlifters and bodybuilders vary their exercise program from day to day, to give muscles needed rest. In fact, when preparing for an athletic event, or simply getting into shape, the same exercises should not be performed day after day. Part of the reason is one wants to work various muscle groups in different ways, and you can't do everything at once. A second reason is the danger of boredom if the same routine is followed day after day, and the third, as mentioned, is to give muscles a rest and not risk overexertion to the point where muscle is damaged.
Fibromyalgia - Burning muscle pain is not always a "good" thing as it can be the symptom of a disorder or of a disease. One of the more common disorders which can cause a burning sensation at various places in the body is fibromyalgia. When one suffers from fibromyalgia, the burning will usually be experienced in rather specific places on the body, most commonly in the neck, shoulders, lower back, and hips. In some instances a burning pain may be experienced all over. Medications may be taken to relieve or diminish the pain but are usually not successful in getting rid of the pain altogether.
Uncommon Causes - There are several diseases that can cause burning muscle pain. Most of them fortunately are quite rare, and often involved disease or damage to nerves or the central nervous system. One of these is simply referred to as CNS, Central Pain Syndrome, which is the result of damage to the spinal cord, brain stem, or the brain itself. CNS often produces a mixture of pain sensations, one of them being burning muscle pain.
Another disease, Meralgia paresthetica affects the thigh and results from nerve pressure, entrapment, or damage in the region of the upper thigh. Meralgia paresthetica is somewhat rare, and most often involves a numbing sensation in the upper thigh, but burning muscle pain can also be experienced. This condition is very often only temporary and rest is the most common form of treatment. The symptoms however are similar to some of the symptoms of multiple sclerosis, indicating if the condition persists, tests for MS might be in order. Mononeuritis multiplex and Neuropathic pain are two other rare conditions causing burning sensations and are the result of nerve damage.
Various Injuries And Disorders - Injuries to muscles and joints can be another cause of burning pain. Injuries or overexertion in the shoulder blade and upper back can result in a burning sensation, although an aching pain is probably more common. Burning muscle pain is quite often a symptom of a rotator cuff injury. One of the strangest causes of a burning muscle pain in the shoulders is gall bladder disease, which would seem to have little to do with the shoulder. This type of a situation is medically known as a "referred" pain. Other disorders such as heart disease and osteoporosis of the spine also tend to refer pain to the area of the shoulder and shoulder blade.
Bursitis was mentioned earlier as one of the causes of burning muscle pain. Bursitis is an inflammation of one or more of the bursa, the fluid filled sacks that lubricate tissues in the body, primarily tendons. Bursitis symptoms include joint and tendon pain often experienced as burning muscle pain. |
The lymphatic system is a network of lymph nodes and lymphatic vessels. Its primary function is to transport and filter lymph fluid throughout the body. This fluid contains mostly water and protein and is a vital component in maintaining the body's fluid levels. Lymphedema is a medical condition that may occur when regional lymph nodes are compromised due to surgery, radiation or injury, or if there is a congenital deformity within the lymphatic system. This results in an abnormal accumulation of fluid in the surrounding tissue and eventually in the entire limb. Lymphedema can be manifested in two ways:
Lahey Hospital & Medical Center's Lymphedema Center offers a multidisciplinary team approach for the evaluation and treatment of lymphedema. The Vascular Medicine Department provides many specialists with expertise in vascular diseases, including lymphedema. In addition, physical therapy provides Vodder- and Lerner-trained therapists who are certified in the treatment of lymphedema.
There are various treatments for lymphedema. At Lahey Hospital & Medical Center, one method utilized is complete decongestive physiotherapy (CDP). A patient may be directly referred to physical therapy, or may be seen first in Vascular Medicine for an evaluation and to rule out any vascular complications. A referral is then made to physical therapy, where the extent of the therapy needed is determined. CDP is usually administered daily for approximately two to four weeks. CDP treatment consists of many integral components. The first is manual lymph drainage (MLD), which utilizes specific techniques to assist in mobilizing fluid. Compression bandaging of the affected limb(s) with specialized minimally elastic cotton bandages is applied following MLD to prevent re-accumulation of lymph fluid. The patient wears the bandaging continuously in the time between treatments. MLD and compression bandaging continues until sufficient decongestion is obtained. CDP will not be effective without the combination of MLD and compression bandaging. Patients perform specific exercises twice daily and apply a low pH, lanolin-based skin lotion daily to keep skin healthy and prevent infections. When sufficient decongestion is obtained, the maintenance phase of therapy begins. The patient is fitted for a custom compression garment, which is worn daily, and compression bandages are worn nightly. This process is necessary to ensure continued decongestion and reduce the risk of developing serious cellulitis infections. Again, depending on the patient's condition, the extent of compression will vary. Some patients will need to wear a form of compression at all times, while others will require it less often. Please note that CDP is not a cure for lymphedema. It is, however, a treatment method that may allow a significant decrease in swelling, pain discomfort and the risk of serious infection, while also increasing the patient's mobility. Therapy is extremely effective in obtaining these goals, but lymphedema is a lifelong condition that requires a continued commitment to maintenance.
Lahey Hospital & Medical Center's Lymphedema Center is a sponsor of the National Lymphedema Network. This non-profit organization's mission is to create awareness of lymphedema through education and to promote and support the availability of quality medical treatment for all individuals at risk for, or affected by, lymphedema. The Lymphedema Center also has an affiliation with the Greater Boston Lymphedema Network. This patient-oriented group meets monthly here at Lahey Hospital & Medical Center, with the goal of educating and supporting patients and their families with regard to lymphedema. Guest speakers are invited to share their information on various topics including lymphedema, lipedema, venous insufficiencies, cancer, acupuncture, herbal medicines and nutrition. For further information or referrals, we can be reached through: Lymphedema Center Phone: 781-744-2760 Vascular Medicine Department Phone: 781-744-8470 |
802.11g is one of the standards used for high speed wireless networks, commonly known as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in June of 2003 and uses a 2.4 to 2.5 gigahertz radio frequency to send and receive data from one device to another. There are several standards that are in use today for wireless communication, others include 802.11a, 802.11b and 802.11n. The standard 802.11g is becoming quite popular during the last several years for its speed, quality of transmission and competitive price.
More people than ever are building Wifi networks, either for their business, home use or for commercial enterprises such as to provide Internet access at a cafe. For many people, building a Wifi network usually involves the standard 802.11g.
In order to set up a home or business Wifi network on the 802.11g standard, you will need an 802.11g wireless router and an 802.11g compatible Wifi card. Usually a Wifi router is hooked up to either a broadband Internet connection or a computer server. In order for each part of the network to communicate with one another it is necessary that they all have a Wifi card able to send and receive 802.11g signals.
802.11g has become very popular as a Wifi standard in the last couple of years due to 5 major attributes. They include Speed, Range, Clarity of the Signal, Price and Compatibility
The max speed of 802.11g is 54 megabits per second; however expect around 11 megabits per second in normal day to day use.
802.11g delivers a range of about 33 meters or about 100 feet. While this is less than its cousin 802.11b which delivers a range of about 150 feet, most people's networks are well within this range's limits. It is important to note that range can vary depending on many factors including whether a network is set up in an apartment, office environment, if a router is on another floor than computers tied into the network or if there is interference from signals operating close to 802.11g's.
Clarity of the Signal
802.11g operates on the frequency 2.4 -2.5 GHZ, for the most part, the clarity of the signal is generally clear and interference free. In addition, this frequency works well penetrating walls or other types of building obstructions due to the fact it operates at low frequencies.
The Price for 802.11g is relatively affordable for both corporations, home based businesses and private home networks. Expect price points around the $100 mark for both the router and Wifi cards.
A great reason to choose 802.11g is due to its downward compatibility with 802.11b. The "b" standard is widely used and "g" can work seamlessly with this standard.
Other 802.11 Standards
Besides 802.11g, you should be aware of other types of standards most notably 802.11b. 802.11b is another common standard similar to "g" except that its speed is much slower at about 11 megabits per second max. However, the range of the 802.11b is slightly more than the "g" standard. Where "g" has a range of about 33 meters (100 feet), "b" standard has a range of 50 meters (150 feet). Regarding price, "b" is a little less expensive.
This is another standard actually created at the same time as 802.11b. It operates at a higher frequency and thus sometimes has less interference. It should be noted that 802.11a has a shorter range than "b". 802.11a is not as popular as "b" or "g". Possibly the reason why this standard did not catch is because this standard is much more expensive than its cousin 802.11b making it less attractive to businesses and individuals. |
Geof Stone: "Race in America"
In his eloquent remarks the other day about Trayvon Martin, President Barack Obama closed by noting that, although we have a long way to go before we resolve the issue of race in America, we have made progress. We are not yet, he said, a "perfect Union," but we have taken steps towards becoming a "more perfect Union."
We have, indeed, made progress since the days when white slavers transported shackled Africans in the dark hulls of slave ships to be sold as chattel to their new white owners. We have, indeed, made progress since the days when the white owners of our African slaves held virtually absolute power to buy, sell, whip and rape their property and when the Framers of our Constitution saw fit to count each one of them as three-fifths of a person. We have, indeed, made progress since the turn of the last century, when African Americans, especially but not exclusively in the South, were prevented from voting, segregated in separate and inferior "colored" train cars, schoolrooms and hospitals, denied the freedom to marry members of the "superior race," and lynched in the most brutal and horrifying manner. We have, indeed, made progress.
We owe that progress to the scores of courageous civil rights activists who put themselves in harm's way in order to fight for justice and equality; to individuals like Abraham Lincoln, Earl Warren, Rosa Parks, Martin Luther King, Jr., and Lyndon Johnson; and to pivotal legal turns like the 13th, 14th and 15th Amendments, Brown v. Board of Education, the Civil Rights Act of 1964, and the Voting Rights Act of 1965. But even though, as President Obama observed, things are better for African Americans in our nation today than when he was the age of Trayvon Martin when he died, the moral crisis of racism remains an open wound. |
|Family overview: The Ictaluridae Catfish family is also known as the North American freshwater Catfishes. Of the 40 species found north of Mexico, 13 are known to live in Pennsylvania. These include three commonly called “Bullheads” and three called “Catfish.” The rest, much smaller species, are called “Madtoms.” The Yellow and Brown Bullheads are found around the state. The Black Bullhead is known from a few counties in western Pennsylvania, in the Ohio River watershed. The White Catfish, Channel Catfish and Flathead Catfish are medium-sized to very large fish and are avidly sought by anglers.
The Madtoms belong to the genus Noturus. They are not as likely to be seen as often as the other Catfishes because of their miniature size, their secretive nature, and their rarity or scattered distribution. Two Madtoms are endangered species in Pennsylvania and are found only in French Creek, in the northwest corner of the state: The Mountain Madtom, which grows to just two or three inches, and the Northern Madtom, which grows to about four inches. The Northern Madtom is also endangered. The Brindled Madtom is a threatened species. At the other end of the Catfish family scale are the Blue Catfish and Flathead Catfish, which can grow to more than 100 pounds and four to five feet long. Catfishes are popular sport fish. Some species are raised commercially for human consumption, and the tiny ones are part of the forage base of small fishes in their home lakes or streams. Some Madtoms are considered indicators of water quality.
General identification: Catfish are scaleless, with a tough, smooth skin. All species have eight appendages on the head called “barbels,” four on the upper jaw and four on the chin. The barbels are sometimes called “whiskers.” They are fleshy, supple projections that narrow to a tip. The barbels don’t inflict the notorious sting of the Catfish. That’s done by the strongly developed pectoral fin spines, one on each side of the fish, and the dorsal fin. The species have variously developed poison glands at the base of these spines, which can inflict a mild to beelike sting. The Madtoms are especially known for their stinging spines. There is disagreement among scientists whether it’s the gland at the base of the spine or the membrane around the spine that has the poison. Catfish also have a stout spine at the leading edge of the dorsal fin. On Madtoms, the adipose fin, a fleshy lobe between the dorsal fin and the tail fin, is joined with the tail fin. On other Catfish, the adipose fin is separate. Some Catfish have moderately to deeply forked tails. Albinism, which results in a whitecolored, pink-eyed Catfish, is known to occur.
Life history: Catfish spawn in spring to early summer. Both males and females may contribute to nest construction and care of eggs and young, but usually that duty is just the male’s. Nests can be in holes in river or lake banks, in the open, or under rocks and other submerged objects. The female is clasped by the male and is stimulated to deposit a mass of sticky eggs. The male or both parents guard the nest and protect the young for a time. Young Catfish form tight schools and separate individually only to hide when they have been frightened. Adult Catfishes are most active at night. When they are active in daytime, it is generally in muddy, clouded water. They have poor vision and use the sense of smell and the taste buds on the skin, lips and barbels to find food.
Species overview: Although the White Catfish has been stocked in waters where it was not native, its original home was Atlantic Coast watersheds from the lower Hudson River in New York, south to Florida and on to Mississippi. In Pennsylvania the White Catfish’s range has included the Susquehanna and Delaware River systems, and it has been introduced into parts of the Ohio River watershed. Its genus name “Ameiurus” means “unforked caudal fins,” and its species name “catus” means “cat.”
Identification: This medium-sized Catfish has a back and upper sides that are light blue-gray to dark slate-gray. This shades lighter, with gray or blue markings, toward the belly, which becomes silvery or yellow-white. The chin barbels are whitish. The caudal fin is somewhat forked, but the fin’s lobes are not as sharply pointed as are those of the Channel Catfish, and may be somewhat rounded, especially in older fish. The head is very broad. Young White Catfish are slender. Older fish become heavy bodied and robust-looking. The spine on each pectoral fin has a sawtoothed back edge. The anal fin has 25 or fewer rays. The maximum size for the White Catfish is about 24 inches.
Habitat: White Catfish live in channels, pools and backwaters in rivers or streams, mostly in sluggish current over mud bottoms. They go into swift water, but not as much as Channel Catfish. Of all the Catfishes, White Catfish are the most tolerant of salt water. They live in brackish bays and tidewater sections of streams. They also live in lakes and river impoundments. In habitat preference, White Catfish are midway between the Channel Catfish, which uses firmer bottoms and swift currents, and Bullheads, which live in slow water over soft, silty bottoms.
Life history: The White Catfish’s spawning habits are similar to those of the Channel Catfish, although it has less of a tendency to migrate when looking for a spawning site. Male White Catfish excavate a burrow nest or use an existing hole. The sticky egg mass is deposited there by the female. The male briefly guards the eggs and the young. White Catfish eat some plant material, but they eat mostly animal life like midge larvae and other aquatic insects, crustaceans and fish.
Species overview: The North American Catfish family includes species known as the “Bullheads.” They are the Brown Bullhead, Yellow Bullhead and Black Bullhead. All are similar in appearance, with some anatomical differences and different coloring. The Yellow Bullhead’s natural range is the Atlantic and Gulf Coast watersheds from New York to northern Mexico. It is also native to the St. Lawrence River and Great Lakes system and the Mississippi River watershed. Yellow Bullheads have also been widely stocked. Although it is found in all of Pennsylvania’s watersheds, the Yellow Bullhead is not as plentiful as the Brown Bullhead.
Identification: Yellow Bullheads may grow 18 or 19 inches long, but most are much smaller. The back is yellow-olive to a slate-gray, shading to a lighter yellow-olive on the sides. The belly is bright-yellow or whitish. The chin barbels are white or yellow. Yellow Bullheads have a long anal fin with 24 to 27 rays. Like the Brown Bullhead, there are five to eight sawlike teeth on the back edges of the pectoral spines. The rear edge of the tail fin is nearly straight or rounded.
Habitat: The Yellow Bullhead is tolerant of low oxygen and highly silted water. It can withstand pollution that many other fishes cannot tolerate. Yellow Bullheads prefer backwaters and slow currents in streams and rivers. They also live in ponds and reservoirs, especially where there is a mucky bottom and dense aquatic vegetation. Where logs, stumps and water weeds are removed, the number of Yellow Bullheads decreases.
Life history: Yellow Bullheads spawn in spring, usually May, with both males and females helping to excavate a nest. The nest can range from a shallow depression in the muddy bottom to a two-foot-deep burrow in the stream or lake bank, usually near protective rocks or stumps. The females produce from 1,700 to 4,300 eggs, depositing up to 700 at each spawning. The care of the sticky, yellowish-white eggs and the hatched fry is the duty primarily of the male, which guards the young fish until they are about two inches long. Yellow Bullheads are omnivores and eat aquatic insect larvae, snails, freshwater clams, crayfish, small fish and other underwater animal life, as well as plant material. They have an excellent sense of smell, which helps them locate food in muddy water.
Species overview. The Brown Bullhead is the most widely distributed Bullhead, found across Pennsylvania in suitable habitat. It is native to Atlantic and Gulf Coast watersheds, from eastern Canada to Alabama. It was also originally found in the Great Lakes system, Hudson Bay and the Mississippi River watershed. It has also been widely introduced. Its species name “nebulosus” means “clouded,” referring to the fish’s mottled sides.
Identification: An 18-inch and three-pound Brown Bullhead is a trophy, and is near the size maximum of the species. Brown Bullheads average 12 to 15 inches. The upper part of the head, back and sides are dark to light yellow-brown or olive-brown, shading to grayish white or yellowish white on the belly. The sides have brown or black mottling. The Brown Bullhead’s chin barbels are dark, grayish black, but may have whitish color at the base. These help to distinguish the Brown Bullhead from the Black Bullhead, which is known from a few northwestern Pennsylvania counties. The Black Bullhead’s chin barbels are all black. The Brown Bullhead’s caudal fin is square-tipped, or slightly rounded. Its strong pectoral fin spines have five to eight sawlike teeth on their rear edges. The anal fin has 18 to 24 rays, usually 22 or 23.
Habitat: Brown Bullheads live in several habitat types, but they are found mostly in ponds and the bays of larger lakes, and in slow-moving sections and pools of warmwater streams. They are bottom-dwellers, usually living over soft mud or muck, where there is plenty of underwater vegetation. Brown Bullheads can sometimes be found as deep as 40 feet. They are tolerant of very warm water temperatures, high carbon dioxide and low oxygen levels, and levels of pollution that other fish cannot tolerate.
Life history: Brown Bullheads spawn in late spring, May to June, when water temperatures reach 70 degrees. Both males and females participate in nest construction, which can be a shallow saucer on the bottom mud or sand, or among roots of aquatic plants, near the protection of stumps, rocks or downed trees. Nests can also be excavated holes or natural burrows. Spawning can also occur under sunken boards and logs, and in hollow stumps. The water depth for spawning ranges from six inches to several feet. The nests are usually around the shoreline or in coves, or in the mouth of a creek.
Brown Bullheads usually spawn in the daytime. Their courtship includes the male and female caressing each other with their barbels. They spawn beside each other, but facing in the opposite direction. The females produce from 2,000 to 13,000 cream-colored, mucous-covered eggs. Sometimes one or both parents eat some of the eggs. Both male and female Brown Bullheads cooperate in protecting the nest, eggs and young. The parents fan and stir the eggs with their fins, aerating them. The parents have also been seen to take the eggs into their mouths, presumably cleaning them, and to blow the eggs back into the nest again. Hatched Brown Bullheads are pitch-black and may be mistaken for tadpoles. One or both parents shepherd the loose ball of fry for several weeks, until the young are about one inch long.
Like other Catfish, Brown Bullheads are active mostly at night, when their sensitive barbels help them find food in the darkness. They are omnivorous bottom-feeders and eat a wide variety of plant and animal material, including aquatic insects and larvae, worms, minnows and other small fish, crayfish, snails, freshwater clams and even algae. Brown Bullheads are able to exist on atmospheric air for a time. They can remain alive for hours if kept moist when they are out of the water.
Species overview: Next to the Flathead Catfish, the Channel Catfish is the largest Catfish in Pennsylvania. Weights of up to 15 pounds are not unusual at lengths of about 30 inches. The state record is over 35 pounds. Channel “Cats” are avidly sought sport fish and are raised commercially for the table. They are found statewide, introduced where they did not occur naturally. The native range of Channel Catfish is believed to be the Great Lakes and St. Lawrence River watershed, the Missouri River system, the Mississippi River watershed, Gulf of Mexico watershed and parts of Mexico. They were not native to the Atlantic Coast north of Florida. The Channel Catfish’s species name “punctatus” means “spotted,” referring to the small, dark spots on its sides. The Channel Catfish is the only Catfish that has these dots.
Identification: The Channel Cat has a deeply forked tail, with tail lobes that are sharply pointed. In bigger fish, the fork is less noticeable or disappears. Channel Cats have 24 to 30 rays on the anal fin, a small, fleshy adipose fin that is separated from the tail, and typical Catfish spines on its dorsal and pectoral fins. The barbels are black and long. The back is bluegray to slate-gray or bluish olive. The sides tend to be silvery-gray, and the belly is whitish. Except for some large adults, especially the males, Channel Catfish have small, irregular spots on the sides and back. None of the other Catfishes has these spots. Males become darker, almost blue-black, during spawning time.
Habitat: The Channel Catfish is an adaptable fish, usually found in clear, warm lakes and moderately large to large rivers, over clean sand, gravel or rock-rubble bottoms. It is generally not found in the muddied, weed-choked waters that some other Catfish species frequent. Channel Cats, especially young fish, may be found in fast-flowing water. Usually, Channel Catfish prefer deep pools and runs in rivers that have alternating pool and riffle habitats. It is also found in reservoirs, lakes and farm ponds, and even in some of the larger Trout streams.
Life history: Channel Catfish spawn in May to early June, when the water temperature ranges from 75 to 85 degrees, with 80 degrees the optimum. The male prepares the nest, which is usually a depression or hole in an undercut bank, or an excavated burrow under logs or rocks. Sometimes Channel Cats spawn in sunken, hollow logs or abandoned muskrat holes. In clear ponds, spawning Channel Cats must have semidarkened shelters, either natural or provided. From reservoirs, Channel Catfish sometimes move upstream to spawn in tributary rivers. A female Channel Cat may lay 2,000 to 70,000 eggs per year, depending on her size. After spawning, the males protect the adhesive egg mass and aerate and clean the eggs by fanning their fins. The males also guard the hatched fish for a time. Young Channel Cats are insect-eaters, feeding on mayfly nymphs, caddis larvae and midge larvae. As they grow, they switch to fish, crayfish and mollusks, but still feed on aquatic insects, and occasionally eat plant matter. Yearling and subadult Channel Cats are more tolerant of fast water than larger adults. They move out of slow water into the quicker current or swim short distances into tributary streams to feed. Channel Cats feed mostly at night, but may forage on the bottom, where it’s dim during the day. Channel Catfish, especially young fish, have been known to feed on the surface. Like other Catfish, at night they depend on their barbels and their sense of taste to find food. Even so, Channel Cats are believed to be more of a sight-feeder than other Catfishes, because of their clear-water habitat.
Species overview: The Stonecat is one of the largest members of the Madtoms, a group of small fishes in the Catfish family. The genus name “Noturus” means “back tail.” It refers to the way the adipose fin is fused its entire length to the Madtom’s back. The species name “flavus” means “yellow” and describes the fish’s color. The Madtoms are not well-known because most are little fish and hide during the day, even burying themselves in the gravel, emerging to feed at night.
In Pennsylvania there are six Madtom species. Some are rare, like the Mountain, Brindled, Tadpole and Northern Madtoms. The Margined Madtom of eastern Pennsylvania is widely distributed and abundant. Madtoms have poison glands at the base of their pectoral spines. If handled improperly, they can give a sting as painful as a bee sting.
Margined Madtom Noturus insignis
The Stonecat is found throughout the Mississippi River and Great Lakes watersheds. It is not found in Atlantic Coast streams south of the Hudson River. In Pennsylvania, it is the most common Madtom of the western part of the state, living in the Ohio River and Lake Erie watersheds, and can be locally plentiful.
Identification: The slender-shaped Stonecat grows to about 12 inches long, but averages six to eight inches. Its back is yellow-olive to slate-gray or blue-gray. The sides are lighter, with yellow or pink tints. Its underparts are yellow or white. The tail is rounded or square-looking, with a light border. The adipose fin is completely bound to the body, a trait that distinguishes the Madtoms. The upper jaw is much longer than the lower jaw. Its upper barbels are gray. The chin barbels are white. There is a light-yellow or whitish oval-shaped spot on the rear portion of the dorsal fin. The Stonecat has no or few and weak sawteeth on the back edges of its pectoral spines. The anal fin has 15 to 18 rays.
Stonecat Noturus flavus
Habitat: The Stonecat lives in rocky riffles or rapids in creeks and small to large rivers. It is also found over gravelly wind-swept and wavestirred shoals of lakes, including Lake Erie. The word “stone” in its name refers to where it likes to live. It is a warmwater fish and avoids cold water.
Life history: Stonecats spawn in early summer, beginning at about 77 degrees and peaking at 82 degrees. The females produce up to 1,200 eggs annually, laying 100 to 500 of them in each nest. The opaque, yellow eggs are attached in a compact, sticky mass to the underside of flat stones or similar objects in flowing water. The parents guard the eggs and young for a time. Like most other Catfish, Stonecats feed at night and have a varied diet, especially consuming fishes and aquatic insect larvae such as midges, caddises, stoneflies and mayflies, as well as crustaceans and other small invertebrates.
Species overview: Flathead Catfish grow longer and heavier than other Pennsylvania Catfish. In fact, they are one of the state’s biggest fish, of any kind. Flathead Catfish are known to grow to more than 100 pounds, but 20 or 30 pounds is more likely in Pennsylvania. The Pennsylvania record is over 40 pounds. Flathead Catfish are native to the lower Great Lakes and the Mississippi River basin, from western Pennsylvania southward. They are also in Gulf of Mexico watersheds, and can live in reservoirs. In Pennsylvania, Flatheads are found mainly in the Ohio, Allegheny and Monongahela rivers. Fossils of this Catfish genus that are about 15 million years old, from the mid-Miocene Epoch, can’t be distinguished from the modern Flathead Catfish. The Flathead’s genus name “Pylodictis” means “mud fish,” and its species name “olivaris” means “olive-colored.”
Identification: Flathead Catfish have the scaleless, strong body and the well-developed pectoral and dorsal fin spines typical of Catfish. The tail is only slightly indented, or may appear square or rounded. The dorsal fin is high, and the lower jaw projects past the upper jaw. The body looks long and slender. The upper portion of the Flathead Catfish’s body is yellowish brown to dark, even purplish brown, with black or brown mottling on lighter brown sides. The belly is grayish or yellowish white. It does have a flat-looking head, very wide and depressed. The chin barbels are white to yellow, the fins are mottled, and the anal fin, which has fewer than 16 rays, is short and rounded. Except for very large adults, Flathead Catfish have a white tip on the upper lobe of the caudal fin. Young Flathead Catfish are nearly black on the back.
Habitat: Flathead Catfish are found in large rivers, streams and lakes, usually over hard bottoms. They prefer deep, sluggish pools, with logs and other submerged debris that can be used as cover. Young Flatheads live in rocky or sandy runs in the river and in the riffles.
Life history: The Flathead is a loner and a traveler, leading a solitary existence except at spawning time. Flatheads spawn in early summer, later than Channel Catfish. The Flathead’s spawning behavior is like that of other Catfish. The adults form pairs and build nests in natural cavelike depressions in the bank, or they may hollow out a cavity under an underwater object, like a log or boulder. Their compact egg masses contain from 4,000 to 100,000 eggs. The male guards the nest and the newly hatched fry, becoming aggressive toward the female.
Flatheads grow fairly rapidly and mature sexually at about 15 inches and five years old. They can live to at least 19 years old. Juvenile Flatheads live in riffle areas and feed on larvae and nymphs of aquatic insects. As the Flathead grows, it switches to crayfish and fishes, although many items are on its menu. During the day, Flathead Catfish stay out of sight, hiding beneath undercut banks, in brush piles and log jams. At night they forage in a variety of habitats, including very shallow riffles where their backs and dorsal fins may be exposed. For this reason, angling at night is the way to catch a big Flathead. Biologists report that one possible feeding strategy of the Flathead is to lie motionless with its mouth open, until a fish looking for a spot in which to hide swims in. Others have observed Flatheads lunging and grabbing prey after they have lain in wait. |
Asbestos is a toxic, naturally occurring mineral that was found in thousands of products - such as home and boat insulation, brake pads, and floor and ceiling tiles - through roughly 1980, when it was determined to cause a myriad of life-threatening asbestos exposure-related diseases, including asbestosis, lung cancer, and mesothelioma.
The Dangers of Asbestos Exposure
Researchers agree that when asbestos fibers are inhaled, they get trapped in the lungs, causing scar tissue build-up and lesions. Such tissue and lesions lead to difficult breathing, disease, and, too often, death.
In recent years, there has been an alarming increase in the number of cases of mesothelioma and other asbestos-related diseases, probably because many of such ailments don't surface until years - sometimes as long as four decades - after exposure. That puts the thousands of construction workers, drywallers, shipbuilders, floor covering installers, automobile repair workers, cementers, oil refinery workers, and other laborers who worked with asbestos during its hey day - between 1940 and 1980 at serious risk for falling ill with pleural mesothelioma, asbestosis, or lung cancer in the near future.
Mesothelioma - Are You at Risk?
If you have worked with asbestos, even for a short time, you may be at risk for developing asbestosis, lung cancer, or mesothelioma. Contact a mesothelioma attorney who specializes in asbestos exposure-related diseases and mesothelioma in your area. He or she can help you obtain the compensation you deserve.
Mesothelioma Litigation and Lawsuits
Asbestos was first discovered to be dangerous at the beginning of last century. It has been known as a carcinogen since the 1960s and was subsequently banned in more than 30 countries under grounds that there is no safe level of asbestos exposure. Mining and manufacture of most asbestos products has been ceased in the United States, yet we continue to import more than 30 million pounds of asbestos in foreign products each year. A new recommendation by an EPA-sponsored panel of asbestos industry members and other experts on the topic called for a ban of all importation, manufacture, and mining of asbestos and asbestos containing products in the United States.
Although this may be a good sign, it also means that new risks of asbestos exposure are still developing. Since mesothelioma take years and even decades to develop, many more cases of mesothelioma will be diagnosed and more lawsuits will be filed. The need for qualified mesothelioma attorneys will continue as long as asbestos exposure causes mesothelioma and other asbestos-related diseases.
Find a Mesothelioma Attorney
An experienced mesothelioma lawyer may be able to help secure a favorable mesothelioma settlement, verdict or judgment for those suffering asbestos injury. A mesothelioma attorney that is aware of the trends and developments with mesothelioma litigation and legislation will be able to build a strong case for asbestos exposure victims. |
A buzz-phrase that you may be hearing recently is "The Internet of Things". This phrase summarizes a movement that has been happening for several years – connecting and monitoring things via the web – things like sensors and controllers. The Internet of Things will become very useful when this patched together network operates on your behalf – presenting data to you via the web as necessary and controlling systems in the background.
The data that you would receive from a sensor are strings. Perl's powerful string operations allow Perl to be a perfect language to process sensor feedback and distribute to data stores. The host of CPAN drop-in modules will allow you to connect hardware to web services enabling rapid idea prototyping for projects that link the real world to the virtual world. Imagine this application without Perl: You can track your cell phone via Google Latitude then automatically turn on your air conditioner when you get close to your home.
The object of this talk is to discuss Perl's role in the emergence of the Internet of Things and how you can get started creating applications. |
The craft of essay writing cannot be mastered overnight. It requires regular practice in the right direction. Given the high weight age provided to Essay writing in the selection process of various top MBA colleges including the IIMs, XLRI etc, it is important for an aspirant to master this craft. In this article, we provide you certain sentence structure rules that you should keep in mind while writing essays.
The comma is the most misused punctuation mark, possibly because writers fret so much about following the rules that they forget to pay attention to how the words sound when spoken. Commas allow a reader understand the rhythm of the sentence. If you are having problems with commas, say your sentence out loud, and listening for natural pauses. The task of a comma is to slow the reader down for a brief moment, making the reader pause. The omission of a comma can make phrases and clauses to collide into one another, thus confusing the reader. Commas can alter the meaning of your sentence.
The pasta tastes terrible, however the cook fixes it.
The pasta tastes terrible; however, the cook fixes it.
In the first sentence, the pasta tastes terrible no matter how the cook fixes it. In the second sentence, the cook improves the taste of the pasta. Again, the comma influences the meaning.
Rules for Commas
- Use a comma to divide two independent clauses connected by and, but, or, nor, for.
David was usually a shy man, but he screamed when he entered the room.
The unknown man lying under the tree appeared to be dead, or just possibly he was only sleeping.
If the independent clauses are short, you can do away with the comma.
The lady was still and her foot was bleeding.
His cap was on but his trousers were off.
- A comma is used to separate elements in a list or series. Don't omit the final comma.
Rahul tried to take a breath, to keep from fainting, and to remember his first aid.
Next to the man was a teapot, a packet of biscuits, and his dog.
- A comma is used to distinguish introductory phrases and clauses from the independent clause, especially if the phrase or clause is long.
After catching his breath, Ram squatted next to the doctor and took his pulse.
When he felt nothing, David picked up the feather and blew it.
Although he had never played the piano before, he somehow managed to make beautiful music.
GDPI Essay Preparation Links:
- Incase the introductory phrase is either a gerund, participial, or infinitive phrase, put a comma even if the phrase is short. Otherwise the reader may be confused:
When Ram began to speak, rats ran across the room.
Not: When Bob began to speak rats ran across the room.
- When there is a series of adjectives, use a comma if the adjectives could also be separated by 'and'.
The big, fat and tough man began to start crying.
(Wouldn’t write as: The big and fat and tough man)
If the 'and' doesn't seem to fit, don't use the comma:
The man's blue cotton shirt was kept in a corner.
(Wouldn't write as: The man's blue and cotton shirt)
If the rule stated above seems confusing, read the sentence out loud. If there is a slight pause between adjectives, put in commas. Otherwise, leave them out. Another test: if you can change the order of the adjectives, put in commas.- For example:
The charming, brilliant teacher
Not: The brilliant, charming teacher
The yellow party dress
Not: The frilly yellow dress
- Use commas to set off clauses but do not use commas for restrictive clauses. (Quick review: An essential or restrictive clause is one that can't be left out of a sentence. Clauses that don't define can be lifted from the sentence without changing the meaning.)
Apples that are green taste sour.
(That are green defines which apples we mean)
Apples, which grow in the tropics, do not need refrigeration.
(Which grow in the tropics refers to all apples. The clause can be taken from the sentence without altering the meaning.)
Let's look at a sentence that you could punctuate either way, depending on the meaning:
The men who were hungry and mentally tired began eating the KFC bucket.
(who were hungry and mentally tired is a defining clause, telling us which men we mean
The men, who were hungry and mentally tired, began eating the KFC bucket.
Who were hungry and mentally tired describes all of the men and doesn't differentiate these men from other men who weren't hungry and mentally tired.)
- Words or phrases that interrupt the sentence should be set off by commas.
Now then, let's get down to work.
"Help me," he said, before falling in the pond.
On the other hand, error can lead to revelation.
What the coach asked, in fact, is impossible to achieve.
- Use commas to set off an appositive. An appositive is a noun or pronoun that explains or identifies the noun that precedes it.
Mrs. Wormwood, my favorite teacher, is wearing a wig.
Sussie, the president of the student council, is on probation.
Remember that commas are one way to make your writing clear. Reading your sentences aloud is a very good way to find the natural place for commas, as is inspecting your sentences for ambiguity or confusion.
- Use a semicolon to link two separate clauses.
To give a good New Year's party, you must consider the lighting of the dance floor; no one feels comfortable under the bright glare of fluorescent lights.
Please note that the two clauses are connected in thought. Also-and this is the thing to understand about semicolons-you could use a comma and a conjunction in place of the semicolon.
To give a good New Year's party, you must consider the lighting of the dance floor, since no one feels comfortable under the bright glare of fluorescent lights.
- A semicolon is used to separate elements in a list if the elements are long - or if the elements themselves have commas in them.
To get completely ready for your dinner, you should wash your utensils; make sure your old stereo works; prepare a lot of tasty, strange food; and expect weird, antisocial, and frivolous behavior on the part of your guests.
- Semicolons belong outside quotation marks.
A beautiful lady at the party sat in a corner and read "The Secret Diary of Luv Khurana"; she may have been shy, or she may have found "The Secret Diary of Luv Khurana" too exciting to put down.
- Use a colon when making a list.
There are four ingredients necessary to a good party: music, lighting, food, and personality.
- Use the hyphen with the compound numbers twenty-one through ninety-nine, and with fractions used as adjectives.
CORRECT: Seventy-five students formed a majority.
CORRECT: A two-thirds vote was necessary to be considered eligible.
- Use the hyphen with the prefixes ex, all, and self and with the suffix elect.
CORRECT: The law protects against homicide.
CORRECT: The president-elect was called up to chair the meeting.
- A hyphen is used with a compound adjective when it comes before the word it modifies, but not when it comes post the word it modifies.
CORRECT: The no-holds-barred party continued late into the night. The party continued with no holds barred.
- Use the hyphen with any prefix used before a proper noun or adjective.
CORRECT: His pro-Asian sentiments were thoroughly applauded.
CORRECT: They believed that his activities were un-European.
- The dash is used to refer to a sudden change of thought. In general, however, formal writing is best when you think out what you want to say in advance and avoid abrupt changes of thought.
CORRECT: The inheritance must cover the entire cost of the proposal-Shiva has no other money to invest.
E. The Apostrophe
The apostrophe shows ownership. Most of the time, it presents no confusion: David's cat, the man's finger. The tricky part is using an apostrophe when the owner is plural.
RULES FOR APOSTROPHES
- When the plural noun doesn't end in -s, put an apostrophe and -s.
(This is the easy part.)
the man's fingers
the fungal's growth
the rat's hairballs
- If the plural ends in -s, add an apostrophe at the end.
the childs' bottoms
the horses' stable
the politicians' agenda
- When the word is a proper noun that ends in -s, add an apostrophe and an -s. (This is the part people get wrong.) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.