text
stringlengths 229
520k
|
---|
Using data from the Centers for Disease Control and Prevention’s National Youth Behavioral Risk, the authors calculated links between sexual orientation and suicidal ideation.
The analysis of high school student surveys showed that 40 percent of LGBT teens had considered suicide while only 15 percent of heterosexual teens said they had done the same.
According to the Daily Mail, 25 percent of those LGBT teens had attempted suicide. Only six percent of heterosexual teens who had considered suicide actually tried to end their own lives.
The researchers also found that there were variations in risk between those who are gay, lesbian, bisexual, or queer.
Of those groups, female students were overall at the highest risks of suicidal thoughts or attempts, but the gap between risks for gay males and straight males was the widest.
Bisexual students were at disproportionately grave risks, with nearly one third reporting that they had attempted suicide in the last year, and nearly half having considered it.
This group, according to past research, is most likely of any sexual minority to be dismissed, falling between the cracks between ‘gay’ and ‘straight.’
Study co-author Theodore Caputi said:
“Considering planning or attempting suicide is not just a risk of completed suicide. it’s a signal of distress in the lives of thousands of young people across the US.
“Fifteen years ago, we knew they were at a higher risk, and we wanted to see if that was still true.
“There is a lot of work that has to be done to mitigate the stressors that these young people are facing.”
Caputi added that while a recent study found that very few physicians ask the sexual orientation of their patients, this needs to change.
“It seems as though clinicians should discuss sex orientation with their patients, he said. “Obviously [mental health] universal screening would be best, but if it’s not possible, this group is at such risks, we should hone in on it and make sure these adolescents are getting all the support we can possibly give them.”
|
ENERGI LISTRIK DARI SEDIMEN LAUT TELUK JAKARTA MELALUI TEKNOLOGI MICROBIAL FUEL CELL
Sediment microbial fuel cell (SMFC) is one form of the microbial fuel cell (MFC) that can convert organic complex material in the sediment to generate electrons. This research was conducted to determine the characteristics
of marine sediments from the Bay of Jakarta, to know the amount of electric current can be generated through SMFC, and to identify bacteria at the anode SMFC. This research was conducted in several stages which include the characterization of marine sediment samples, making SMFC circuit, electric current measurement, characterization SMFC substrate, and the isolation, characterization, and identi cation of bacteria. The study shows that marine sediments of Jakarta Bay have characteristics which include silty clay loam texture, organic carbon 2.19%, total nitrogen 0.19%, and phosphorus 128 ppm. The electric current generated by the SMFC using xed value resistors 820 Ω ± 5% reach peak production of electric currents on day 21, that is 139.51 mA/m2 with SMFC substrate having organic carbon 1.88%, total nitrogen 0.15%, and phosphorus 88 ppm. Isolation of bacteria at the anode was found three types of isolates, that suspected are Aeromonas hydrophila, Acinetobacter sp., and Bacillus marinus.
Keywords: electrical energy, Jakarta bay, marine sediment, sediment microbial fuel cell
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
|
Business, Politics & Society
Lesson time 20:04 min
David and Karl trade off teaching the importance of polling and focus groups, while also highlighting the limitations of these types of research.
Topics include: The Importance of the Baseline/Benchmark Poll • The Problem With Polls • Gain Deeper Insights With Focus Groups • The Challenge of Focus Groups
There are several different kinds of polls. There's what we call a baseline poll. It's generally a pretty long instrument done at the beginning of a campaign to get a baseline of where things are. During the campaign, you may update that. We call the updates brushfires, where you go in and do a shorter instrument. What are your favorable and unfavorables? And what's the ballot question? But may also include new questions that have emerged about an issue of the moment. But they're typically smaller in size than the baseline poll, but they have a number of questions on them. Then we have tracking, which is generally done at the end of the primary or the end of the general election. It has a smaller number of questions. The samples tend to be a little bit smaller. They're spread over several days. So that you might ask, say, 150 people a night, and you have a rolling average where you take, say, three nights of those people, and then you do a fourth night and drop off the first night. But what you're looking for there is movement. What's the ballot looking like? What's the information flow like? Are they hearing more about you? Are they feeling better about you? Are they feeling better about voting for you? And what are some of the issues that are popping up here at the end? But relatively short and fielded during a relatively short period of time. These are all things that we call quantitative polls. They involve numbers. We're asking a random sample of people, adjusted so it matches the demography of the district and the demography of the likely turnout, and we're trying to get a sense-- numbers and so forth-- of how people feel about you and your candidate and your issues. We also have what are called qualitative instruments and of principle one of these is a focus group. This is where you get a group of people-- very hard to do, so you generally have to use somebody who is an expert in this who has this as their career or their company's focus-- you get a group of people who represent some common view, like undecided voters in a particular area or soft Republicans or soft Democrats who like the candidate of the opposition party. But you get a relatively what you think are one of the key outgroups that you've got to understand better and deeper than the rest of the electorate in order to figure out how to them. And you get them in a room, and using a professional moderator, you walk them through a discussion about the campaign and the candidates and maybe even the advertising. [LIGHT MUSIC] - One of the mistakes that people sometimes make in campaigns is to assume that what worked in some other race or at some other time will work now. And so research becomes very important, and by research here, I mean opinion research-- polling; if you can afford them, focus groups-- to really test the array of messages and get a clear sense of where you're starting. You want to benchmark poll. Even if you're running a small campaign...
David Axelrod and Karl Rove reach across the aisle to offer an inside look at winning campaign strategies. The respective architects of Barack Obama’s and George W. Bush’s historic election victories teach how to develop a campaign platform and reach an audience with consistent messaging. Find the inspiration and tools to get involved at any level, or simply become a more informed, engaged citizen.
Featured Masterclass Instructor
Renowned presidential campaign strategists David Axelrod and Karl Rove reveal what goes into effective political strategy and messaging.Explore the Class
I have a love/hate relationship with politics, and I think both Bush and Obama will be remembered as corrupt criminals and disastrous presidents, but I thoroughly enjoyed and benefited from learning from these two consummate professionals in the field of campaign management--which transcends the candidates. Thank you, David and Karl.
"That's fucking fantastic." lol. I couldn't sum up the class better than that. I don't intend to run for office but I feel like a more informed voter after that class. Thank you.
I wanted a better understanding of election cycle/ campaign and this was the best.
I'd like to watch it again and better absorb the information
|
1814 - 1888
Charles Théodore Frère was a pupil of Camille Roqueplan and Léon Cogniet. He travelled in Normandy, Alsace and the Auvergne before visiting Algeria in 1837 (where he witnessed the fall of the city of Constantine to the French, in their victory over Abd el-Kader’s rebellion). He visited Algeria a second time the following year, stopping en route in Malta, Greece and Smyrna. Frère also stayed for a time in Egypt (around 1853), setting up a studio in Cairo and being formally accorded the courtesy title of bey by the government of the day. He continued on to Syria, Palestine and Nubia, returning to France with a full sketchbook and laden down with oriental objets d’art.
Frère exhibited at the Paris Salon from 1834 to 1887, participated at the Paris Expositions Universelle of 1855, 1867 and 1878 and, up to and including 1887, at the Salon des Artistes Français. He was awarded medals in 1848 and in 1865.
His body of work comprises almost exclusively oriental subject matter; indeed, he was one of the few French artists to have painted Beirut, Jerusalem, Damascus and Palmyra. He also produced a series of thirteen watercolours recording the inauguration of the Suez Canal in 1869, some of which he subsequently redid in oil. Examples of his work include a View of the Sidi Abder Rhaman Mosque near Algiers, View of the Baba-Zounn Suburb, Garden inside the Casbah, Algiers and Mitidja Plain near Algiers. Frère’s strong point was an ability to inject a sense of atmosphere into his landscapes, not least by painting them at different times of the day in order to capture the soft light at sunset or the pale golden yellows of dawn, with Bedouin tents and minarets appearing through a heat haze. As a rule, he eschewed ‘decorative’ elements, preferring to paint in a flat yet cleanly-contoured style. His lesser-known French landscapes exhibit a heavier, fleshier style, oddly reminiscent of Dutch masters of the 17th century.
Museum and Gallery Holdings
Autun (Mus. Rolin): Simoom; Ruins of Palmyra
Bourges: Evening on the Nile
Laval: Vue of Karnak; Ruins at Luxor
Mulhouse: Camel-Drivers in Cairo; Cairo Street
Nancy: Arabs at Rest
New York (Metropolitan Mus. of Art)
Paris (Mus. de la Marine): thirteen watercolours
Perpignan: Museum, Rome
Rheims: Caravan Traversing the Arabian Desert; Arabs at Rest
Rochefort: Washing the Gramigna, Naples
Soissons: Water Trough
Sorry, there are no artworks available at present.
|
Authored by Valerie Lovely
Course Code: OLSOC-200
Written and verbal communication skills are vital to success in business. Whether you operate your own company, work for someone else, plan to seek employment, or want to start your own business in the future, you need to understand your audience and how to effectively reach them.
Business Communications provides an in-depth study of verbal and non-verbal communications. It introduces techniques for choosing the right format, tone, and message for diverse audiences as well as the most appropriate way to deliver the message. It also identifies the barriers that can prevent the message from being received or acted upon in the way you intended and how to handle matters when they do not go as planned.
Just studying the theory behind communications is no substitute for actually communicating. Each week, you will apply the lessons learned in simulated real-life situations and interactive exercises. You will work with your classmates to identify your strengths and weaknesses, and learn how to deliver and accept both compliments and practical assessments of your skills. This will allow you to improve and develop confidence in the relative privacy of the online classroom.
By the end of the course, you will be able to:
- Draft, edit, and proofread written messages in a variety of business document formats.
- Create videos and both perform self-analysis as well as give and receive constructive criticism on your mastery of non-verbal and verbal skills.
- Work in teams and examine the challenges of communicating through different channels, languages, cultures, schedules, and time zones.
- Learn how to make a great first impression.
- Develop techniques for building, monitoring, and protecting your reputation and the reputation of your business.
Lesson 1: Business Communications
- First Impressions
- The Audience
- Communication Channels
- Effective Communication
Lesson 2: Nonverbal Communication
- Nonverbal Cues
- Nonverbal Cues in Written Messages
- Working in Teams
Lesson 3: Diversity and Ethics
- Word Choice
Lesson 4: Effective Writing
- Writing in Business Settings
- Writing Clear Messages
Lesson 5: Communication Choices in Business
- Planning to Communicate
- Addressing the Unknown
Lesson 6: Reputation Building
- Personal Reputations
- Business Reputations
- Monitoring Reputations
Lesson 7: Conflict
- Conflict and Criticism
Lesson 8: Communicating with Clients and Customers
- Customer Service
Lesson 9: Meetings
- Planning to Hold a Meeting
- Meeting Formats
- The Agenda
- Meeting Follow-Up
Lesson 10: Presentations
- Types of Presentations
- Learning Styles
- Creating a Presentation
Lesson 11: Opportunities
- Opportunities through Networking
- Letter Writing
Lesson 12: Interviewing Skills
- Types of Interviews
- Talking Points
Prerequisites and Course-Specific Requirements
This course does not have any prerequisites.
- Business Writing: What Works, What Won't by Wilma Davidson, Ed.D., Revised Edition
- Word processing software (Word, Pages, etc.)
- Presentation software (Powerpoint, Keynote, etc.)
After enrolling, please check the Getting Started section of your course for potential deals on required materials. Our Student Deals page also features several discounts you can take advantage of as a current student. Please contact firstname.lastname@example.org for any questions.
General Course Requirements
Below are the minimum requirements to access the course environment and participate in live chats. Please make sure to also check the Prerequisites and Course-Specific Requirements section above, and ensure your computer meets or exceeds the minimum system requirements for all software needed for your course.
- Latest version of Google Chrome
- Zoom meeting software (available in the course when joining your first chat)
- Speakers or headphones
- External or internal Microphone
- Broadband Internet connection
Author & Instructor
Valerie Lovely is Assistant Professor of Music Business/Management at Berklee College of Music and a practicing transactional music attorney. Her clientele is limited exclusively to musicians, songwriters, publishers, record labels, and others with music law needs. The firm provides various transactional music law services, such as contract drafting, negotiation and explanations, copyrights, trademarks, band business evaluation reports, and other music business and legal services. Attorney Lovely also hosts a free informational Web site, MusicLawInfo, that provides numerous music law articles of interest to today's musicians.
Valerie has been a guest speaker, panelist, and lecturer at a variety of events sponsored by legal- and music-based organizations (American Bar Association, Massachusetts Bar Association, Berklee College of Music, Blacksun Festival, etc.). She has taught copyright law to attorneys as a member of the Volunteer Lawyers for the Arts faculty.
Valerie has also been a musician for most of her life. She plays several instruments, has performed in rock bands, chamber groups, wind ensembles, and in studio projects, and has composed music in various styles and for use in a variety of media. Read Less
When taken for credit, Business Communications can be applied towards these associated programs:
|
A power of attorney (PoA) is a valuable document for everyone to have. In fact, every person over the age of 18 should have at least two PoA, one for healthcare and one for financial matters. A health care PoA is also called a Health Care Proxy. We previously spoke about their importance in an earlier article. The reason why everyone should have these documents is that they provide protection for you in case of an accident or illness which leaves you incapacitated. No one likes to think about this type of situation happening to them, but avoiding such issues can lead to major problems. A health care proxy allows you to choose a person to make medical decisions for you when you cannot. A financial PoA allows you to appoint someone to handle your financial matters for you. Powers of attorney are not purely for incapacity planning however; there are many types and uses for them. This article will go over some of the basics of PoA, specifically those that deal with financial matters, to help you decide what is right for you.
We will start our discussion of PoAs with some definitions. We define a Power of Attorney generally as a legal instrument used to give legal authority to act for another person. The person who gives the authority is the principal. The person who receives the authority is the agent or “attorney-in-fact”. The principal signs the Power of Attorney and allows the agent to act on behalf of the principal. The agent has a fiduciary duty to the principal, meaning that they are required to act in good faith and in accordance with the principal’s reasonable expectations. You can also appoint a monitor to review the actions your agent does on your behalf. In practice, a principal rarely choses a monitor. When choosing an attorney-in-fact, it is very important to choose someone who is honest and reliable, and who knows your wishes.
There are also several varieties and options available of powers of attorney. These options can completely change the purpose of the PoA. The most significant option has to do with the duration of the document. In the area of financial powers of attorney, you can have a limited power, a general power, a durable power and a springing power.
A principal generally uses a limited, special, or nondurable power of attorney is for a specific purpose. For example, a principal might use these types of PoA for: a home or car closing, or to handle the principal’s affairs while the principal is out of the country. The PoA expires either when the transaction is complete or upon an expiration date specified in the contract.
A general power of attorney is very similar to a limited power of attorney. It is valid as long as the principal is able to make decisions. The principal is able to override the choices of the agent and can revoke the power at any time. The PoA expires when the principal is no longer able to make decisions for themselves or upon the principal’s death. While the limited power of attorney will detail the specific transaction that the agent is able to handle, the general power grants broader powers within a category of transactions. For example, a principal may use a general power of attorney to grant the agent the authority to handle all real estate transactions for the principal.
A durable power of attorney is similar to a general power of attorney in terms of the scope of authority granted. The difference with a durable power of attorney is that the authority does not expire if the principal is no longer able to make decisions. The document must specify that it is a durable power of attorney or it will expire upon the principal’s incapacity.
Another option is a “Springing” power of attorney. This type of power of attorney comes into effect when a specific event listed in the document occurs. This event is usually that a doctor declares the principal incapacitated. This type of power of attorney is often a valuable component of an estate plan that protects you in case of incapacity.
A financial power of attorney is a valuable part of anyone’s estate plan. A springing PoA can save you time and money should you become incapacitated. Should you become incapacitated without a power of attorney in place, a guardianship proceeding will be needed for your loved ones to manage your financial affairs. Powers of attorney are also useful for major transactions and when you are out of the country for an extended period of time. Everyone should have these documents in order to be prepared for an illness or accident. But, specifically, if you have a dangerous job, or if you are approaching a time where you may lose the capacity to sign legal documents, you should seriously consider getting a durable or springing power of attorney as soon as possible. If the principal has capacity issues when they sign the document, the document will be invalid.
In this series of articles, we will compare the different types of PoA documents, look at the potential issues that may arise, examine the specific authorities that can be given, and discuss more fully why you should have them.
|
Research Databases: P
Points of View Reference Center
Use this resource
Points of View Reference Center is an interface intended for public, academic, and high school libraries. Points of View is designed to assist researchers in understanding the full scope of controversial subjects. High school and undergraduate students can use Points of View as a guide to debating, developing arguments, writing position papers, and developing critical thinking skills. Each Points of View Essay includes a series of questions and additional material to generate further thought. Also included are thousands of supporting articles from the world’s top political and societal publications.
|
by Stratos Kamenis (MALD 2017)
The massive exodus of the Syrian people has led to a refugee crisis in Europe. Hundreds of thousands of refugees have made the long journey across Turkey and then to Greece, putting their lives in danger in the hope of finding a better future in Europe. In 2015, more than a million asylum-seekers took refuge in Europe, with another 500,000 following in the first half of 2016. A deal was struck between the European Union and Turkey in March aimed at limiting the number of migrants and regulating migration by establishing EU-administered camps – the so-called hotspots – on the Greek islands of Lesvos, Chios, Samos, and Kos, from where the majority of migrants enter Europe.
The island of Lesvos found itself under the spotlight of international media as the central entry point to Europe. Some 600,000 refugees and migrants have passed through the island over the past 19 months. After a year of coping with the crisis without aid from international organizations, the impact on Lesvos’ 85,000 permanent residents has been significant. To their credit, the locals have been gracious hosts. Their sense of tolerance and solidarity has been praised by major world figures including Pope Francis, Queen Rania of Jordan, actress Angelina Jolie and former UN Secretary General Ban Ki Moon. Their humanitarian efforts have earned them a nomination for the Nobel Peace Prize.
Unfortunately, as the refugee crisis stretches on, Lesvos’ economy has deteriorated under the weight of supporting the refugees, and with it, relations between the native and refugee communities. Even now, there are more than 6,000 refugees living in two camps near Lesvos’ capital Mytilene. Despite local efforts, the island’s economy has deteriorated. Relations between the host community and refugees are strained as the camps place additional pressure on local economic resources. A number of reports published by the island’s Chamber of Commerce and the University of the Aegean reveal the economic collapse. Tourism has decreased significantly. The average revenue of the agricultural, manufacturing, and service sectors has declined due to loss of income and subsequent drop in demand. The island’s unemployment rate is at a record level for the first time since 2010.
In 2016, tourist reservations to Lesvos decreased between 65% to even 80% due to cancellations of chartered flights to the island and because many business partners did not effectively market Lesvos as a destination. The constant portrayal by volunteers, NGOs, and the media of images of boats landing on the island’s shores, even long after the number of boats had diminished significantly, left an imprint on people’s minds that the island was over flooded with refugees. As a result, visitors to the island declined and many businesses were not able to open. The ones that did open were not able to pay their bills, taxes, and loans in order to sustain their existence and they were not able to hire the usual personnel they typically had, thus increasing unemployment. Even worse, many people lost the ability to apply for unemployment benefits during winter 2016 as there is a minimum number of days an employee is obliged to work in order to have the right to receive unemployment and health insurance benefits for themselves and their family members.
The local community has been affected on many levels, economically, psychologically, environmentally, and sociologically throughout the course of time. The immediate and most obvious effect was economical. While the refugee crisis continues to receive international attention, in large part due to the involvement of UNHCR, the European Union, and humanitarian NGOs, the local economic collapse has not been addressed. The demand for policies to stimulate the local economy has escalated since recent protests by local business owners, who are worried that the island’s most productive sectors are being destroyed. There are also many extreme voices spiraling out of control due to the continuous absence of governmental aid while extreme right wing voices are clashing with extreme left wing voices. These extreme voices can only be softened by the Greek government and the EU providing the necessary, overdue support to the local community so that the local community can in turn support and accept the refugees. The EU governments should establish a support system and take action to protect these volatile communities so that they can counter this vicious cycle and create a future of peace for both refugees and natives.
Stratos Kamenis is a 2017 Master of International Business Candidate at The Fletcher School
|
Take a walk in the great outdoors and you’re bound to see all kinds of signs of wildlife, because here in Colorado, we’re lucky to have all manner of creatures — anything from deer and moose to bears. Unfortunately, we no longer have any dinosaurs we can harass when we visit national parks. Gone are the days when we could get dangerously close to a resting triceratops so we can take a selfie with it, or try to chum it up with a Tyrannosaurus rex hatchling. All things we do to our still living wildlife brethren. On second thought, maybe it is a good thing dinosaurs are extinct.
Lucky for us, we have the next best thing: Dinosaur Ridge where some of the biggest fossil finds have been uncovered, including Stegosaurus, Apatosaurus, Diplodocus, and Allosaurus.
For those of you with piqued interest in visiting, Dinosaur Ridge is part of the Dakota Hogback in the Morrison Fossil Area National Natural Landmark in Jefferson County, Colo.
In 1877, Arthur Lakes found dinosaur bones in the rocks on the west side of Dinosaur Ridge. Since then, 15 digs have been started in that area in search for more fossils.
On the east side of Dinosaur Ridge, construction crews came across hundreds of dinosaur footprints. These footprints came in all shapes in sizes and mostly included prints from creatures like Eolambia, herbivores, and Carnivorous theropods. It’s crazy to see evidence literally underfoot that dinosaurs that once roamed the Earth walked right where you are.
In June 2011, the site was combined with the Parfet Prehistoric Preserve, just three miles north of Dinosaur Ridge. Together, the two national natural landmarks are now the Morrisson-Golden Fossil Areas.
The route runs about 200 feet from the museum to the high point along the ridge. In total, the hike is about two miles round-trip and takes about two hours overall to trek. That’s a long time to be moving, so a shuttle bus tour is also available, but you gotta pay for it.
The site also offers a Dinosaur Ridge Exhibit Hall, which includes plenty of educational displays about the dinosaurs that were discovered at that very site. When you wander through Dinosaur Ridge, you can also find interpretive signs at the different trails that explain the local geology. There’s volcanic ash bed, trace fossils, paleo-ecology and all kinds of other geological wonders you don’t realize you’re standing on.
For more information, visit dinoridge.org.
|
Our public well being work focuses on threat factors for illness corresponding to tobacco and alcohol consumption, as well as understanding how insurance policies corresponding to those round promoting, pricing and labelling of products impression on exposure to danger. Public health is “the science and artwork of stopping disease, prolonging life and promoting human well being by means of organized efforts and informed selections of society, organizations, public and private, communities and people.” 1 Analyzing the health of a population and the threats is the basis for public health. The Europubhealth+ programme is an Erasmus Mundus Joint Master Diploma that has been recognized as a grasp of excellence by the European Commission since 2006.
In the diploma programme diagram, you can click on the completely different programs to read the course descriptions. The general public health programs at Western Kentucky College put together students to face the challenges of existing and rising health issues, regionally and globally, and enable students to use essential pondering skills to deal with and resolve these advanced well being issues.
For MPH students this second semester course builds on the previous first semester ‘core’ programs of epidemiology and applied statistics. Public Well being professionals with Bachelor’s degrees are in increasing demand for employment by authorities businesses and private organizations as public well being analysts, health care managers, patient educators, risk assessors, and occupational well being and security technicians.
^ Anthony J. Mazzaferri, “Public Health and Social Revolution in Mexico.” PhD dissertation, Kent State College 1968. A degree in Public Health prepares students to turn into professionals who promote the well being of the general public by education and skills for people and communities. Six million individuals die each year from tobacco-associated diseases.
College students who enter in January begin the programme with Epidemiology and Utilized Research Strategies, studying Foundations in Public Health and Data Evaluation and Interpretation in September. Themes which will likely be thought of include: the epidemiology of journey related ailments, rising infections, mass human migration, special risk travellers, malaria, vaccine preventable travel associated illness, arboviruses, and travel and its potential impacts on public health.
|
The best of EcoWatch, right in your inbox. Sign up for our email newsletter!
'Single Most Important Stat on the Planet': Alarm as Atmospheric CO2 Soars to 'Legit Scary' Record High
By Jake Johnson
In another alarming signal that the international community is failing to take the kind of ambitious action necessary to avert global climate catastrophe, NOAA released new data Tuesday showing that atmospheric carbon dioxide levels — which environmentalist Bill McKibben described as the "single most important stat on the planet" — reached a "record high" in the month of May.
"The measurement is the highest seasonal peak recorded in 61 years of observations on top of Hawaii's largest volcano and the seventh consecutive year of steep global increases in concentrations of carbon dioxide (CO2)," NOAA said in a statement on Tuesday. "The 2019 peak value was 3.5 PPM higher than the 411.2 PPM peak in May 2018 and marks the second-highest annual jump on record."
According to NOAA's measurements — which were taken at the Mauna Loa Atmospheric Baseline Observatory in Hawaii — carbon dioxide levels peaked at an average of 414.7 PPM in May.
As The Guardian reported, "Scientists have warned for more than a decade that concentrations of more than 450 PPM risk triggering extreme weather events and temperature rises as high as 2°C, beyond which the effects of global heating are likely to become catastrophic and irreversible."
Reacting to NOAA's new measurements, McKibben tweeted, "This is legit scary."
In a report last October, United Nations scientists warned that global carbon emissions must be cut in half by 2030 in order to avoid the worst consequences of the climate crisis.
As Common Dreams reported last month when levels at Maun Loa briefly hit 415 PPM, the occurrence was described as otherworldly for humanity and something not experienced by the planet in over three million years.
Climate scientist Peter Gleick noted that the "last time humans experienced levels this high was ... never. Human[s] didn't exist."
NOAA's new data for the month of May as a whole comes amid a global wave of youth-led marches and civil disobedience demanding immediate climate action from political leaders.
In her forward to 350.org campaigner Daniel Hunter's newly published Climate Resistance Handbook, Greta Thunberg—the 16-year-old Swedish activist who helped inspire the worldwide surge in youth climate mobilizations—argued that the success or failure of the global climate movement will be determined by one measure: "the emission curve."
"People always tell me and the other millions of school strikers that we should be proud of ourselves for what we have accomplished," Thunberg wrote. "But the only thing that we need to look at is the emission curve. And I'm sorry, but it's still rising. That curve is the only thing we should look at."
National Oceanic and Atmospheric Administration
"Every time we make a decision we should ask ourselves; how will this decision affect that curve?" Thunberg added. "We should no longer measure our wealth and success in the graph that shows economic growth, but in the curve that shows the emissions of greenhouse gases."
"We should no longer only ask: 'Have we got enough money to go through with this?' but also: 'Have we got enough of the carbon budget to spare to go through with this?'" Thunberg wrote. "That should and must become the center of our new currency."
Reposted with permission from our media associate Common Dreams.
EcoWatch Daily Newsletter
In 2018, there were about 5 million electric cars on the road globally. It sounds like a large number, but with well over a billion cars worldwide, electric vehicles are still only a small percentage.
By Byron Reeves, Nilam Ram and Thomas N. Robinson
There's a lot of talk about digital media. Increasing screen time has created worries about media's impacts on democracy, addiction, depression, relationships, learning, health, privacy and much more. The effects are frequently assumed to be huge, even apocalyptic.
By Raphael Tsavkko Garcia
Rarely has something so precious fallen into such unsafe hands. Since Jair Bolsonaro took the Brazilian presidency in 2019, the Amazon, which makes up 10 percent of our planet's biodiversity and absorbs an estimated 5 percent of global carbon emissions, has been hit with a record number of fires and unprecedented deforestation.
Microsoft announced ambitious new plans to become carbon negative by 2030 and then go one step further and remove by 2050 all the carbon it has emitted since the company was founded in 1975, according to a company press release.
|
The US National Institutes of Health (NIH) should dismantle a decades-old colony of 360 chimpanzees, retiring all but roughly 50 of the animals to a national sanctuary, the biomedical agency was told on 22 January in a long-awaited report.
The report, from a working group of external agency advisors, also counsels the NIH to end about half of 21 existing biomedical and behavioral experiments, saying they do not meet criteria established in a December, 2011 Institute of Medicine (IOM) report.
“Clearly there is going to be a reduction in the use of chimpanzees in research,” says working group co-chair Kent Lloyd, the associate dean for research at the School of Veterinary Medicine at the University of California, Davis.
The report says that the NIH should begin planning sanctuary housing for the retiring animals “immediately”, and that a colony of about 50 animals would be sufficient for future research. The report also sets high hurdles for new chimpanzee experiments in the future, calling for the establishment of an independent committee that would vet individual study proposals after they first pass routine NIH scientific review. In cases where the burden on the animals is high, the benefit to humanity should have to be “very high” to pass muster with the committee, says Daniel Geschwind, the other co-chair of the working group and a geneticist at the School of Medicine at the University of California, Los Angeles.
The report suggests that three of nine ongoing invasive experiments, involving immunology and infectious diseases, could continue, because they meet the IOM criteria. These require that a study be needed for public health; that no alternative animal model exists; that performing the study in humans would be unethical; and that the animals be maintained in socially and physically appropriate habitats. The report also says that eight of 13 behavioral or comparative genomics studies could be allowed to continue, but in some cases only conditionally — meaning that funding for these experiments could not be renewed without passing the independent committee review.
The working group — a subgroup of NIH’s Council of Councils, a trans-agency advisory body — was chartered by NIH director Francis Collins one year ago to advise the agency on how to implement the recommendations of the IOM report, which found that most chimpanzee research was not necessary. Its recommendations are not binding; Collins is expected to respond to them in late March, after a 60-day period of public comment. But they signal yet another significant step in an ongoing retrenchment. Last month, the agency announced that it will retire 110 chimpanzees to the national Chimp Haven sanctuary in Keithville, Louisiana, after they had been first slated to move to an active NIH-supported research centre in San Antonio, Texas.
Today’s recommendations speak to the fate of an additional 360 research-eligible chimpanzees that are owned by the biomedical agency and housed at facilities in Texas and New Mexico.The fate of an additional 91 animals that the NIH pays to maintain, but does not own, was not clear; the agency cannot compel the retirement of these animals, housed at the Texas Biomedical Research Institute (TBRI) in San Antonio.
Animal rights activists welcomed the report. “A chimpanzee should no more live in a laboratory than a human should live in a phone booth,” says Justin Goodman, the director of laboratory investigations at People for the Ethical Treatment of Animals in Washington, DC. But the TBRI issued a statement saying that the report’s recommendations “will slow urgently needed medical advances necessary to prevent and treat human diseases that afflict millions of Americans as well as hundreds of millions of people living in other countries.”
Alice Ra’anan, director of government relations and science policy at the American Physiological Society in Bethesda, Maryland, says that, while the IOM report deems most chimpanzee research unnecessary, “the flip side of that is: some is necessary.” The report recognizes the need for the NIH to maintain a small chimpanzee colony, she says. “We have to have a sustainable capacity going into the future.”
|
Academic Integrity - Referencing, Citation & Avoiding Plagiarism: Plagiarism Defined: Chicago Style Guide
Chicago Style - what is it?
Academic writing requires the author to support their arguments with reference to other published work or experimental results/findings. A reference system will perform three essential tasks:
- Enable you to acknowledge other authors ideas and thereby avoid plagiarism.
- Enable a reader to quickly locate the source of the material you refer to so they can consult it if they wish.
- Indicate to the reader the scope and depth of your research.
The Chicago style is a widely used referencing system to help you achieve these objectives.
How do I use the Chicago Referencing Style?
The Chicago style involves two tasks:
- how you refer to sources in the text (with the use of footnotes)
- how you compile a list of reference sources at the end of your text (reference list)
In this guide we show how common reference types should look in your reference list along with an example. Immediately following this will be an example of how that reference should appear as a footnote.
If the exact reference type you are looking for is not shown in this guide, look for one similar and follow the same rules. Alternatively consult the book The Chicago Manual of Style, 16th edition, which is available in UCD Library.
Chicago Author-Date Style
The Chicago Style has two version. The one covered in this guide is the "Notes and Bibliography" version. There is a second version called "Author-Date" version. A quick reference to that guide is available at the link below. A fuller explanation is available in the book the The Chicago Manual of Style, 16th edition, which is available in UCD Library.
Chicago Style - what does it look like?
Here is an example of what an in-text citation looks like in the Chicago style. When a source is referenced more than once on the same page, as in our example here, a shortened form of footnote is used after the first reference, as seen below.
In 1936’s new context, John Dos Passos revived Vanzetti’s last words: “Never in our full life can we hope to do such work for tolerance, for justice, for man’s understanding of man as how we do by an accident.” ¹ In 1927 Vanzetti lamented not his death but the inefficacy of lived political commitment—his death could have meaning in a way that his life did not. Dos Passos, however, invoked the condemned man’s roseate embrace of martyrdom only to insist “we stand defeated America.”²
¹. John Dos Passos, The Big Money (Boston: Mariner, 2000), 372. The quotation originally appeared (with minor differences arising from the reporter’s transcription of Vanzetti’s accent—“joostice” and “onderstanding”—which Dos Passos regularized) in the New York World on May 13, 1927, after Vanzetti’s sentencing, but before his execution.
². Dos Passos, Big Money, 372.
Here is an example of what a Reference List looks like in the Chicago Style:
Hayes, Brian Cosgrave, Ian McAllister, and Laura Dowds, "Depicting Ireland on Film, what are we really saying?" Social Cinema Journal, 54, no.4 (2001), 454-482.
Jervir, Charles Everett Osborne. "Symbolic Violence, Resistance and how we view ourselves in Irish Film." World Cinema, 37 no.4, (2010), 392-407.
MacDougall, Henry. "Who Needs Hollywood? The Role of Popular Genre Films in Irish National Cinema." The Canadian Journal of Irish Studies, 35, (2009) 39-46.
Moriarty, Dómhnaill. Funding models for Irish film makers. Dublin: Collins Press, 2012.
Chicago Style - Quotation
The Chicago Style dictates that when using another's exact words, known as direct quotation, the quotation should either be placed in quotation marks (for a short quotation) or set out in a separate paragraph of text, indented about half an inch from the margin. In both cases they should be followed by a superscript number (like this: ²) and their source referenced in a footnote. Footnotes can be placed at the bottom of the page.
Short quotations - less than 100 words
Short quotations are generally held to be less than a hundred words (six to eight lines in a typewritten manuscript), in the Chicago Style. An example of a short direct quotation would be
The findings suggest children have a "high level of enjoyment" ³, while exercising with the system as indicated by the positive responses to all three questions.
Long quotations - 100 words or more
Long quotations in the Chicago Style are held to be one hundred words or more (at least six to eight lines in a typewritten manuscript). These are laid out in a separate paragraph of text and indented about half an inch from the left margin. No inverted commas/inverted commas are included. An example of a long quotation would be
In their research on rehabilitation using Wobbleballs, Fitzgerald and her team conclude that:
The findings suggest children have a high level of enjoyment while exercising with the system as indicated by the positive responses to all three questions. The fourth question collected some feedback from children and while most provided positive comments a small number of children mentioned that the wobble board was “difficult to control” or “hard to use”. We must therefore investigate some easier methods to control the game as an option for some children. Future research is needed to investigate the benefits of the system as an exercise intervention for children and to examine how training using Wobbleball could be integrated into the existing physical education curriculum in schools.¹
|
In a criminal trial, the defendant's very life and liberty may be at stake. A defendant who is found guilty can be sent to prison for years, and may even be executed in some states. Because of the dire consequences arising from conviction, evidence must be extremely convincing. The critical questions regarding burden of proof are therefore: who has to prove what, and by what standard?
TL;DR (Too Long; Didn't Read)
The prosecution bears the burden of proof in a criminal trial. It must prove every element of the crime charged beyond a reasonable doubt. A defendant may have the burden of proving a particular defense he asserts, like insanity.
The Burden of Proof
Burden of proof involves two different, equally important, issues in a criminal case. First, burden of proof defines the duty placed on a party to prove or disprove a particular fact. The second identifies which party bears it.
In a criminal case, the prosecutor bears the burden of proving beyond a reasonable doubt every element of the crime charged. This is the highest burden of proof in American law, requiring proof so convincing that a reasonable person would not hesitate to act on it in her own personal affairs.
Federal courts and courts in every state apply this "beyond a reasonable doubt" standard in criminal trials. In fact, they have no choice. The United States Supreme Court has affirmed that this standard is mandated by the due process clause of the federal constitution. Using any lesser standard would be a violation of the defendant's due process of law.
Who decides if the prosecutor has met the burden of proof? It is for the trier of fact to determine. In civil trials the trier of fact might be the judge in a bench trial. But in a criminal case, the defendant has the right to a jury. Therefore, a jury is almost always the trier of fact in a criminal case.
Civil Burden of Proof
In a civil case, neither party is accused of a crime, but they have some legal issues between them. Civil cases can range from divorce matters to lawsuits for money damages. Life and liberty are never at stake, and the burden of proof reflects the fact that the consequences are less severe.
In civil cases, the courts apply a "preponderance of the evidence" standard of proof. This means that the person bringing the case wins if she proves every element of the charge by just a bit more evidence than the other side offers to disprove it.
Shifting the Burden of Proof
What does it mean when someone talks about shifting the burden of proof? It means that once one party has met his burden of proof, the other party has the burden to prove the elements of a defense. For example, let's say that the prosecutor has established beyond a reasonable doubt that the defendant killed someone. At that point, the burden of proof shifts to the defendant. If he wants to prove he is innocent by reason of insanity, he must prove every element of that defense.
|
Did you know that Mouth Cancer kills one person EVERY THREE HOURS in the UK because of late detection? If in doubt, get checked out!
Mouth and throat cancer (oral and oropharyngeal), describes the location of head and neck cancer, and is the sixth most common cancer reported worldwide, with one of the highest death rates amongst all cancers.
These cancers include a variety of different types of tumours that can affect the lips, salivary glands, tongue, gums, palate and inside of cheeks as well as beyond, at the back of the tongue, soft palate, tonsils and the throat, pharynx, larynx and oesophagus. More information can be found here.
Head and Neck Cancer Statistics
Mouth and throat cancer can grow and spread very quickly. If you think you may have any signs or symptoms, see your dentist or doctor as soon as possible.
Signs and Symptoms of Mouth Cancer
The list of symptoms below can be found on the Mouth Cancer Foundation website.
Things to look out for:
- Ulcers that do not heal within 3 weeks
- Pain or discomfort in the mouth
- Lumps and swellings of no obvious cause in the mouth or neck
- Bleeding from the mouth or throat
- Red or white patches inside the mouth
- Changes in texture- hardness, roughness
- Teeth that become loose
- Difficulty or pain when swallowing, chewing or moving the jaw
- Persistent hoarseness or changes to the voice
- Persistent coughing or the feeling that something is ‘stuck’ in the throat
- Numbness or tingling of the lips or tongue
- Unexplained weight loss
- Dentures that suddenly stop fitting properly
Your dentist will screen for oral cancers as part of your regular oral health assessment (check up). ALL clinical dental team members will check and monitor your oral health, including the soft tissues of your mouth at routine appointments.
Who is at risk?
The most common causes of mouth cancer in the UK are tobacco use and alcohol.
Mouth Cancer is more common in men than women, however, the number of women being diagnosed in the UK is increasing. The majority, but not all, of those diagnosed with mouth cancer are over the age of 40 and are also smokers. It is important to note, however, that approximately 25% of mouth cancer cases have NO IDENTIFIABLE RISK FACTORS.
How do I reduce the risk of developing mouth cancer?
- Do not smoke or use smokeless tobacco (e.g. paan, chewing tobacco, gutkha). For tips on how to stop smoking click here.
- Reduce alcohol consumption. Click here for tips on how to reduce alcohol consumption or here to find out how to recognise if you are drinking too much alcohol.
- Increase intake of non-starchy fruit and vegetables
- Check your mouth, once a month – every month! Click here for the Bite Back at Mouth Cancer, do it yourself mouth cancer check that could save your life.
The NHS website is always a good source of evidence-based information. Their information on mouth cancer can be found here. Head and neck cancers and many other conditions can impact your ability to swallow. This can impact your health further if you are not getting enough nutrients. Dieticians and speech and language therapists can help. You may find this recipe book helpful.
Food and Cancer. A NO-NONSENSE, EVIDENCE-BASED GUIDE can be downloaded free from here. Trekstock, young adult cancer support has produced a guide to everything you might be asking about how what you put into your body affects it during cancer treatment and beyond.
|
For 80 years, Lutheran Immigration and Refugee Service (LIRS) has offered welcome and hope to more than half a million refugees. Since 1939, LIRS has transformed lives, with the support of people like you, to welcome the most vulnerable to the United States — from sea to shining sea. Together we have supported, equipped and empowered these new Americans, while advocating for policy that protects all of God’s children.
The New York-based National Lutheran Council (NLC), founded in 1918 to respond to such post-World War I needs as immigration and refugee resettlement, sets up a Welfare Department with an office for the “rehabilitation and placement of Lutheran refugees.” It helped 522 refugees in its first year of operations.
Following the immediate aftermath of WWII, LIRS resettled 30,263 Displaced Persons from Germany and Eastern Europe.
In October, 1956, student and factory workers of Budapest rose against the Soviet-imposed communist regime. In six days of fighting, they forced government troops to withdraw from the city. But, four days later, Soviet tanks stormed back into the city and crushed the revolution. More than 50,000 Hungarians fled the country. LIRS resettled over 1,500 Hungarian refugees.
Cuban rebel Fidel Castro overthrows his country’s regime and implements a communist government, triggering a flow of refugees seeking asylum. 100,000 Cuban refugees arrived in Florida and LIRS was invited to assist in their resettlement.
Ugandan dictator Idi Amin expels some 75,000 citizens from the country, 2,000 of whom are accepted into the U.S. as “parolees”. LIRS resettles 600 new arrivals as a result.
The defeat of South Vietnam by North Vietnam in April of 1975 triggered a flood of refugees from Southeast Asia. Within weeks, LIRS transformed from a four-staffer operation to a crisis response organization with more than 100 staff members. By the end of the year, LIRS had overseen the resettlement of almost 16,000 refugees.
In 1980, LIRS hit the 100,000 mark in refugees resettled since World War II. In the same year, the American Homecoming Act granted U.S. admission to 10,000 Amerasian children fathered by U.S. citizens. The year also witnessed the passage of the Refugee Act of 1980, which created a permanent and systematic procedure for the admission of refugees of special humanitarian concern to the U.S.
In 1993, the first survivors of ethnic cleansing”in Bosnia (formerly Yugoslavia) arrived in the U.S. for resettlement. In 1999, 1,700 ethnic Albanians were forced out of Kosovo into Macedonia and eventually resettled by LIRS.
At the turn of the new century, LIRS began welcoming “Lost Boys” – young Sudanese refugees who had been separated from their families for a decade or more after fleeing a civil war. In the first decade of this century, LIRS assisted in the settlement of refugees from Burma, Tibet, Bhutan and Iraq, along with ethnic Hmong from refugee camps in Thailand.
After 80 years of welcome, LIRS and its partners continue answering the call to sponsor and support immigrants and refugees with open doors, open arms, and open hearts. Today, Lutheran congregations support the work of LIRS by offering Circles of Welcome to refugees, assisting with Reception and Welcome for immigrants who have been released from immigration detention, and participation in projects such as Hope for the Holidays and Migrant and Refugee Sunday.
In February 2019, LIRS was proud to announce appointment of Krish O’Mara Vignarajah, former Policy Director to First Lady Michelle Obama, as its President and Chief Executive Officer. After her family was forced to flee civil unrest in Sri Lanka, Ms. O’Mara Vignarajah fulfilled the promise of the American Dream, having graduated from Yale and Oxford and understands firsthand the importance of LIRS’s work. On the future of our mission, she says:
“At a time when too many refugees and asylum-seekers are unsure whether they will be welcome in America, I am committed to ensuring that all immigrants seeking a better life in America are afforded the same opportunities that my family received to pursue their dreams in this great nation.”
We would like to thank all of our supporters who generously used their birthday as an opportunity to host an online fundraiser for the vital work that LIRS does. Your support means that we can continue to uphold our 80-year legacy of welcoming the stranger. Find out why our supporters celebrated their birthday with us and learn how you can too.
Over our 80 year history, LIRS has continued to evolve in order to better respond to the needs of migrants, refugees and asylum seekers. Today, we coordinate 6,000 volunteers nationwide with the help of more than 100 local affiliates. Check out some of our latest programs below to find out how our work is adapting to the global migration crisis.
LIRS coordinates shelter operations along the border to provide recently released asylum seekers with basic supplies, assistance in planning their onward journey, hot meals and a warm welcome.
LIRS works to empower refugees to engage in advocacy on both local and national levels. The MRLA now comprises 297 migrant and refugee community leaders in 39 states across the country and represents nearly 50 different countries of origin.
The holidays should be a magical, wondrous time for children. But this year in America, hundreds of children and families will be spending the holidays behind bars — simply because they crossed the United States border seeking protection.
Find out how you can send them a message of hope
|
The last significant expanse of open space between San Francisco and the Great Central Valley
The Nature Conservancy’s Mount Hamilton project is not just another pretty space. The 1.5-million-acre conservation project safeguards threatened wildlife habitats while helping to assure the flow of clean water to the San Francisco Bay Area. In addition, protecting these lands from unchecked development preserves the historic way of life of California ranchers.
Irreplaceable, invaluable, beautiful, Mount Hamilton beckons us to experience the last major stretch of wilderness between Silicon Valley and the Central Valley.
Habitats and Water Supplies Endangered
Urban development menaces Mount Hamilton, which is sandwiched between densely populated areas. Conservation efforts here provide a refuge for endangered species such as the San Joaquin kit fox and the bay checkerspot butterfly. Bobcats, mountain lions, tule elk, red-legged frogs and countless birds all make their home in its diverse environments.
Mount Hamilton contains some of the most scenic and also the most vulnerable natural settings in California. It supports majestic oaks, rare native grasses and fields teeming with wildflowers. Streamside forests, woodlands and grasslands form a critical part of the watershed that guarantees a healthy water supply to Bay Area residents.
In 1998, The Nature Conservancy began acquiring parcels of land that collectively would maintain the integrity of the ecosystem of Mount Hamilton. We partnered with other organizations and individuals to knit together public and private lands across a landscape that spans six counties.
Recent additions include a generous donation by the Hewlett and Packard families of a crucial link between these lands—a conservation easement on the 28,359-acre San Felipe Ranch—as well as the Willson Ranch, 1,557 acres between the Department of Fish and Game’s Rancho Canada de los Osos Reserve and Henry W. Coe State Park.
The Future of Mount Hamilton
The Nature Conservancy has made great strides in protecting this essential resource by implementing innovative strategies, and we continue to pursue conservation opportunities in the area, as well as to monitor threats to Mount Hamilton and the people and wildlife it serves.
- Conserving the Upper Pajaro River Floodplain. Our work in this area preserves the wildlife corridor between the Diablo Range and the Santa Cruz Mountains. Corridors, increasingly vital to many species as they are forced to adapt to climate change, help perpetuate the genetic diversity of large mammals and other wildlife.
- Partnering with Ranchers. We are intensifying our support of ranchers around Mount Hamilton, helping them confront the challenges presented by encroaching development. At the same time, we stress ranching practices that are compatible with maintaining the region’s distinctive diversity of life.
- Assessing the Impact of Infrastructure Development. The Nature Conservancy is working to ensure that transportation projects to serve California’s growing population, including the proposed high-speed rail between Los Angeles and the Bay Area, do not destroy the richness that is Mount Hamilton.
- Project Area: 1.5 million acres
- Acquisitions: more than 100,000 acres
- Location: in the central Diablo Range east of San Jose (Santa Clara, San Benito, Alameda, Stanislaus and Merced Counties)
- Plant Species: valley oak savanna, blue oak woodlands, chaparral, coast range ponderosa pine
- Animal Species: bobcats, mountain lions, the San Joaquin kit fox, badgers, golden eagles, wintering bald eagles, red-tailed hawks, California tiger salamanders, red-legged frogs, western pond turtles, steelhead, rainbow trout, foothill yellow-legged frogs, bay checkerspot butterflies
|
Based on the work of Fiske Center Archaeologists, Joe Bagley (The Boston City Archaeologist) was able to recreate the outside edge of the tank that burst and caused the Molasses Flood disaster. Joe asked folks to stand along that circle during the ceremony of remembrance. This happened at 10:30 AM on Tuesday January 15, 2019 at Langone Park, marking 100 years since the Great Molasses Flood. John Steinberg, Melissa Ritchey, & Jocelyn Lee represented the Fiske Center and demonstrated how the GPR worked after the ceremony.
(update Jan 16, 2019) The event received some press coverage:
An article by Emily Sweeney in the Boston Globe — Boston officials remember the Great Molasses Flood, 100 years later
An article by Matt Conti in the North End Waterfront – Human Circle Commemorates 100th Anniversary of Great Molasses Flood
|
Why is this Important?
San Mateo County has some of the highest housing costs in the nation. A lack of affordable housing limits the ability of people to live in the county and can reduce the availability of qualified workers for local jobs, thereby constraining economic growth. In response to high housing prices, many workers are forced to either live outside the county and face long commutes or stretch themselves financially and pay more than they really can afford for housing. Approximately 60% of those employed in San Mateo County commute in from other counties for work, which leads to increased traffic congestion and vehicle-related emissions.
After declining for several years, housing prices and rents in the county are on the rise. Increased property values may be welcome news for many current homeowners, but for first-time buyers or people relocating to the area, it only exacerbates the difficulty of purchasing a home in the county.
The county’s housing supply shortage is a primary driver of high housing costs. The Regional Housing Need Allocation (RHNA) is part of a state-mandated process that creates housing production targets for each county in order to increase the supply of housing throughout California. The 2014-2022 RHNA target for San Mateo County is 16,418 new housing units, with 43% of them required to be affordable housing (for very-low and low income residents).
What is a Sustainable State?
In a sustainable state, a sufficient supply of housing is available to all members of society, and new housing supports diverse communities and healthy environments. Local governments consider the housing needs of people of all income levels when planning for new development. Zoning regulations allow for higher density housing located in downtown areas and along transit corridors to meet the needs of our growing population, build community, support transit ridership, and help reduce greenhouse gas emissions.
- Housing prices have increased drastically over the past five years. In 2015, the median sales price (MSP) for a single family home was $1,250,000, an increase of 19% from 2014 and 37% from 2013.
In 2015, market average rent for a 1-bedroom unit was $2,562 (+5.5% from 2014), while market average rent for a 2-bedroom unit climbed to $2,856 (+4.4%).
In 2015, 35% of households in the county with a mortgage are paying more than 35% of their income on housing.
Nearly 45% of the county’s housing stock was built before 1959, and only 22% has been built since 1980. This makes the county’s housing stock considerably older than California’s average.
The most recent Regional Housing Needs Allocation production target for San Mateo County is 16,418 new housing units between 2014 and 2022, with 43% of these required to be affordable housing (very-low and low income), 17% for moderate income, and 40% for above moderate income.
Woodside and Hillsborough were the only two cities to exceed the RHNA projected housing needs between 2007 and 2014. Foster City, Redwood City, and San Bruno built at least 50% of their RHNA projected housing needs as well.
Between 2007 and 2014, 56% of the housing built in San Mateo County was at market rate.
Housing construction is on the rise after reaching a low point in 2010. In 2012, 877 building permits were issued in San Mateo County, up 7% from the year prior. Multi-family housing units made up 59% of these permits, slightly lower than the 72% of multi-housing units the year prior. New housing construction will need to increase significantly in the coming years to meet the production targets of the Regional Housing Needs Allocation.
- Between 2014 and 2015, 339 residents migrated outside of the county, while home and apartment prices continue to rise. Though the median income has increased, lower income residents are getting priced out of the county.
Indicators and Trends
(Click link to jump to section. Dark arrow = recently changed.)
Housing Stock Negative trend
Housing Supply Negative trend
- The annual median home price in San Mateo County increased 19% since 2014.
- MSPs have increased by 82% and 92% for homes and condominiums, respectively, since a 15-year low in 2011.
- Market average rent continued to climb in 2015, though at a lower rate than the previous year. The cost of a 1-bedroom was up 5.5% and a 2-bedroom was up 4.4% from 2014.
- Since 2006, average rent is up 43% for a 1-bedroom and 42% for a 2-bedroom.
Out of Reach
The National Low Income Housing Coalition’s 2014 Report “Out of Reach” documents the shortage of affordable housing throughout the United States. Over half of all renters in the country are cost-burdened, meaning they pay more than 30% of their income on housing.
According to the Report, in order to afford a 2-bedroom unit at fair market rate in San Mateo County, a renter would need to earn an hourly wage of $37.62 (equivalent to annual income of $78,240 or 4.7 full-time jobs at minimum wage). San Mateo County is tied with San Francisco and Marin Counties for having the highest rental costs in the U.S.
- The chart does not factor in the down payment required to purchase a home, just the annual costs of owning the home (assumes housing costs are 35% of gross annual income).
- A median priced home in the county is out of reach for a household earning the county’s median family income (for a family of three).
- In 2014, 35% of homeowners were paying over 35% of household income towards housing costs. Historically, the expected percentage of income allocated for housing was 30%.
Hope for Affordable Housing
Housing affordability in California has become a long-term problem with few solutions available to policymakers. State legislators may have one such solution in the works. Assembly Speaker Toni Atkins has proposed a bill that would levy a $75 fee on real estate transactions, helping finance new apartments for low and moderate income families in California. Atkins’ bill would also set up guidelines to allocate federal housing money and use a portion of the funds from Prop 47, a proposition which lowers certain felonies to misdemeanors, to fund housing for recently released inmates. The plan would create nearly half a million dollars for affordable housing funds.
For more information, visit LA Plan to Fund More Affordable Housing.
- The first-time buyer housing affordability index tracks the number of households in a geographic area that are able to afford an entry level home.
- An entry level home is defined as 85% of the prevailing median price.
- Since peaking at 54% in 2011, housing affordability has declined in San Mateo County each year.
- First-time buyer housing affordability increased between 2013 and 2015 in the US, Contra Costa County, and Alameda County.
- San Francisco showed the greatest decline in affordability from 2013-2015.
• Nearly 30% of the county’s housing stock was built before 1959, and only 38% has been built since 1980.
- Only 6% of housing stock in San Mateo County was built after 2000, while more than half of the county’s housing stock was built prior to 1980.
The Regional Housing Need Allocation (RHNA) is part of a state-mandated process that creates housing production targets for each county based on existing need and forecasted population and job growth. The goals are to increase the supply of housing and to ensure that local governments consider the housing needs of people of all income levels.
Production targets are broken down by income, with housing goals set in each county by income levels. Each income level is defined as a percentage of area median income: e.g., very low = 0-50% of area median income.
- The 2014-2022 RHNA for San Mateo County is 16,418 new housing units, with 43% of these required to be affordable housing (very-low and low income), 17% moderate, and 40% above moderate.
- Between 2007 and 2013, only two cities, Hillsborough and Woodside, satisfied the RHNA Housing projections.
- The three cities that have made the most progress towards the RHNA housing projections so far are Redwood City (84%), San Bruno (77%), and Foster City (63%).
- San Bruno has built 80% of their projected affordable housing needs.
- San Mateo County as a whole has built 31% of the 15,738 units projected.
- Housing construction in the county is on the rise after bottoming out in 2010. In 2013, 877 building permits were issued, an 11% increase from the year prior. The percentage of multi-family units is on an upward trend. In 2013, 59% of building permits were for multi-family construction.
Housing our Growing Population
By January 2015, all twenty-one San Mateo County jurisdictions are required by the state to update the Housing Element of their General Plan. The Housing Element is a vital tool cities use to plan for housing to accommodate their growing and changing populations. It outlines strategies and locations where cities have the best opportunity to meet housing goals, while ensuring that new development enhances the qualities that make our communities livable and unique. To aid in this effort, the San Mateo County Housing Element Update Kit, otherwise known as “21 Elements”, is a collaborative project that aims to encourage and assist with the production and certification of high quality Housing Elements in the county. More broadly, this collaboration intends to strengthen local partnerships and develop solutions to housing needs throughout the county. For more information, visit www.21elements.com.
Public participation is an integral part of the Housing Element update process. Municipalities have held, and will continue to hold, meetings to provide the public with opportunities to help shape their communities. The best way for members of the public to get involved is to contact your local city or town for a schedule of upcoming Housing Element workshops.
|
Discover 52 Journal Prompts
Designed to Build
Christian Faith in Kids!
Bible-Based Worksheets for Kids Ages 5 & Up
But Here’s the Secret to
Effective Journaling: PROMPTS.
Journaling is a wonderful way to open up childrens’ hearts and minds to their Christian faith.
It can be therapeutic.
It can be eye-opening.
And most importantly- it can be a FUN!
A blank page can be intimidating for adults, and downright scary to a child.
Rather than a "dear diary" type journal where children are asked to write about anything, the right prompt ignites a childs’ imagination.
Instead of kids groaning about how they “don’t know what to write about”, they are excited to get their ideas on paper right away.
Here’s a few examples of our Bible-based prompts:
- Adam and Eve invited me to Eden and here's what I saw...
- God made me my favorite animal for a day. I was______ and here's what my day was like:
Today, I’m thrilled to share with you 52 journal prompts for kids. Our prompts are designed with two goals in mind:
- To be FUN for kids (nothing like a standard homework assignment)
- To deepen a child’s relationship with God.
Here's a Look Inside:
Here are Just Some of the Ways We
Use These Journal Prompts:
Early Bird Activities
Keep kids busy (and out of trouble) while the rest of their class trickles in.
Late Pick Up Activities
Let kids continue their learning & fun while they wait for their parents.
5-15 Minute Time Fillers
Sometimes a lesson doesn’t take quite as long as we thought it would, these can help fill in the gap before parents arrive.
Keep each child’s weekly journal entry in a folder to present at the end of the year as a “Journal Portfolio” to families (a wonderful keepsake collection!).
Bulletin Board Displays
Display the chidlren’s journals on a church bulletin board outside your Sunday School classroom.
Sunday School Homework
Send students home with a fun journal prompt that echoes the days lesson (a great discussion starter for parents!)
Homeschool Writing Assignments
Share as a turn-key writing assignment for your homeschooling families.
Mid Week Recharge
Use the prompts on Wednesday nights if your church has a mid-week kids program.
Are you heading out on a long trip by air, train, or car? Print out journal prompts to keep the kids busy (& thinking) during your travels.
Every classroom has a “flu folder” loaded with these journal prompts that we can whip out if a teacher (or student) suddenly falls ill.
Imagination is Necessary for Faith
Some great teachers say that imagination is a necessary component for strong faith.
The basis of Christian journal writing and drawing is using imagination to bring us into a closer walk with Christ.
These prompts will do what no other teaching tool will do for the young: They allow a child’s imagination to be a major component in the learning process.
We are not “teaching” all the input and expecting a child to simply respond to it with output.
We are allowing children’s perception and understanding to feed off itself and grow as they complete more prompts.
Use the prompts as would suit you and your church families - and watch kids expand their hearts, souls and minds!
Our Promise to You:
That’s right, we are so sure that you will love Draw & Write Journal Prompts for Kids that we are offering an unconditional 100% money-back guarantee.
If you are not completely satisfied with the material, all you have to do is notify us within 60 days of your date of purchase and we will refund your money, in full, with absolutely no questions asked!
That’s TWO FULL MONTHS to put these fun, Bible-based journal prompts to the test!
Plus, when you order "Draw & Write Journal Prompts for Kids" you can take advantage of the immediate download feature to get all the printable prompts in just minutes or even seconds from now … that means you could be using it in class on Sunday – even if you are ordering on Saturday night!
And the best part:
|
8 Ways to Celebrate Earth Day With Elderly Parents
Understanding important environmental issues means to keep in mind what direction we, as a species will be headed. Earth Day is a good occasion to spend time with your family, making experiences that could be a bit out of the ordinary.
1. Go to an Earth Day event
From New York to Rome, there are so many Earth Day events set up by local organizations you could choose from. Most specifically, they can be divided into different categories, all with the aim to make people more sensitive to the topic of Earth protection- the ones that should appeal to you are music and culture. In some places, the events will include workshops set up by researchers and artists- that is a good occasion to do something special, but in this case, it is better to get information in advance. A very common activity is that of cleaning up beaches and public places from waste that could harm not only water-living creatures but also humans in the long run.
2. Cook an Earth Day-themed meal
Did you know a plant-based diet is more sustainable for the environment? If you didn’t, it would be a nice idea to cook an Earth Day-themed meal to be more aware of what adopting a different diet would mean. Of course, this doesn’t imply to change forever what one is used to, but rather to get to know some ingredients better. Go to the local grocery store and buy some fruits and vegetables you like. Then, get creative and think about the endless possibilities that come from all those ingredients- you can make vegetable lasagna, a ratatouille, a cheesecake, guacamole…
3. Get a new plant
Getting a new plant and taking care of it is the best way to celebrate Earth Day. If your parents like gardening and have a garden of their own, it would be great to plant a tree, something that lasts for a very long time. Otherwise, get suggestions from the gardener at the store if you want to buy a plant that takes up less space. The most important thing, in this case, is to buy something that can actually live where you place it. In fact, not every plant you buy, as well as some animals, are meant to live in the same climate you are used to. Get to know their story and geographic locations, and make a good choice.
4. Get rid of things together you don’t need any more
Earth Day means to reduce waste- in the general sense. Reflect together about throwing things you don’t need anymore- paying attention to recycling- and think about buying new, ethical items to replace those you don’t want.
5. Watch an Earth Day-themed movie
You can be inspired by protecting the planet without leaving your house. In fact, watching a movie at home with your parents is the best choice if they don’t feel like going out, but still, want to be involved in the celebration. There is a wide range of choices, going from documentaries from action movies, and most of them are family-friendly- you can all sit down and enjoy them.
If you and your parents don’t have the chance to go to a park as often as you would like, this could be a good occasion to explore something new. Go on a guided trip or on your own, to discover the beauty of local flora and fauna. Take pictures along the way, you will learn so much and will want to keep a memory of every moment!
7. Visit a zoo
Animals are one of the focus of Earth Day since the number of endangered species is increasing more and more. Visiting your local zoo will make you more aware of the species that need to be protected and supported over the next decades. There are great Zoos across Texas in the areas we serve such as Fort Worth, Dallas, and San Antonio.
8. Try a different way of making coffee
Eco-friendly coffee is something we don’t often hear about. However, it is worth giving it a shot, since using fewer products to make your morning brew is a way to help to protect the planet. Also, keep in mind to reuse coffee grounds in your garden!
|
Earlier this month, The Times reported that the UK’s sepsis death rates had been found to be ‘the worst in the western world’. The article was based upon a study by authors at Imperial College London in the UK and Mount Auburn Hospital in the USA, which looked at sepsis death rates in more than thirty countries over a thirty year period.
The study found that:
- UK death rates fell from almost 50 out of 100,000 in 1985 to 40.3 out of 100,000 in 2015; however
- The death rate in the UK in 2015 was significantly higher than the average taken across all the countries included in the study, being 27.1 out of 100,000.
These findings will no doubt shine a light on the UK’s efforts surrounding sepsis prevention and treatment.
According to the NHS England website, sepsis is a common and potentially life-threatening condition, which occurs when the body has a systemic response to infection. The UK Sepsis Trust has estimated that about 147,000 people are admitted to hospital with sepsis every year, about 30% of whom die. This equates to approximately 44,100 deaths per year arising from sepsis.
In 2015, the then Secretary of State for Health and Social Care, Jeremy Hunt, stated that his aim was to make tackling sepsis as important to the NHS as the so-called ‘super-bugs’; C. Difficile and MRSA. An action plan, entitled ‘Improving Outcomes for Patients with Sepsis’, was published by NHS England in December 2015.
In the action plan’s foreword, Professor Sir Bruce Keogh (the National Medical Director at NHS England) noted that sepsis had been referred to as a ‘silent killer’, because it could be extremely difficult to identify and because its symptoms could suggest other, less serious, illnesses such as flu. However, he also acknowledged that in many cases diagnosis of sepsis had been delayed and/or patients hadn’t received simple interventions which could have saved lives.
Professor Sir Keogh was frank in stating that better treatment could reduce mortality and morbidity associated with sepsis and he noted that some estimates suggest that 10,000 deaths per year from sepsis could be avoided. He also noted that the ‘Sepsis Six’ care pathway had been shown to reduce the relative risk of death by 46.6% when given to patients with severe sepsis within one hour.
The NHS England website suggests that the annual cost of sepsis in the UK, at a conservative estimate, could be as much as £7.42 billion. They do not specify how much of this, if any, relates to the costs of compensating those who have been injured (or whose loved ones have died) as a result of delays in diagnosing and treating sepsis. Russell-Cooke has acted claimants in such circumstances and the consequences for the patient can be dire.
Given that the data considered by the Imperial College London/Mount Auburn Hospital study ended in 2015, it isn’t yet clear what impact any steps taken by NHS England and NHS trusts will have had upon sepsis death rates since then. However, it seems that substantial progress will be required before the UK can be brought into line with other western countries. Until then, avoidable sepsis deaths will continue to extract a high price from the NHS, and an incalculable personal cost from patients and their families.
|
New Emerging Pest of Apricot in Cold Dessert areas of Ladakh
Authors: Kunzang lamo
Apricot (Prunus armeniaca), locally known as “chulli” is one of the most nutritive, delicious and commercially important fruit crop of Ladakh. It belongs to Rosaceae family and comes under stone fruit. It is widely grown in temperate regions of the world. The crop is widely of distributed in different parts of Ladakh with particularly abundance in Sham areas (lower Ladakh) including Dha-Hanu, Garkhon, Skurbuchan, Domkhar, Wanla, Khaltse and Timosgang. Apricot in Ladakh, is believed to have been introduced a century back either from China or Central Asia. Since then, apricot has become one of the most preferred and important commercial crop of Ladakh. Apricot can be grown easily and produce satisfactorily in the lower area of Ladakh. Usually the apricot growers do not follow the training and pruning practices in Ladakh which is one of the most drawback to commercialized it fully in this region. Apricot tree produce beautiful white or pinkish flowers in spring season that not only ensures the continuity of their population but also give a unique look to the sandy desert of trans-Himalaya. Apricot start ripening in the month of August-September. Manual harvesting is mostly done. Climate change is a big challenging factor for its growth and development in the region. Climate change has both positive and negative influence on growth of apricots. Due to climate change many new insect pests are emerging in this crop and one among them is the codling moth other include aphids, brown tail moth, red and black ants and birds. Earlier, aphids was known infesting only vegetable crops in Ladakh but recently in 2016 there was outbreak of this pest and started attacking on apricots making trees completely barren, there was no flower, no fruit, and there was huge yield loss in year 2016. Climate change would be likely to promote plant diseases like rusts, powdery mildews, leaf spots and leaf blights in different fruit crops. Climate change has the potential to modify host physiology and resistance and to alter stages and rates of development of the pathogen. New disease complexes may arise and some diseases may cease also.
Aphids are small soft-bodied insects, commonly known as plant- lice or greenflies, belonging to and family Aphididae. The different aphid species damaging agriculture crops (cereals, vegetables and fruits) in Jammu, Kashmir and Ladakh regions of J&K State, are not only abundant form of insects, but also show rich biodiversity, existing in the form of apterous adults and winged form, in diverse localities and areas of this region of paramount Zoogeographical importance in north-west Himalaya. The aphid is known for infestation mostly vegetables of Brassicaeae family. Rhopalosiphum nymphaeae has been observed to damage the leaves of fruit trees like apricot and plum. Many Myzus sp. are also known to infest the apricot crop in Ladakh. The infested fruits become shrink, shrivelled, dries up and ultimately fall off of trees. This leads to huge yield loss.
Brown tail moth (Euproctis chrysorrhoea)
This moth is recently emerged insect pest on apricot in Ladakh region. The outbreak of this insect in cold arid region is due to climate change in past few years. The insect was reported in 2010 from Kargil district and in 2014 it was reported from Dha and Bhema. In 2016 its infestation was reported from Achinathang and Skurbuchan village but that the pest to attack. Due to climate change we are able to grow many vegetables in open and in protected structures which was not possible years back but on the other side many invasive pests were reported in this region which causes severe outbreak like locust, brown tail moth etc. Caterpillar causes severe allergic reactions to humans. When it comes in close contact with people, it can cause an allergic reaction, itching, rashes on their skin and breathing related which may be due to some toxins released by this insect in the air which we breathe or may be due to contact with the poisonous hairs of the insect. Contact of these hairs with human skin causes a rash that can be severe in some individuals. People can also experience respiratory distress from inhaling the microscopic hairs that blow around in the air. Direct contact with a caterpillar isn’t necessary for ill effects.
Fig . Hairy caterpillar feeding on leaves
Ants are eusocial insects of the family Formicidae. The ants found on the apricot fruit is of two types on the basis of colour i.e. red and black one. These ants are very active during the fruit ripening period and attacks in a group making fruit unfit for consumption. These ants completely destroy the fruits by eating the whole fruit leaving stones behind. Black colour ants were found to infest almost all varieties of apricot but red colour ants were found to attack more on sweeter varieties like Halman. Fruits of Halman variety being sweeter than other varieties attack of ants are more.
Fig. Infestation of ants on apricot fruit
Codling moth (Cydia pomonella L) is a member of the lepidopteran family Tortricidae. The larvae penetrates into the fruit and tunnel to the core, leaving a small, red-ringed entry hole in the fruit that are filled with reddish-brown, crumbly droppings. The infested fruits become shrivelled, smaller in size and thin covered as the larvae feed on the whole pulp, fruits become brown in colour and thin outer fruit skin dries up, and finally drop off pre-maturely. The larvae after feeding escape and start infesting another healthy ripe fruits of apricot. The larvae often infesting 40-90 % of the fruit. If left uncontrolled, larvae can cause huge losses to the apricot grower of Ladakh region. Such infested fruits cannot be consumed and marketed.
Fig. Figure shows the pinkish larvae and the apricot fruits infested by the larvae
Black-winged snowfinch (Montifringilla henrici). These birds are locally known as ‘Echu’
In lower belts of Ladakh region (Sham) the birds attacking is more common. Birds usually attacks on ripe fruits of Halman variety making apricot fruits unfit for consumption. These birds attack in groups, so farmers facing problem and need to look after the tree for whole day. These birds attacks on whole ripe fruit leaving behind the stone part.
Fig. Common bird that attacks on apricot
Most birds, along with their eggs can be seen in their nest built on branch of the trees.
Some common management practices need to be done to reduce the infestation:
It is very important to keep the orchards neat and clean. Sanitation is the precautionary method to avoid introducing a pest into a field. As we know prevention is better than cure. The farmers in Ladakh do not care about the sanitation of their respective orchards, it may be due to lack of awareness about pest and its life cycle. Always keep the orchard clean by removal and burying of fallen leaves, remove dried leaves from the trees and orchards in the winter as they can harbour eggs of the moth. Remove webs by pruning practices. Do this in the early morning or evening when the weather is cool and the moths are still in their webs. Dispose of the webs in a sealed paper bag in the garbage or compost pile or burying deep under the soil. Judicious use of pesticides must be done to control the pest infestation. Use of biodegradable or environmentally safe pesticides like plant extracts (Neem oil formulation, Datura stramonium and Garlic extracts formulation etc.) significantly reduce the pest infestation through eco-friendly approach. This is an elegant way of reducing the amount of pesticides residues on agriculture and horticulture crops. We can implement Integrated Pest Managements. The IPM is a little bit difficult but not impossible because it is a systematic approach to pest controls that combines biological, cultural and other alternatives rather than single approach. The farmer should daily visit his field in morning hours if any incidence of pest infestation noticed then contact concerned department or concerned scientist. He or she rogue out and bury the infected plant or plant parts in early stages. In early stages, it is easy to manage pest infestation. Crop rotation is also very simple and cultural method to control various insect pests infestations. Do farming in a scientific way like line proper spacing, crop rotation, use well decomposed organic matter in the soil, regular watch and ward of the field, proper sanitation in the field, seed treatment before sowing, procure seed from reliable source etc. is the need of the hour. Always adopt cultural and biological practices in managing insect pest instead of chemical. When any pest causes severe outbreak and havoc then it’s important to use the chemical in a judicious way to manage that pest. Use chemicals as a last resort for managing insect pest.
About Author / Additional Info:
I am kunzang lamo (female) student of Horticulture( fruit science)
|
Executive Summary of Zambia Report
This report, prepared by the International Insulin Foundation (IIF), is to be the first stage in a collaborative process between different stakeholders both at a national and international level to find creative means to improve the welfare of people with Type 1 diabetes in Zambia. The IIF aims to mobilise different areas of expertise and resources to frame practical proposals to help Zambia provide the care that people with Type 1 diabetes require. In parallel this report hopes to contribute positively to the issues of chronic diseases in Zambia.
Type 1 diabetes is considered a rare disease in Africa estimated as affecting only 108,000 people. Since survival in many is short this probably greatly underestimates the true prevalence and the potential care needs. Despite major healthcare problems of communicable diseases, Zambia is caring for its citizens with diabetes relatively well. Data suggest four times as many patients than estimated for many other sub-Saharan countries. Moreover, there is little evidence of an urban/rural divide in Zambia.
All these issues need to be placed in Zambia’s general health care context where problems of staff, infrastructure and resources are omnipresent.
- Variations in Central Board of Health purchasing price of insulin
- Patients do not know where to get insulin
- Price of insulin to patients is often high, even though it should be supplied to them for free
- Lack of syringes
- VAT and duty are present on syringes and testing material
- Diabetes Care:
- Lack of structure around diabetes care
- No national guidelines for diabetes care
- Lack of educational materials for patients and Healthcare Workers
- MedLab policy on laboratory supplies is not properly implemented, which leads to patients not being able to access the proper diagnostic tools
- Healthcare worker education:
- Lack of education in frontline healthcare workers
- Curriculum for medical and nursing students is not adapted to treating and managing diabetes and other Non-Communicable Diseases
- The Diabetes Association of Zambia (DAZ) needs to raise its profile and find sustainable means of funding
- A Policy framework is being developed in Zambia to address Non-Communicable Diseases
- A Health Management Information System (HMIS) that collects disease data from most facilities in Zambia does not include diabetes
- Important role of Traditional Healers
- Long distances between patients and source of care/insulin, which means the added expense of travel for patients
- Very low knowledge about diabetes in the general population and government
Keeping in mind the resource restrictions present in Zambia the following recommendations aim to make best use of limited resources and also to benefit other areas of the health system in Zambia.
- Proper acquisition process to ensure lowest possible cost to Central Board of Health for insulin
- Information and guidelines for patients on where they can receive their insulin
- Implementation/Enforcement of policy of free care for chronic conditions
- Add syringes to essential drug list and supply insulin and syringes together
- Develop diabetes clinics based on the model of University Teaching Hospital (UTH) paediatric clinic
- Define role of each type of facility in diabetes care
- Develop national guidelines for diabetes including patient and healthcare worker information
- Laboratory supplies need to be present as per MedLab Policy and reliable suppliers need to be found for these materials
- Develop an Integrated Competence Training (ICT) manual on diabetes and Non-Communicable Disease diagnosis, treatment and management
- Develop curriculum at medical and nursing schools to include treatment and management of diabetes and Non-Communicable Diseases
- Promotion of DAZ and increase its visibility, in parallel with raising the knowledge about diabetes in the general public and government
- Policy being developed by the Ministry of Health should be far reaching, not only addressing issues affecting the health sector, but also issues of food, transport, sports, education, etc.
- Add diabetes to HMIS system
- Include Traditional Healers in any policy or guidelines developed for diabetes and Non-Communicable Diseases
- VAT and duties on any items linked to the care of people with diabetes should be dropped
A full copy of the report can be downloaded here:
|
In most industries, where sterile equipment is needed in the work environment, autoclaves play an essential role.
Hospitals are one of the top fields that make use of this machine on a daily basis.
Way back in 1879, Charles Chamberland, one of the first to use and introduce autoclave, has shown the healthcare industry the importance of using this machine, rather than rely on using open flames for sterilisation.
Not long after, researchers have embraced the use of autoclaving and they are now widely used in most clinics and hospitals.
There is no denying that autoclaves play a crucial role in maintaining a sterile environment, especially in hospitals.
While the general use of this machine is mainly for sterilisation purposes, even for those industries outside the medical field, the applications may slightly vary for hospital use.
In a nutshell, items that are being sterilised within the hospital are:
- Lab Equipment and Supplies - This may include but are not limited to bottles, Petri dishes, beakers, test tubes, containers, flasks and more.
- Surgical Equipment - Knives, blades, scissors, scalpels, clamps, forceps, and other surgical equipment need to go in the autoclave machine before every single use.
- Clothing - Lastly, surgical drapes, gowns, gauzes, and bandages (some types) also need to be sterilised, thus, goes into an autoclave.
How Autoclaves Work and Why Hospitals Benefit from It
The majority of supplies that are found and used in the emergency room, delivery room, and most especially in the operating room need to be sterile.
A sterile environment starts with sterile supplies to ensure that patients don't get infected regardless if it's a minor or major procedure.
The main process of sterilisation with an autoclave machine starts with the use of steam.
This steam is then responsible for killing viruses, bacteria, germs, spores, and other microorganisms that are resistant to even the most powerful detergents and even boiling water.
These instruments are then placed inside an autoclave, where the heat from the steam is expected to be above boiling point.
Compared to using an open flame, this sterilisation technique has been proven to be the most effective way to get rid of those bacteria without taking too much time, and space.
Different Sizes of Autoclaves Used in the Hospital
Autoclave machines may vary in size. Some may be as small as a pressure cooker, while some others may look like a microwave oven.
For smaller surgical equipment, the smaller sizes may do - as it can still hold more than enough equipment to sterilise all at once.
On the other hand, there are also horizontal autoclave machines, which are significantly larger than the tabletop types.
These horizontal types are able to hold larger and more equipment at once.
Some are stacked together if the department needs small, but multiple autoclave machines.
In most hospitals, autoclaves may come in various sizes, depending on which department they're in, and its uses.
In the laboratory, a tabletop autoclave usually does the trick, but in operating rooms where larger surgical supplies are needed, the horizontal types are found, or sometimes, they're stacked together to save space.
There's no right or wrong choice - at the end of the day, it all boils down to what's needed by the hospital or department.
The use of autoclave machines in hospitals is undeniably one of the core "requirements" in order to run a sterile environment that meets government and departmental standards.
While there are various autoclaves out there in the market, doing your research, finding out which particular application you require and understanding the differences that each plays a crucial role in ensuring that you invest in a quality autoclave machine that is suited for your needs.
We were originally established in 1952 in order to provide electro-medical products to healthcare professionals across the country.
The company (Medical Equipment Services) was acquired by Medical Equipment Australia in 2009. Since then, we have also expanded into the dental industry.
|
I used to teach English at a high school. Looking back, I now realize the cultural subversion that was contained in the reading list.
Here is the gist of the stories that we read:
- Death of a Salesman – The traditional American family is a sham (i.e. the adulterous and pathetic Willie Loman).
- The Crucible – The Pilgrims were adulterous hypocrites; thus, the foundation of America is suspect.
- Of Mice and Men – The business owner is evil (i.e. the ranch owner); the ignorant worker is noble (i.e. George and Lennie).
- Song of Solomon – The black American should be an angry victocrat from a broken family.
- Farewell to Manzanar – World War 2 was a time of American atrocities (i.e. the Japanese internment in California).
- Animal Farm – The government is evil (i.e. the pigs).
- Romeo and Juliet – Your parents don’t know what’s good for you.
It’s little wonder that so many Americans are broken: fat, divorced, drugged out. Their formative years are soiled by a denigrating Weltanschauung. They’re encouraged to hate America, to mock the traditional family, and to embrace poverty. They’re encouraged to be losers.
Now I know why so many parents are home schooling their children. Public education is a poisoning of the mind—a factory that’s producing a generation of broken Americans.
|
The four layers that make up Bump Mark
How the bio-reactive mechanism works
Expiry information that is far more accurate
What it does
Using gelatine to model the decay process of food, Bump Mark is able to tell you exactly the condition your food is in, simply by running your finger over the label. If it’s smooth, then you’re good to go, but if you start to feels bumps as the gelatin breaks down, be cautious.
I wanted to create a solution for enabling visually impaired consumers to gain expiry information about their food, as currently the only indication is a printed date. From the start, I knew that the solution must appeal to sighted people also, because the sad reality is that new solutions only get implemented by companies if the benefits are useful to the majority. This is why I worked to create a cheap solution that could be applied to existing food packages and also provides information that even sighted people haven't had access to before: information about the actual condition of food.
How it works
The solution is simple: The label gives tactile information, so when it is smooth, your food is fresh. If you start feeling bumps, then it's time for the bin. So how does it work? Gelatine is set over a bumpy plastic sheet. Because jelly is solid when it sets, the bumps cannot be felt at first. As the gelatine decays, it becomes a liquid when it expires. This means that the bumps underneath can be felt, letting you know that it has expired. Why gelatine? Gelatine is protein, so it decays at the same rate as protein-based foods. The label simply copies what the food in the package is doing, so the expiry information is going to be far more accurate than a printed date.
At first, I looked at many different ways of solving my initial brief, and not just in the packaging category. I explored products to be used in the home and even ones that could be used in the supermarket before my focus group expressed that they would prefer an integrated packaging solution. I wanted to create a label that would change it's texture over time, and the most logical way that I could think of doing this was to use a biological substance to model the decay process of the food. The label design went through well over 20 iterations, each of which were tested for user perception and technical performance, both equally as important as each other. I am currently looking to commercialise this product and have started conversations with retailers and technology development companies, as well as having a patent pending for the design.
How it is different
Winner of the Inclusive Design Award, awarded by Made in Brunel and sponsored by Crown Packaging. Winner of the James Dyson Foundation scholarship at Brunel University.
|
A dog of a breed developed in Scotland for retrieving game, having a dense coat of golden hair with feathering at the neck, legs, and tail.
(click for a larger image)golden retriever
The American Heritage® Dictionary of the English Language, Fifth Edition copyright ©2020 by Houghton Mifflin Harcourt Publishing Company. All rights reserved.
Indo-European & Semitic Roots Appendices
Thousands of entries in the dictionary include etymologies that trace their origins back to reconstructed proto-languages. You can obtain more information about these forms in our online appendices:
The Indo-European appendix covers nearly half of the Indo-European roots that have left their mark on English words. A more complete treatment of Indo-European roots and the English words derived from them is available in our Dictionary of Indo-European Roots.
|
© 2023 MJH Life Sciences™ and Infection Control Today. All rights reserved.
To the relief of patients diagnosed with hepatitis C, the Food and Drug Administration approved two new treatments late last year, and a few more are on the way. Now scientists are solving another side of the disease's problem: identifying the millions more who have the virus but don't know it - and unwittingly pass it on. A report in the American Chemical Society's journal, Analytical Chemistry, describes a novel, scrapbook-inspired test that does just that.
Xuan Mu, Zhi Zheng and colleagues point out that the hepatitis C virus (HCV), a bloodborne pathogen that can cause liver cirrhosis, cancer and even death, kills more people in the U.S. than HIV. It also infects an estimated 150 million people around the world. Although diagnostic tests exist, they require an initial screening and then a costly second test for confirmation. The extra office visits, money and time required for a definitive diagnosis means a lot of people simply can't or won't follow up. To make diagnosis more accessible, the researchers took advantage of the recent development of new, inexpensive paper-based medical technologies and applied it to HCV screening.
Taking a page from the popular scrapbooking pastime, the scientists used a flower-shaped metal paper cutter to punch out shapes from special paper for their diagnostic test. The method solves the problem of patterning the paper, made of nitrocellulose - a highly flammable substance - without using heat. They add antigens, antibodies and other chemicals to the paper to test patient samples. With one flower-shaped paper, they can conduct both HCV tests on a sample simultaneously in just minutes, instead of hours.
The authors acknowledge support from the National Scientific and Technological Major Project of China and the National Natural Science Foundation of China.
Source: American Chemical Society
|
The construction industry is unique in many respects. It falls at the intersection of many different classes of workers, all requiring a different level of skill set. Each tier of workers has their essential part to play from the construction laborers to the civil engineers and architects.
However, over the years, the landscape of the construction industry is slowly but surely, changing. New technology is affecting the industry more than ever, making it essential to understand the trends that would shape the industry in the new decade.
Of the below-mentioned trends, some would be known to you, like green building construction, while others can be totally new. However, a comprehensive understanding of these is important now that almost half of 2020 is up. The construction trends to watch out for are-
Robotics- This is probably the most direct impact of technological advancements in the construction industry. There are several ways in which robotics and technical advancements have permeated the construction industry and enhanced it. One significant example is the use of drones. Drone use for surveying and mapping has been one of the fastest-growing trends over the years, and it would continue to shape the industry in the future as well. Drones can be used to map large areas, survey the area, and help design, gather information, etc. They are also used to ensure safety measures and improve the efficiency of work on the job site.
Green building construction- Green building construction, simply put, is the inclusion of sustainability in the construction practices. As people are becoming increasingly aware, green building construction is set to become the norm for construction. And the good news is that some places have begun to include these measures in their laws. This means good news for the environment because the buildings are made in an eco-friendly manner, but the resources in its construction are also used more efficiently. As the population grows, the people would need more buildings to live in, and the only solution is to make the buildings themselves sustainable. This trend is here to stay.
Modular and prefabricated construction- Prefabricated construction is a boon for millions of people around the country. This is because it leads to significant savings on the part of the owners and builders. Modular off-site construction involves building the same structures again. As a result, the furnishings and pieces are all top-notch in terms of construction and save a huge amount of time and resources. As the volatilities in construction increase, this acts as a counterbalance to eliminate extraneous variables and is surely here to stay.
Building Information Modeling- This trend represents exactly what the name suggests. Building information modeling (BIM) uses software and technology to represent buildings and infrastructure projects as digital images. These digital representations help engineers and architects visualize a building before it is made. Based on these, some simulations can also be run tweaking construction variables like labor, building material, etc. BIM technology works to optimize the construction process and saves on labor, time, money, efforts, tools, etc.
Augmented reality and Virtual reality- Think about it, what if you could look at and interact with every part of a building, even before the construction has begun? How nice would it be to get a feel of the interior and iron out the flaws in design beforehand? It is almost like being able to see the future. The digital 3D visualizations that AR and VR can produce are getting better with time and it is to be seen how they shape the future of the construction industry.
The construction industry trends mentioned above are going to change the landscape in the coming years. The effects of these trends are something that cannot be predicted at all at the moment. How would it impact the various stakeholders like construction workers, engineers, constructors, etc.? Only time can tell.
- VITARA 2021 YOUTUBE NEWS VOLVO 2021 NEWS VOL 2021 WORLD NEWS WHATSAPP 2021 NEWS WRC 2021 2021 WACOM NEWS 2021 XRP NEWS 2021 XIAOMI NE
- Picture Your Trump On Top. Read This And Make It [email protected] Your Trump On Top. Read This And Make It So
- Buying a new laptop is a not an easy since there are a vast variety of laptops in the market.The 2009 Countrywide Analysis of Instructional Progress .
- To possess a preschooler or kindergarten in your home might be quite complicated. Alternatively, it may be enjoyment and intriguing.
|
An important component of overall health and fitness is good oral hygiene. Cleaning your teeth and gums regularly helps reduce your risk of developing cavities, gum disease, and foul breath. We'll talk about the value of brushing and flossing in this blog and offer advice on how to do it properly.
Brushing Your Teeth
The most fundamental component of proper oral hygiene is brushing your teeth. Brushing your teeth twice a day for at least two minutes each is advised by the American Dental Association (ADA). Here are some pointers on how to correctly wash your teeth:
- Pick the proper toothbrush: It's critical to pick a toothbrush with soft bristles that fits your mouth nicely. Your gums and enamel can be harmed by hard bristles.
- Brush at a 45-degree angle: Point the bristles of your toothbrush in the direction of your gum line while holding it at this angle. To clean each tooth's front, rear, and top, use gentle circular strokes.
- Don't forget to brush your tongue; if bacteria build up there, it might cause bad breath. To gently clean your tongue, use a tongue scraper or your toothbrush.
- Use fluoride toothpaste: To strengthen your teeth and ward against cavities. Fluoride is a mineral. Seek for fluoride-containing toothpaste with the ADA mark of approval.
- Brush gently; vigorous brushing can harm your gums and enamel. Let the bristles do the work by sweeping them in gently, circular motions.
How to Floss Your Teeth
Flossing is a crucial component of dental health because it helps get food and plaque out from between your teeth. The ADA suggests doing it at least once every day. Here are some pointers on how to correctly floss:
- Use the proper floss: Waxed, unwaxed, and flavored floss are just a few of the many options available. Select the kind that best suits your needs.
- Use enough floss: Choose a length of floss that is long enough—about 18 inches. Hold it taut by wrapping the ends around your fingers.
- Be kind: Use a gently sawing motion to slide the floss in between your teeth. Each tooth should have the floss wrapped around it in a C shape, then slid under the gum line.
- Use a fresh piece of floss for each tooth: As you proceed from one to the next to prevent the spread of bacteria.
- Don't miss the flossing: Maintaining healthy teeth and gums requires flossing, which can be time-consuming.
There are more actions you may take to maintain proper oral hygiene in addition to brushing and flossing. Here are some extra pointers:
- Reduce your intake of sugary and acidic foods because they can cause tooth decay and enamel erosion. Limit the amount of these foods and beverages you consume.
- Drink a lot of water to keep your mouth moist and to help rinse away bacteria and food particles.
- Go to the dentist frequently: Frequent dental checkups can aid in early problem detection and stop the emergence of more serious disorders.
Maintaining good dental health requires adequate oral cleanliness. The most fundamental components of dental hygiene are brushing and flossing, and they must be performed correctly. Make sure you're brushing and flossing efficiently by using the advice in this article. Keep in mind that maintaining healthy teeth and gums is an investment in your overall well being.
|
Cruz Reynoso: A Life Committed to Justice
Entre Los Primeros…Among the First Chicano Heroes
In my very limited knowledge of Chicano History, there are a handful of advocate influencers whose example of social justice activism or public service became role models to emulate and follow.
Many people consider that Cesar Chavez was the first U.S. born hero of the Mexican community in this country, recognized nationally and internationally.
On this occasion of remembering the late Cruz Reynoso, I begin by saying that, like Cesar, Cruz’s was a lifelong commitment to the betterment of our community in the manner he practiced social justice—as a rural private attorney, as attorney and Executive Director of CRLA, as a jurist, and as a law school professor.
Although he was less in the public eye at the time, Cruz also was a civil rights hero and mentor, introducing many of us to the lofty notions of civil rights causes and how to be a public servant.
The Imperial Valley: A Personal Connection
Like Cruz, I went to UC Berkeley School of Law (he graduated in 1958, I graduated in 1978) and began my practice in the Imperial Valley, 30 years after Cruz had served the Mejicano community there.
With me coming from the Valley where Cruz came to practice in the 1950s, the Reynoso connection was more personal. It is and was about family roots and how serving the Mexican communities in rural places related to the immigrant origins of our parents.
Cruz’s family history reflected migration from Mexico in the late 1920s from the state of Jalisco, from a village outside of Jalostotitlán, whereas mine were from Leon, Guanajuato and San Jose del Cabo, Baja California Sur. Cruz’s story includes his father having worked with the Union Pacific railroad, which was a common family story of many Mexican migrant families who came to reside in the Imperial Valley from the early 1910s to the 1930s. The Reynoso family made their way from Mexico through Arizona ending up in the orange groves of Orange County, living in the town of Brea. Thereafter, part of Cruz’s youth included migration as farmworkers through the Central Valley with his own parents, Juan and Francisca.
Like Cruz, my own father gave up his youth and schooling to migrate and pick crops with my grandfather (who had arrived with my grandmother to the Imperial Valley in 1925), and he continued a fruit picker until he went off to serve in the Army in World War Il and, through his military service, earned his citizenship.
Also like Cruz, my father used military service to leave field work and seek a better economic life, including better education for his children, away from the fields.
Agent of Change
Before I met Professor-Justice Reynoso, I knew of him because the local community where I was raised in the 1950s came to know him as the first Spanish-speaking attorney there.
Like Cruz, my upbringing was itself a social justice education. Reynoso’s story includes the discrimination suffered in rural La Habra, where mail service was different for Mejicanos compared to service provided their white neighbors. I too learned the racism of railroad tracks that divided small towns and about “knowing your place”—even without hearing words to that effect. Certain social truths were just understood.
Into that segregated and divided place came Attorney Reynoso, into our valley of small rural towns that had never known an attorney with a Mejicano last name.
Cruz was an early sign of more change coming to the Valley. My generation came to believe that higher schooling was for us too. In High School, two of my friends spoke of becoming “an attorney.” (I admit today that, even though I was a high-achieving student, I had to look up “attorney” in the dictionary, not realizing it was the same as “lawyer.”)
For my friends, the next sentence would include “Reynoso,” because at that time CRLA came to represent us in litigation against the High School, which had failed to respect our First Amendment rights to free speech when we wore “Chicano Liberation” buttons during the school day. Of the three friends, I became the lawyer. It was another Chicano Movement social justice impact—affirmative action that sent me to Stanford in 1970.
El Señor Cruz Reynoso
When I asked my parents about this man “Reynoso,” they would say “Ah, el Señor Reynoso...” and then they would speak to his local reputation. “Señor” in this context was the same word of respect as if it had been “Don Cruz” in another generation. “Señor” as in “gentleman”—for Cruz, it truly meant a gentle man, a gentle soul. Señor Reynoso was an “hombre de palabra... de valor,” a person of his word and a person who lives by values learned from life, not learned from a book. Or, as my abuela would say, “un hombre educado.”
Now I know, from my own friendship with and the mentorship I received from Cruz, that the nature of his humility was the indelible gift that set him apart from other persons of his generation.
In the Teachings of Don Juan: A Yaqui Way of Knowledge there is a distinction between two different forms of humility. In one, the image is of a humbled person—hat in hand, head bowed, the gesture less of respect than of being dominated.
The second definition of humility equates a human being to everything that is life: a human being is equal to the rock, the tree, the plant, to the earth. Those things are not there as a separate nature to be dominated or controlled. This humility is referred to as the “humility of a warrior.” A warrior does not humble others but is himself not dominated. He is no better than another nor is another better than he.
This humility of a warrior was Cruz’s humility. He did not let accomplishments like being the first Latino on the California Supreme Court change this quality that characterized how he interacted with lawyers, professors, and farmworkers alike.
The Imperial Valley’s “Legal Aid”
Before legal aid came into the Imperial Valley in 1966 with the opening of the El Centro CRLA office, Cruz Reynoso was “legal aid”—he was “CRLA” before CRLA even existed!
The Reynoso myth was that those Mexican folk of las colonias—the neighborhoods in the segregated east sides of El Centro and Brawley, where we lived when I was 7- 15 years of age—those residents went to the Reynoso home to get their “legal aid.” He made himself available on Sundays to dispense law from the home he shared with his wife, Jeannene. Cruz quickly became known for serving anybody who showed up at their doorstep and for their home being open for people to bring community issues to his attention.
At the time, people like my family had a limited image of “lawyer” as a person of the law. Not the police, yet someone who mediated between you, your family, and the criminal justice system—the criminal lawyer only. Never the lawyer who assisted in other legal matters, in civil life.
But Cruz showed those communities, in those early years of private practice with the Duddy-Reynoso Law Firm, that civil law could be a “friend” of people in poverty, a tool for that segregated community, a voice in the political and public discussion affecting their lives. His caseload included large numbers of Workers Compensation cases assisting injured farmworkers.
Cruz’s attitude had to have been formed by the way he lived his own segregated youth. Like Cesar Chavez would say, at some point along the way, “I took it personal”—that is, you take your personal sense of “injustice” and you convert it into social service, social obligation, social responsibility that when done effectively results in integration, equity, equality, and those civil rights remedies create a larger Social Justice.
Politics and Rural Advocacy
Cruz joined CRLA as Deputy Director in 1968 and served as our second Executive Director from 1969-1972, following our founder Jim Lorenz. Cruz stepped into leadership at the height of political opposition during CRLA’s Office of Economic Opportunity / War on Poverty period.
Wins like challenging Governor Reagan’s Medi-Cal program cuts before the California Supreme Court (Morris v. Williams, 1967) generated much local opposition from rural bar associations, local welfare departments, and the State Bar. Political opposition from Big Ag soon followed when CRLA litigation halted the bracero program (Williams v. Wirtz, 1967).
Governor Reagan exercised the veto authority granted under the Economic Opportunity Act to cut CRLA’s funding. Cruz was at the forefront of CRLA’s defense and the federal Office of Economic Opportunity supported CRLA and overruled the veto.
Just as the CRLA of Cruz’s time faced rural political backlash because of its successful advocacy, so did CRLA during part of my tenure when the California Dairy Industry challenged CRLA’s successful dairy litigation. I was called to testify before Congress in 2004, supporting CRLA’s work with the CRLA Foundation and its litigation that allowed 17,200 people class relief through the use of state law.
We are still here, fighting for the rights and dignity of California’s most exploited and vulnerable communities.
Un buen hombre de gran corazon
For me and many other CRLA staff, Cruz Reynoso’s legacy showed that CRLA’s rural clients, including farm workers, deserved the most aggressive advocacy that we could bring in the defense of their labor, health, education, and public benefit rights even at the political risk of losing critical funding.
If we continue to believe that we each can give back, give of ourselves through whatever measure we decide—pro bono, donation, or other public service—if we undertake it selflessly so that others can reap the benefit of justice, then Cruz has served us well as the Justice Teacher. He was a gift to those of us so blessed to be taught by his example.
Compañero, fuiste un buen hombre de gran Corazon. ¡Que en paz descanses!
California Rural Legal Assistance, Inc.
May 10, 2021
|
Warmest Canadian Cities in Winter
For warm winter weather, no major city east of the Rocky Mountains comes close to the balmy climate enjoyed by the three large cities in southwestern British Columbia: Victoria, Vancouver and Abbotsford.
They always fill the top three spots on the lists for mildest winter days and nights, fewest frosty days and fewest nights with chilly temperatures. BC's other large city, Kelowna lands at a distant fourth in winter warmth.
Elsewhere in Canada, the warmest cities for winter weather are in Ontario and the Maritime Provinces. Among these, the Ontario cities of Toronto, Windsor and St. Catharines stand out as having a consistently warmer winter climate than the rest.
Victoria, BC is the unchallenged leader among Canada's large cities for winter heat. It ranks several degrees and days ahead of the others for warm weather. Victoria is the only large Canadian city to not normally drop down to -10 degrees Celsius (14 degrees Fahrenheit) during winter.
The tables below list the major Canadian cities that in winter have the highest maximum and minimum temperature averages, the fewest freezing days and the lowest number of really cold nights.
The cities included in these rankings are Canada's largest metropolitan areas. These are the 33 urban regions that had over 100,000 people according to the 2011 census by Statistics Canada. The temperature data are averages of weather measurements made from 1981 to 2010.
Hottest Winter Climates
The mildest winter days are found at these ten cities. They are the only major Canadian cities with an average daily high temperature during winter that's above freezing.
|City||High °F||High °C|
|Victoria, British Columbia||48||8.8|
|Abbotsford, British Columbia||45||7.2|
|Vancouver, British Columbia||45||7.1|
|Kelowna, British Columbia||37||2.6|
|St. Catharines, Ontario||34||1.1|
|Halifax, Nova Scotia||34||1.0|
|Toronto, Ontario||33||0.6||Hamilton, Ontario||33||0.4|
These dozen cities have the warmest winter nights. They all average a low temperature for winter that's above -8 °C. Only three Canadian cities have winter minimums that are mainly above freezing.
|City||Low °F||Low °C|
|Victoria, British Columbia||38||3.5|
|Vancouver, British Columbia||34||1.3|
|Abbotsford, British Columbia||33||0.5|
|Kelowna, British Columbia||26||-3.5|
|St. Catharines, Ontario||21||-6.1|
|Halifax, Nova Scotia||20||-6.7|
|St. John's, Newfoundland||19||-7.2|
Fewest Frozen Days
Many Canadian cities remain below freezing for most of winter. Just these nine cities usually have fewer than 40 days when the thermometer never rises above freezing.
|Victoria, British Columbia||1|
|Vancouver, British Columbia||3|
|Abbotsford, British Columbia||5|
|Kelowna, British Columbia||28|
|St. Catharines, Ontario||38|
|Halifax, Nova Scotia||38|
Fewest Nights with Chilly Temperatures
Just eight Canadian cities typically have no more than 25 nights a winter when the temperature drops to -10 °C.
|Victoria, British Columbia||0|
|Vancouver, British Columbia||1|
|Abbotsford, British Columbia||2|
|Kelowna, British Columbia||16|
|St. Catharines, Ontario||23|
Environment Canada. Meteorological Service of Canada. Canadian Climate Normals. 1981-2010 Climate Normals & Averages.
|
What is the Etudes Project? What exactly is an “Eh-tude”?
In classical music, an “Etude” is a piece written for students to practice a particular musical or instrumental technique; it’s just French for “Study”. But Etudes are also meant to be “real” music, to be performed on a stage and not just a practice room.
I wrote this set of five solo guitar pieces over the first few months of 2020 partly in the course of further developing my own picking technique. I had resumed practicing classical guitar regularly for the first time since I was a graduate student almost 30 years ago, and was (and still am) deeply engaged in resolving longtime challenges in my picking hand.
Each piece has its own character, but what they all have in common is that each uses coordinated thumb-finger patterns to bring out melody across different strings. In other words, a single figure might contain both melody and accompaniment, so the musical challenge is to be able to make that easily clear to the listener.
The Etudes Project
These Etudes are not for beginners, and intermediate players will find that there’s a lot to dig into. But they do stay mostly in the open position, and the illustrated sheet music book also includes tab.
What about the “Project” part, you ask?
I’m looking to select a handful of players and students to coach through these pieces, and in return asking for performances on video both to gauge progress and ultimately to share when the performance is ready. You don’t have to commit to all five. I’m writing this on January 28, 2021, and will be accepting inquires through the month of February 2021. I will provide a pdf of the music and a signed copy of the illustrated music/tab book to all selected participants. Email me if you’d like to participate!
I have been playing guitar for about 5 years now. I truly enjoy playing. I’m grateful for your consideration. Here is the first song I ever recorded. I literally woke up picked a my guitar hit record on my phone.
I do enjoy your YouTube videos Dave thanks for all you do
I got your Etudes lessons. I have had some success with learning Travis picking. The Etudes are going to be a BIG challenge. Thanks Dave. I am going to get them eventually.
Sunnyside NY Guitar Teacher
Very cool and informative article. Thanks for sharing!
Just found you on YouTube, been playing couple of years , just started fingerpicking ( done my grade 4 rgt electric guitar exam , gained a distinction, and grade 3 Royal college of music theory exam also gained a distinction. I would have been very interested in this but been a crazy year
Thanks for all you do , and what you give back ,
Best wishes from the U.K.
Thank you Nikki, and congrats on your progress!
|
Researchers Take Step Toward Building Fault-Tolerant Quantum Computer
(Phys.org) Joint Army- and Air Force-funded researchers have taken a step toward building a fault-tolerant quantum computer, which could provide enhanced data processing capabilities.
Researchers at University of Massachusetts Amherst identified a way to protect quantum information from a common error source in superconducting systems, one of the leading platforms for the realization of large-scale quantum computers.
ARO is an element of the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory. AFOSR supports basic research for the Air Force and Space Force as part of the Air Force Research Laboratory.
“This is a very exciting accomplishment not only because of the fundamental error correction concept the team was able to demonstrate, but also because the results suggest this overall approach may amenable to implementations with high resource efficiency, said Dr. Sara Gamble, quantum information science program manager, ARO. “Efficiency is increasingly important as quantum computation systems grow in size to the scales we’ll need for Army relevant applications.”
the researchers’ experiment achieves passive quantum error correction by tailoring the friction or dissipation experienced by the qubit. Because friction is commonly considered the nemesis of quantum coherence, this result may appear surprising. The trick is that the dissipation has to be designed specifically in a quantum manner.
“Although our experiment is still a rather rudimentary demonstration, we have finally fulfilled this counterintuitive theoretical possibility of dissipative QEC,” said Dr. Chen Wang, University of Massachusetts Amherst physicist. “This experiment raises the outlook of potentially building a useful fault-tolerant quantum computer in the mid to long run.”
|
Current issue: 56(4)
Under compilation: 57(1)
The use of forest mosses as bioindicators was tested with transplanted experiments. One transplantation experiment was made to study effects of air pollutants on two forest moss species, Hylocomnium splendens (Hedw.) Schimp. and Pleurozium schreberi (Willd. ex Brid.) Mitt. Another transplantation was used to study the nitrogen fixation capacity of blue-green algae in the Hylocomnium and Pleurozium moss layers. The surface structure of the moss species was studied by scanning electron microscopy. The air pollution induced changes in the surface structure of moss cells were observable soon after the transplantation. In polluted industrial areas the fertilizing effect of air-borne nitrogen compounds increased the photosynthetic activity of mosses before their destruction. Stress respiration was also observable in polluted areas. The nitrogen fixing capacity decreased or was almost inhibited in all the air-polluted environments.
Air-borne Cu and Zn from a brass foundry at Gusum, SE Sweden, have considerably disturbed the lichen and bryophyte vegetation in the coniferous forest environment. The occurrence of lichens on Norway spruce twigs decreased rapidly with increasing Cu concentrations in Hypogymnia physodes above 90 ppm (background value 10–15). The epiphytic vegetation is reduced within 2–3 km from the foundry. Only stunted individuals occur in the close vicinity of the pollution source.
The cover of one of the quantitatively most important mosses, Hylocomnium splendens, is greatly reduced by the heavy-metal deposition. Cover values of 20–50% are not uncommon in distant sites (Cu concentration 15–35 ppm). There is a significant negative correlation between Cu concentration in the moss and its cover. The moss cannot survive much more than ca. 130 ppm Cu (and 360 ppm Zn). Live individuals are no more found within 1.5 km from the foundry.
The article begins on the page 91/122 of the PDF file.
The data has been collected during summer 1867. It examines the moos and lichen species in for regions of Lapland: spruce region, pine region, birch region and fjeld region. The division of the regions is related to the climatic and biological conditions of areas, the first mentioned being the most southern and still suitable e.g. for many grasses. Respective regions have been presented with their general characters and list of species. Finally the findings of different regions are compared.
Since fire frequency is expected to increase globally due to climate change, it is important to understand its effects on forest ecosystems. We studied the long-term patterns in species diversity, cover and composition of vascular plants and bryophytes after forest fire and the site-related factors behind them. Research was carried out in northwestern Estonia, using a chronosequence of Scots pine (Pinus sylvestris L.) stands, located on nutrient poor sandy soils, where fires had occurred 12, 23, 38, 69, 80 and 183 years ago. In every stand three 100 m2 vegetation plots were established to collect floristic and environmental information. The effects on floristic characteristics of time since fire, light, and soil variables were evaluated with linear mixed models, followed by backward variable selection. Compositional variation was analysed with non-metric multidimensional scaling, Multi-response Permutation Procedures, and Indicator Species Analysis. Altogether, 31 vascular plant and 39 bryophyte species were found in vegetation plots. The cover of the vascular plant and bryophyte layers increased with a longer time since fire. Soil and light variables impacted the richness of several vascular plant and bryophyte groups, whereas only the richness of liverworts and dwarf-shrubs correlated with time since fire. Considerable compositional differences were observed in vascular plant and bryophyte assemblages between recently vs. long-time ago burned stands. To conclude, time since fire significantly impacted compositional patterns of vascular plants and bryophytes in pine forests on nutrient poor soils, although time-related trends in species richness were less evident.
|
First country in the world to bury carbon dioxide imported from abroad, Denmark inaugurated a carbon dioxide storage site 1800 meters under the North Sea, a tool considered essential to stop global warming. “Today we have opened a new green chapter for the North Sea”, celebrated Prince Frederick, when starting the pilot phase of the project in Esbjerg. Paradoxically, this CO2 graveyard is an old oil field that contributed to the emissions.
Led by the British chemical multinational Ineos and the German energy company Wintershall Dea, the “Greensand” project It will allow to store up to eight million tons of CO2 per year until 2030.
Still in its infancy and very expensive, Carbon capture and storage (CCS) consists of capturing and then trapping CO2, the main cause of global warming. There are currently more than 200 projects operating or under development around the world.
What makes Greensand special is that, unlike existing sites that sequester CO2 from neighboring industrial facilities, it uses carbon from afar. “It is a European achievement in terms of cross-border cooperation: CO2 is captured in Belgium and very soon in Germany, loaded by ship in the (Belgian) port of Antwerp,” said European Commission President Ursula von der Leyen.
The gas is transported by sea to the Nini West platform, at the edge of Norwegian waters, and transferred to a reservoir 1.8 km deep.
For the Danish authorities, who aspire to carbon neutrality by 2045, it is an “indispensable instrument in our climate toolbox”.
The North Sea is a region ripe for burial because it is home to many pipelines and geological reservoirs left empty after decades of oil and gas production.. “Depleted oil and gas fields have many advantages because they are well documented and infrastructure already exists that can most likely be reused,” says Morten Jeppesen, director of the Center for Marine Technologies at the Danish University of Technology.
Near Greensand, the French giant TotalEnergies is going to explore the possibility of burying more than two kilometers under the seabed some 5 million tons of CO2 per year until 2030.
A CCS pioneer, neighboring Norway will also receive tons of liquefied CO2 from Europe in the coming years. The main producer of hydrocarbons in Western Europe, the country also has the largest CO2 storage potential on the continent.
there are no miracles
Stockpiled quantities remain small relative to the magnitude of releases. According to the European Environment Agency, the European Union emitted 3.7 billion tons of greenhouse gases in 2020, a low level for being a year affected by the pandemic.
Long perceived as a technically complicated and costly solution, CCS is now seen as necessary, both by the Intergovernmental Panel on Climate Change (IPCC) and the International Energy Agency. But it is not a silver bullet to global warming.
The energy-intensive process of capturing and storing CO2 emits the equivalent of 21% of the gas captured, according to Australian think tank IEEFA. And the technique involves risks, warns the research center, citing the risk of leaks with catastrophic consequences.
“CAC should not be used to maintain the current level of CO2 production, but it is necessary to limit CO2 in the atmosphere,” Jeppsen explained. “The cost of storing carbon needs to be reduced if it is to become a durable mitigation solution as the industry matures,” the scientist added.
Among environmental defenders, the technology does not have unanimous support. “It doesn’t solve the problem and it prolongs the harmful structures,” says Helene Hagel, energy officer at Greenpeace Denmark. “The method does not change our mortal habits. If Denmark really wants to reduce its emissions, it must address the sectors that produce a large part of it, i.e. agriculture and transport“, he assured.
|
In the UK, approximately 300,000 homes have misconnected plumbing, sending grey and foul water directly into streams and rivers instead of sewage treatment works, polluting the waterways and damaging aquatic ecosystems.
“The water industry estimates that misconnections cause a daily sewage discharge to streams and rivers equivalent to all the foul waste produced by a town the size of Swindon (or about enough to fill 16 Olympic-sized swimming pools).”
What is misconnected plumbing?
The most common type of misconnection is when domestic wastewater pipes are incorrectly connected to the surface water drain, which is designed to collect clean rainwater from your guttering. When waste water from your sink, bath, shower, washing machine and even toilet runs into the surface water drain it runs untreated into local streams and rivers, causing pollution.
Occasionally, surface water pipes are wrongly connected to the foul water drains, which means in heavy rain the foul sewer can become overloaded and cause flooding. Homeowners (or landlords) are responsible for putting right misconnected plumbing in their properties. Failure to prevent pollution could potentially result in prosecution.
SNAP – sewer awareness
SNAP stands for the Sewerage Network Action Programme. The Programme joins water industry professionals and researchers together to improve public awareness of the damage caused by so-called ‘sewer abuse’. This is the use of the sewerage network for anything other than sewage. SNAP aims to prevent the blockage and overloading of sewer systems, which can cause flooding, environmental pollution and damage to infrastructure and processing plants.
What are the effects of misconnected plumbing?
Misconnected plumbing negatively impacts riverine environments and their ecosystems. Household greywater contains pollutants such as soaps and detergents, food wastes and dyes. Detergents are the most dangerous pollutant because they can contain phosphates and chlorine, which can cause nutrient enrichment and poison flora and fauna respectively.
Nutrient enrichment occurs when there is too much phosphorous and/or nitrogen in a water body. Excessive nutrient levels can cause algal blooms that reduce the amount of sunlight that is able to penetrate through the water column. There are many species of underwater vegetation that rely on light for photosynthesis.
If raw sewage gets into streams and rivers it can cause a health risk and cause failures in the water quality standards that are determined by the EU Water Framework Directive and revised Bathing Water Directive. The organic matter within untreated sewage is decomposed by bacteria, significantly increasing the biological oxygen demand (BOD), causing dissolved oxygen in the water to be consumed. Seriously depleted DO has serious consequences for aquatic ecosystems.
Waste water testing
Aquaread designs and manufactures scientific water testing instruments for use in the field. These can be used for many applications including monitoring waste water treatment systems. Waste water testing is vital to ensure that the water discharged from sewage treatment plants is of a certain quality because it is pumped directly into waterways. As highlighted above, pollutants or excessive nutrients in the water negatively impacts aquatic ecosystems.
Our multiparameter water testing probes are also used for monitoring surface water. Long term monitoring of a waterbody enables you to understand the diurnal and seasonal fluctuations in water quality and create a benchmark, which allows you to identify the emergence of a pollutant in the water. Aquaread manufacture over 20 different water testing parameters including nitrate, dissolved oxygen and chlorine.
|
Indiana’s ubiquitous teacher licensing exam could be one reason behind the state’s shortage of teachers — especially Black and Hispanic teachers, according to a new report from Indiana University.
The study found that Black and Hispanic prospective teachers scored up to 52 percentage points lower than their white peers on portions of the test, known as Praxis, further shrinking the pool of nonwhite educators that enter the profession even as the K-12 student population grows more diverse.
The traditional road to becoming a teacher has long held stumbling blocks for candidates of color. But recent staffing shortages have made it critical to recruit more candidates into the teacher pipeline, with states and schools dropping requirements like a license or degree in order to fill open positions.
The solution isn’t necessarily to get rid of Praxis and other tests like it, said Alexander Cuenca, author of the study and an associate professor at Indiana University, but to diversify the expert panels that determine passing scores for prospective educators, as well as offer more support for would-be test-takers.
“We know that more teachers of color in the classroom will improve outcomes for students of color and all students,” he said. “Licensure exams as a barrier to that are an under-examined issue.”
Why score disparities persist
Praxis is divided into three sections — Praxis I, which tests basic skills; Praxis II, which tests teachers’ subject matter expertise; and a pedagogy component that tests classroom knowledge and management.
Due to a law passed in 2019, Indiana teacher candidates are no longer required to take the basic skills portion of the exam. Teachers still take the pedagogy exam and the subject matter test that correlates to the subject they want to teach.
Across all sections of the licensing exam over five years from 2016 to 2021, white candidates scored higher than Black and Hispanic candidates, the study found.
The disparity was especially significant in the content area sections of the exam. In one of the starkest examples, 52% of white candidates passed the mathematics subject area exam in the 2016-17 academic year, but no Black candidates did.
In some cases, the score gaps have gotten worse over time. In the English language arts content area exam, for example, Black candidates outperformed white candidates in 2016-17, with pass rates of 67% and 65%, respectively.
But in 2020-21, Black candidates had a pass rate of 22%, compared to a 65% pass rate for white candidates.
It’s not completely clear what led to that kind of score drop over the years, though Cuenca noted that Indiana switched testing vendors between 2016 and 2021, which can impact teacher prep programs and their students.
Scores tend to be higher overall and less disparate in the pedagogy section of the Praxis than the subject matter test — for the latter, teachers’ different educational backgrounds might contribute to gaps.
But there’s more to the differing scores than prospective teachers’ knowledge, according to the study, which points to how passing scores are determined.
Tests are scored on a scale, with each state setting its passing score. To determine those scores, the state and the testing company assemble panels of subject matter experts from schools and universities to determine which questions a new “just qualified” teacher should answer correctly.
The panelists participate on a voluntary basis, Cuenca said, and there’s little effort to ensure a demographic balance on each panel.
When Indiana undertook this process in 2020, 92% of the certified educators that participated in the panels identified as white, compared to 2% who identified as Black, according to the study.
As it happens, around 92% of Indiana’s 79,000 teachers are white, according to the Indiana Department of Education, compared to 66% of the state’s 1.1 million students. Hiring more underrepresented teachers has long been a policy priority for groups like the NAACP of Indianapolis, which highlighted the issue in its recent Black Academic Excellence plan.
Cuenca said the problem arises when panelists are asked to make subjective decisions about what new teachers should know — a judgment that varies depending on the panelists’ personal experiences.
A more diverse panel would have a richer discussion of this question than more homogenous panels, he said.
An acknowledged issue
Cuenca’s study links modern-day teacher licensing exams to historical exams used to justify paying Black educators less.
Educational Testing Service (ETS), the company behind the Praxis exam, has previously studied the effect of licensure examinations on the Black educator pipeline, according to the study. It reported in 2011 the existence of “very large score gaps between African American and White teacher candidates on selected Praxis I and selected Praxis II tests.”
In a statement, ETS said it is “committed to making our tests fair for all test takers to advance our mission of furthering quality and equity in education for every learner.”
“We work closely with our state clients to ensure that the panels of educators who contribute to the development of the Praxis tests, and the setting of its recommended passing scores, are representative of the test-taking population of the state with respect to race, gender, geography, and school setting,” the statement said. “We also encourage state decision-makers to solicit the diverse perspectives and opinions of all stakeholders when they set the state’s passing scores.”
The IU report said that while the issue has been long-acknowledged, few policy changes have come about as a result.
Cuenca does credit Indiana for removing the basic skills component of the test for would-be educators, alleviating some of the financial burden associated with the tests, especially for candidates who have to retake the tests.
Proposed solutions include scholarships
His report says the most important solution to the issue is to require test vendors to diversify the score-setting panels associated with teacher licensing exams.
The current system creates a “closed loop,” which leads to fewer Black and Hispanic teachers in the classroom and eventually, on future score-setting panels which set the scores for the next generation of teachers.
However, Cuenca said he would strongly caution against getting rid of licensing tests altogether, especially as states deal with teacher shortages by removing other requirements for classroom teaching.
“Tests provide some public trust. There is a value from a public good perspective in having assurance on the knowledge, skills, and competencies of our professionals,” he said. “But we should think about how we can engage in that process better and in a more equitable way.”
Other states allow teacher candidates to demonstrate their subject matter expertise with their GPA from their content area, Cuenca noted.
Recruiting and retention efforts should have an eye toward creating support systems for Black and Hispanic candidates within their teacher prep programs, he said.
And the state could offer scholarships to teacher candidates who need to retake their exams. This would acknowledge that the repeated out-of-pocket financial costs and discouragement could lead them to choose another career path entirely.
“A century after this flawed system of teacher licensure was first implemented, policymakers should consider these recommendations, not only for the sake of individual teacher candidates, but to grow a more representative and effective teacher corps,” the study says.
Aleksandra Appleton covers Indiana education policy and writes about K-12 schools across the state. Contact her at email@example.com.
|
"We believe children are naturally creative problem solvers and communicators. We instill curiosity and encourage them to ask questions, giving importance to nurturing creativity, innovation and collaboration. Today, children need critical thinking skills, as well as the confidence to question and reflect. We strive to develop these qualities by creating authentic learning environments and experiences that are both relevant and engaging."
Bold as it may sound, the sight of algebraic equations makes most of us uncomfortable even today. But, have you ever wondered, is Maths really difficult? Or, is it just a fear instilled since our childhood? This is why We seek to make the play of numbers exciting for our students. With the progressive 'Concrete-Pictorial-Abstract' method, children from an early age use concrete blocks and objects.
In social science, children have to visualise historical events to increase understanding. Sometimes, it can be difficult for students to imagine these events and connect with them. This disconnect can cause disengagement within students. At Hilton School, we overcome this impediment by using the 'Visualise -- Locate -- Connect' (VLC) approach.
Our world today is evolving at the speed of light. Due to this evolution, we have to ensure students are ready for a technologically enabled future. Hilton School is playing its part by incorporating coding as a subject with the Coding & Computational Skills (CCS) program. Through this offering, we aim to teach children the languages of machines from an early age. This program teaches various computer languages along with helping students build websites, games, apps, and much more.
Hilton Preschool curriculum is designed based on the framework inspired by Germany’s Waldorf Education system and Playway method. While Waldorf is one of the first and best early childhood programs in the world. The play-way method is based on the concept that play is the child’s most natural way to learn. This integrated curriculum inspires a joy for learning through art, music, logic games, and hands-on investigations. It is an integrated and holistic curriculum system. It is a research-based early learning program. It is uniquely designed to support the child's social-emotional, physical, language, and cognitive development, through activities that cover 16 key areas of skill development. It focuses on skill-based learning outcomes.
|
In a perfect world, we’d all take our perfectly clean data, feed it to a machine learning model, and get amazing results. Unfortunately, algorithms aren’t accurate 100% of the time. And in business, a high error rate can potentially cost an organization millions of dollars.
So, how do you go about understanding a classification algorithm’s performance so that you can better understand its results?
Enter: the confusion matrix.
With the help of a confusion matrix, you can measure the factors affecting your classification model’s performance, precision, and accuracy—enabling you to make smarter, more informed decisions.
In this guide, we’ll explore how to build a confusion matrix and the potential value it can contribute to your business. Let’s get started!
What Is a Confusion Matrix?
Don’t worry—the confusion matrix isn’t as complex as the name makes it seem.
Also known as an error matrix, a confusion matrix is a table that helps you visualize a classification model’s performance on a set of test data for which the actual values are known. Confusion matrices are an effective tool to help data analysts evaluate which functions an ML model performs well, and which it performs not so well.
Outcomes of a Confusion Matrix
A confusion matrix helps measure performance where an algorithm’s output can be in two or more categories—typically positive or negative, yes or no. Each table consists of four cells, each representing a unique combination of predicted and actual values. The four potential outcomes are:
- True Positive (TP): Also known as sensitivity, TP means that a positive prediction was given, and it was true.
- True Negative (TN): Also known as specificity, TN means that a negative prediction was given, and it was true.
- False Positive (FP): Also known as Type-I error, an FP prediction is positive, but the actual value was negative.
- False Negative (FN): Also known as Type-II error, an FN prediction is negative, but the actual value was positive.
How to Create and Calculate a Confusion Matrix in Eight Steps
Now that you have an idea of what a confusion matrix is, let’s look at the basic process of calculating confusion matrices for binary classification problems.
1. Create a Table
To get started, construct a table with two columns and two rows, with an additional column and row for labeling your chart. You can set your table with the predicted values on the right side, and the actual values on the left side.
2. Enter the Predicted Values
Fill the chart with the data. If you want to predict the number of correct and incorrect answers from a data set that contains 50 questions, you can have two outputs, either “correct” or “incorrect.” If you predict 40 questions correct and 10 questions incorrect, you enter these values as the outputs in the columns for your predictive “correct” and “incorrect” values.
3. Enter The Actual Values
Now, enter the actual values in the matrix. These actual outputs become the “true” and “false” values in your tables. The “true negative” and “false negative” values are the actual negative results, while the “true positive” and “false negative” values are the actual positive outcomes.
4. Calculate the Accuracy Rate
The classification accuracy rate measures how often the model makes a correct prediction. It can be calculated as the ratio of the number of correct predictions and the total number of predictions made by the classifiers.
It is calculated using the following formula:
Accuracy = (TP + TN)/ (TP + FP + FN + TN)
5. Determine the Misclassification Rate
Also referred to as the error rate, the misclassification rate describes how often the classifier yields the wrong predictions. It’s calculated as the number of incorrect predictions over all the numbers of predictions made by the model.
The formula is as shown below:
Error Rate = (FP + FN)/ (TP + FP + FN + TN)
6. Determine The True Positive Rate (Recall Value)
Also known as the recall value, the true positive rate is the actual observations that are predicted correctly. To calculate the true positive rate, divide the total number of positive outcomes that are predicted correctly by the total number of actual positive outcomes.
Recall Rate = TP/ (TP + FN)
7. Calculate the Precision Rate
Precision defines the actual number of correctly predicted values that came out to be positive. Simply put, out of all the positive values predicted correctly by the classifier, how many were true. It can be calculated as follows:
Precision Rate = TP/ (TP + FP)
8. Determine the F-measure
It’s hard to compare two models with high call and low precision or vice versa. So, to solve this issue, we can use F-score to measure Precision and Recall at the same time. It utilizes the harmonic mean instead of the arithmetic mean. The harmonic means is used because it’s not sensitive to extremely large values.
It’s calculated as follows:
F-measure = (2* Recall*Precision)/ (Recall + Precision)
Why Are Confusion Matrices Important?
Data analysts and engineers who develop ML systems use confusion matrices to determine how well a model is performing. But, how do you know if the model has a strong positive impact on your business?
Profit-sensitive scoring takes into account not only a model’s accuracy, but how the accuracy impacts the business’s bottom line. The goal of profit-sensitive scoring is to analyze the costs and gains associated with correct and incorrect classifications and use those findings to maximize profit.
At this point, the confusion matrix shouldn’t be as confusing to you as it was before!
Using confusion matrices not only gives you more detailed insight into how your algorithms are performing, they can also help ensure you minimize costs and maximize profits for your enterprise. Sounds pretty good, right?
If you’d like to learn more about profit-sensitive scoring and the other positive impacts confusion matrices can have on your team, check out our whitepaper, Talking Value: Optimizing Enterprise AI with Profit-Sensitive Scoring.
|
Egyptians, not Greeks were true fathers of medicine
Date: Monday, May 14 @ 04:52:09 UTC
by Staff Writers
Manchester, UK (SPX) May 11, 2007
Source: University of Manchester
Scientists examining documents dating back 3,500 years say they have found proof that the origins of modern medicine lie in ancient Egypt and not with Hippocrates and the Greeks.
The research team from the KNH Centre for Biomedical Egyptology at The University of Manchester discovered the evidence in medical papyri written in 1,500BC – 1,000 years before Hippocrates was born.
"Classical scholars have always considered the ancient Greeks, particularly Hippocrates, as being the fathers of medicine but our findings suggest that the ancient Egyptians were practising a credible form of pharmacy and medicine much earlier," said Dr Jackie Campbell.
"When we compared the ancient remedies against modern pharmaceutical protocols and standards, we found the prescriptions in the ancient documents not only compared with pharmaceutical preparations of today but that many of the remedies had therapeutic merit."
The medical documents, which were first discovered in the mid-19th century, showed that ancient Egyptian physicians treated wounds with honey, resins and metals known to be antimicrobial.
The team also discovered prescriptions for laxatives of castor oil and colocynth and bulk laxatives of figs and bran. Other references show that colic was treated with hyoscyamus, which is still used today, and that cumin and coriander were used as intestinal carminatives.
Further evidence showed that musculo-skeletal disorders were treated with rubefacients to stimulate blood flow and poultices to warm and soothe. They used celery and saffron for rheumatism, which are currently topics of pharmaceutical research, and pomegranate was used to eradicate tapeworms, a remedy that remained in clinical use until 50 years ago.
"Many of the ancient remedies we discovered survived into the 20th century and, indeed, some remain in use today, albeit that the active component is now produced synthetically," said Dr Campbell.
"Other ingredients endure and acacia is still used in cough remedies while aloes forms a basis to soothe and heal skin conditions."
Fellow researcher Dr Ryan Metcalfe is now developing genetic techniques to investigate the medicinal plants of ancient Egypt. He has designed his research to determine which modern species the ancient botanical samples are most related to.
"This may allow us to determine a likely point of origin for the plant while providing additional evidence for the trade routes, purposeful cultivation, trade centres or places of treatment," said Dr Metcalfe.
"The work is inextricably linked to state-of-the-art chemical analyses used by my colleague Judith Seath, who specialises in the essential oils and resins used by the ancient Egyptians."
Professor Rosalie David, Director of the KNH Centre, said: "These results are very significant and show that the ancient Egyptians were practising a credible form of pharmacy long before the Greeks.
"Our research is continuing on a genetic, chemical and comparative basis to compare the medicinal plants of ancient Egypt with modern species and to investigate similarities between the traditional remedies of North Africa with the remedies used by their ancestors of 1,500 BC."
|
Write Your First Python Program In 10 Minutes
Posted by Charlie Recksieck
Even If You've Never Programmed Before
Well in this case we do want to teach some programming - but we want to show you the simplest coding you can do in Python. The catch is, we are starting from scratch; you don't need any programming knowledge, experience or classes to do this.
No matter who you are, if you take 5-10 minutes with this article you'll be writing Python code.
Also For Programmers - But New To Python
There's also a secondary audience for this post: programmers who know what they're doing in other languages but just never even tried Python.
I used to be one of those guys up til a couple years ago. There are definitely some subtleties to Python so I don't want to make it sound too simple, but it really is pretty simple, in a very good way. And I've love using it for data retrieval on web services. (I have a project where I retrieve baseball box scores from a web service in Python.) Consuming data from APIs or web services is pretty great in Python.
You'll all see that this simple language is really easy to learn fast, so let's jump in.
You'll need to install Python on your machine - it couldn't be easier. You'll use their development environment to write code in our examples. (You can also write code in other environments like Visual Studio on a more professional level. But this IDE is lightweight and fast.)
Go to https://www.python.org/downloads/ and download the latest version
Let's Start Programming
Now that you've installed Python, you can open the IDE (which traditionally stands for Integrated Development Environment), which in this instance is called "IDLE". FYI, Microsoft's "Visual Studio" which the majority of Windows developers user is also an "IDE".
Go to your Start button and browse to or search for "IDLE (Python GUI") and launch it. You should see something like this
Native Commands & "Hello World"
For those of you who've never had a programming class, having a program just write, print or output the phrase "Hello world" is the customary start.
In Python, there are lots of built-in commands that you could start using right now, without importing any additional libraries. Think of them as "core" functions. Here's a list of what those are.
One easy command is "print". So you can follow the example in the screen capture by typing: Print ("Hello world") and see what happens
As you can see, it outputs a line of Hello world in the IDE. Congratulations, you're just wrote a software program! Seriously, if that's your first time doing this, give yourself a pat on the back. Just getting this far to install Python, open up the "IDLE" IDE and doing this should be a start at demystifying the process. That's our main goal here so we want to say "Way to go!"
If you were writing a Python program that populates a web page, writes a file on the computer, sends it to some other program through an interface, or displays something to a user, you would be using this PRINT command in some form to do it. But we're not going to worry about having an end-result program in this lesson.
Importing Libraries & A Basic Math Program
As I said above, there are core commands already loaded and available as soon as you start your Python environment window. That's great. But there are also a ton of libraries that come with the Python install which are readily available but need to be "imported" in a line of code before you can use those functions.
Let's say I'm going to write code to handle addition of a couple of fractions (something I always hated it middle school). We'll want the Fractions library which is super easy to load as you can see …
It's not much easier than that, just type "import fractions."
Why do we have to load this library when it's really part of a plain-vanilla Python installation? There are a LOT of native libraries to Python and each one takes a little bit of the computers memory and resources when loaded, not a ton but they add up fast if they were all loaded. So, since we have to explicitly load the ones, we want then we're being efficient about our memory.
If you want to browse around, here are the libraries of functions you can load in right now just like we did with "import fractions."
Let's do our fraction addition now. Without over-explaining it, you can see how it goes below:
Congrats again, you've written your second program.
One More Quick One - Get The Current Date
Now let's get the current date in our program. In this example, I'm going to import the Date functions library; and instead of just coding a quick "print (datetime.date.today())" I chose to write it to a variable which I can print.
You're definitely getting the picture. And if you've written code before (but are reading this as an introduction to Python) you'll notice that we don't have to declare or instantiate variables before using them. Pretty neat.
Where To Go Next With This
We aren't going to write a multi-part primer on Python coding right now, this month. But we'd be happy to answer questions or point you in the right direction if you want to play around; or if you want to ask if Python is a viable option for your project.
Meanwhile, the next step is writing a python script (.LY file extension) that you can run to make a web page or take input and display messages from users.
But if you're asking us, the next thing to explore is downloading other programmers' libraries (not just core Python that we downloaded). We promise to get into it sometime. Meanwhile, if this got you excited, go ahead and google what you'd like to do with Python.
We just wanted to demystify Python and for you total newbies we wanted to demystify programming in general. Congratulations again on becoming a Python programmer in the time it takes to listen to "In A Gadda Da Vida"!
|
The town of Pisa is located in the Tuskany part on the western seashore of Italy. From the 11th to the thirteenth centuries Pisa was the commercial imperium of southern Italy. spread outing Italy’s power over the islands of Corsica. Sicily. and Sardinia and commanding most of the Tuscan seashore. During this clip and subsequent centuries. Pisa built up its power and economic fortitude. and its wealth allowed for the building of the glittering white marble composite of spiritual edifices known as the Campo dei Miracoli. the Field of Miracles. This assembly of brilliant building is the most of import illustration of Italian medieval architecture. and in this one location one can see the Cathedral. the Baptistery. the monumental graveyard of the Campo Santo. and of class. the Leaning Tower of Pisa.
The program of the Cathedral is a Latin cross. but the inside of the church is every bit much a work of art as the exterior. rich with cherished ornaments and plants created by of import creative persons of the period. Of of import note is the marble dais. made by Giovanni Pisano. an keen illustration of Italian Gothic sculpture. So expansive did the cathedral’s designer Buscheto believe his chef-d’oeuvre to be. that he did non waver to scratch in Latin in the far left arch. “This marble church has no equal. ”
The Baptistery. a lovely round edifice. contains the most of import work of art in Pisa–a hexangular marble dais built by Nicola Pisano. male parent of Giovanni. The dais represents the passage from Romanesque to Gothic art. and its polygonal signifier is rather rare for its period. The walls of the dais are decorated with scenes from the life of Christ.
Cemetary Of the Campo Santo
Campo Santo. the 13th-century cloistral graveyard. is reputedly built on Earth brought by Reformers from the Holy Land. Although badly damaged by bombs during WWII. the singular frescoes indoors late underwent Restoration. The boundary of this graveyard is marked by a rectangular enclosure of marble. and the graveyard besides contains several memorials. sculptures. and ancient sarcophagi of historical and artistic value. Today. most visitants come to the Campo dei Miracoli to see the Tower. the Cathedral. or the Baptistery ; nevertheless. centuries ago it was the graveyard that was the most of import meeting topographic point in town. a topographic point to see to pray. confab. or merely sit and remainder.
Leaning tower ( Torre Pendente Di Pisa )
The celebrated Leaning Tower is the cathedral’s bell-tower. upon which building began in 1173. It is considered to be one of the most astonishing architectual admirations still standing. Soon after constructing began. by the original designer Bonanno Pisano. the foundation of soil and sand settled unevenly doing an initial overhang of circa 5 centimeter. Construction was stopped. but was continued about 100 old ages subsequently ( 1275 ) by Giovanni di Simone. who added three more degrees. conveying the tallness of the edifice to 48 m. It so became really clear that the Pisa tower was tilting to the South since the disposition of the Tower had increased to more than 90 centimeter. Construction continued off and on for about 700 old ages.
Since regular measurement of the tower began in 1911. the top of the tower has moved 1. 2 millimeters ( 0. 05 inch ) per twelvemonth. Today the top of the Tower of Pisa is some 5. 3m ( 17. 4 foot ) off-center. Because the Tower tilted in different waies in its first old ages. it is somewhat curved. like a banana. Engineers are working on the terms of the Tower instead than on the construction. trusting to ease the top dorsum about 20 centimeter ( about 8 inches ) . But it means that the 800-year old tower will stay atilt. Presently the unit of ammunition tower has eight-stories. is 55 m ( 180 foot ) tall. and has a basal diameter of 16 m ( 52 foot ) . There are 296 stairss to the top and there are 7 bells. the largest one weighing about three and a half dozenss. At the base of the tower. the walls are 8 pess thick.
|
The future of technology is limitless. Technological advances have been accelerated through increased network agility, integrated artificial intelligence (AI) and the ever-evolving Internet of Things. All of this has culminated in building the capacity to deploy, automate and orchestrate diverse use cases at hyperscale. As exciting and revolutionary as this fast-paced technological progression is, it also presents completely new security challenges.
For instance, the Internet of Things, or “IoT”, is made up of devices that connect to the internet and share data with each other. IoT devices include not only computers, laptops and smartphones, but also objects that have been equipped with chips to gather and communicate data over a network. By 2025, it is estimated that there will be more than 30 billion IoT devices. IoT is clearly a big deal. IoT has the potential of being the protagonist in tomorrow’s tale of technological revolution, but every protagonist must face an antagonist.
New technologies always have the potential of increasing the cyber-attack surface area and IoT is no exception. In 2016, the Mirai malware took full advantage of this. It has been responsible for some of the largest Distributed Denial Of Service (DDOS) attacks in the world including one on French cloud computing company, OVH. Attacks were carried out via IoT devices such as home routers, air-quality monitors, and personal surveillance cameras. Mirai went on to infect over 600,000 vulnerable IoT devices from August 2016 to February 2017 according to the below event timeline by Cloudlfare.
IoT security is a point of departure for this article but new technologies generally face threats because of similar reasons such as vulnerabilities that are yet to be discovered in the new technology. Zero-Trust Architecture immediately comes to mind. Traditional security models operate on the outdated assumption that everything inside an organisation’s network should be trusted. The Zero Trust model recognises that this trust is a vulnerability and that once on the network, users are free to access your data. The point of infiltration of an attack is often not the target location, knowing this and securing your network from it becomes even more critical in the case of multiple IoT devices.
New and exciting IoT applications will continue to emerge but so will new cyber-security risks. In the realm of new technologies, only a Zero-Trust model supported by real-time, self-learning cyber-security tools to defend against zero day attacks will suffice. Possessing legitimate insights into the realities and potential risks of new technologies is a non-negotiable. Palo Alto Networks not only has the latest insights on the continually evolving cybersecurity landscape, but also has the actionable steps required to Secure IoT Devices in the Enterprise.
Palo Alto Networks comprehensive IoT Security Solution stands out in the cybersecurity industry as a result of their ability to stay ahead of the curb. This was demonstrated in several webinars Palo Alto Networks conducted in collaboration with DataGroupIT that provided valuable insights into their strong preventive strategy for reducing risk you can’t and automating responses while gaining intelligence with each incident.
DataGroupIT is Africa’s leading Value-Added Distributor (VAD). By partnering with the best selection of established and emerging technology vendors across the globe, we, provide complex solutions for any size business, including Enterprise and SME markets across the African continent.
Our product portfolio offers comprehensive solutions for IT Security, Infrastructure and Enterprise Software.
We are fully committed to our business partners. Channels & vendors success is our #1 mission. Our professional teams across Africa deliver exceptional sales, presale, logistic, marketing and financial support that create the ultimate platform to accelerate our business partners’ success.
Contact Us today to find out more.
|
General Information/ Relationship Between IS and Eukaryotic TE
In spite of their obvious similarities, there is often poor transfer of knowledge between studies of prokaryotic and of eukaryotic TE. This artificial barrier is reflected in their nomenclature systems: Prokaryotic TE are named following the basic logic of bacterial genetics built on the initial Demerec rules; Eukaryotic TE, on the other hand, have more colorful names in keeping with the culture of nomenclature used in eukaryotic genetics. To a certain extent, this camouflages the diversity and relationships between members of the eukaryotic TE superfamilies and their prokaryotic cousins.
It is important to appreciate that the basic chemistry of transposition is identical for both prokaryotic and eukaryotic elements. Moreover, many eukaryotic DNA transposons have similar sizes and organization to those of prokaryotic IS and, since most do not carry additional “passenger” genes, they are not transposons in the prokaryotic sense and should strictly be considered as eukaryotic IS. The major differences lie in how Tpase expression and activity is regulated. One important difference is that most eukaryotic transposons are “insulated” by constraints of the nucleus (which physically separate the transposition process from that of Tpase expression) while those of prokaryotes are not since prokaryotic transcription and translation are coupled. In addition, eukaryotic transposons are subject to a hierarchy of regulation via small RNAs. In prokaryotes, it is possible that CRISPRs may impose some control at this level but, although it has been demonstrated that CRISPRs are active against mobile genetic elements and may regulate some endogenous gene expression [see ], these are limited to plasmids and phage and to our knowledge have not yet been demonstrated to act on intracellular Mobile Genetic Element such as IS and transposons.
In spite of these differences, a significant number of eukaryotic DNA TE are related to prokaryotic IS (Table Characteristics of IS families; Table MGE transposases examined by secondary structure prediction programs), and moreover, eukaryotic TE including passenger genes are now being identified [see e.g. ]. This reinforces the view that the borders between different types of TE are “fuzzier” than previously recognized.
- ↑ Demerec M, Adelberg EA, Clark AJ, Hartman PE . A proposal for a uniform nomenclature in bacterial genetics. - Genetics: 1966 Jul, 54(1);61-76 [PubMed:5961488] [DOI]
- ↑ Dyda F, Hickman AB, Jenkins TM, Engelman A, Craigie R, Davies DR . Crystal structure of the catalytic domain of HIV-1 integrase: similarity to other polynucleotidyl transferases. - Science: 1994 Dec 23, 266(5193);1981-6 [PubMed:7801124] [DOI]
- ↑ Hickman AB, Chandler M, Dyda F . Integrating prokaryotes and eukaryotes: DNA transposases in light of structure. - Crit Rev Biochem Mol Biol: 2010 Feb, 45(1);50-69 [PubMed:20067338] [DOI]
- ↑ Hickman AB, Dyda F . Mechanisms of DNA Transposition. - Microbiol Spectr: 2015 Apr, 3(2);MDNA3-0034-2014 [PubMed:26104718] [DOI]
- ↑ Rice P, Craigie R, Davies DR . Retroviral integrases and their cousins. - Curr Opin Struct Biol: 1996 Feb, 6(1);76-83 [PubMed:8696976] [DOI]
- ↑ Montaño SP, Rice PA . Moving DNA around: DNA transposition and retroviral integration. - Curr Opin Struct Biol: 2011 Jun, 21(3);370-8 [PubMed:21439812] [DOI]
- ↑ Rice PA, Baker TA . Comparative architecture of transposase and integrase complexes. - Nat Struct Biol: 2001 May, 8(5);302-7 [PubMed:11774877] [DOI]
- ↑ Nagy Z, Chandler M . Regulation of transposition in bacteria. - Res Microbiol: 2004 Jun, 155(5);387-98 [PubMed:15207871] [DOI]
- ↑ Fedoroff NV . Presidential address. Transposable elements, epigenetics, and genome evolution. - Science: 2012 Nov 9, 338(6108);758-67 [PubMed:23145453] [DOI]
- ↑ Dumesic PA, Madhani HD . Recognizing the enemy within: licensing RNA-guided genome defense. - Trends Biochem Sci: 2014 Jan, 39(1);25-34 [PubMed:24280023] [DOI]
- ↑ Russell SJ, LaMarre J . Transposons and the PIWI pathway: genome defense in gametes and embryos. - Reproduction: 2018 Oct 1, 156(4);R111–R124 [PubMed:30304932] [DOI]
- ↑ Saito K, Siomi MC . Small RNA-mediated quiescence of transposable elements in animals. - Dev Cell: 2010 Nov 16, 19(5);687-97 [PubMed:21074719] [DOI]
- ↑ Bikard D, Marraffini LA . Control of gene expression by CRISPR-Cas systems. - F1000Prime Rep: 2013, 5;47 [PubMed:24273648] [DOI]
- ↑ Bao W, Jurka J . Homologues of bacterial TnpB_IS605 are widespread in diverse eukaryotic transposable elements. - Mob DNA: 2013 Apr 1, 4(1);12 [PubMed:23548000] [DOI]
|
New measures are being taken to curb distracted driving and it seems virtual reality is the next trend to educate Canadians on the risk of picking up the device.
Manitoba banned the use of mobile devices — which includes the use of smartphones, tablets, iPods, GPS and MP3 players, cellphone, laptops and DVD players — while driving in 2010, with fines topping $200 CAD if caught. In 2013, the province escalated the fine to include two demerit points, then to be “firm with new drivers” jumped it up further to a total of five demerit points in 2015.
Manitoba Public Insurance has launched DRIVR-X, an immersive “virtual environment that mimics realistic experiences and temptations facing new young drivers today.” The VR headset of choice is the HTC Vive. DRIVR-X simulation is now being embedded within various high schools and community events to show the impacts of distracted driving, impaired driving, and speeding.
Ward Keith, vice-president, loss prevention and communications, Manitoba public insurance, said, “Our hope is that these realistic experiences will bring the dangers and consequences of unsafe driving to life for new young drivers. In doing so, we hope to spark important conversations about the importance of making safe driving decisions that can literally protect them for a lifetime.”
|
Montreal, Canada — Researchers from the Université de Montréal in Canada found that poor sleep may contribute to impaired intelligence in children with autism.
The study, which was published in the International Journal of Psychophysiology, found that the sleeping patterns of children with autism are not the same as those of typically developing children, where researchers saw a significant difference in their brain activities during sleep.
According to the researchers, stage 2 sleep spindles— which are partly responsible for a child’s learning potential and play an important role in taking sleep to deeper phases— are significantly of lesser and shorter frequency in children with autism than in typically developing children.
The researchers believe that this could be because children with autism have atypical cognitive organization, and are convinced that the fact that they process information differently compared to typically developing children also play a role.
According to Hôpital Rivière-des-Prairies Sleep Research Laboratory Director Roger Godbout, PhD:
“This is an important discovery that confirms the major role of sleep in consolidating cognitive abilities.”
“This study establishes beyond a doubt that children and adolescents are particularly affected by a lack of sleep, especially because they are in an important developmental period. This is also an important finding given that 10% to 25% of Canadian children and adolescents — and 45% to 85% of autistic children — have sleep problems.”
The research involved 13 children with autism and 13 typically developing children, all of whom did not complain of difficulties in sleeping. The children were asked to sleep for two consecutive nights in a sleep laboratory where their sleep spindles, sigma activities, and non-rapid eye movements were measured by researchers using an electroencephalogram (EEG).
After spending the nights at the lab, the children were tasked to complete a version of the Wechsler Intelligence Scale for Children–IV test the following mornings for two consecutive days.
The researchers found that even though the children with autism involved in the study spent the same duration of stage 2 sleep as their typically developing counterparts, their sleep spindles were significantly lower.
Lead researcher Sophie Tessier said that the results indicate that cortical functioning in children with autism is different from that of the typically developing ones, even when their sleeping habits appear to be normal. She told:
“Our aim is really to understand what autism is and what its consequences are. We are still wondering about the etiology and what it affects, and so we’re still understanding how the brain network is connected and how it works.”
Source: Medscape: Poor sleep liked to impaired intelligence in children with autism:
|
2 new scorpion species discovered in dry California lake-beds
On Monday, a study published in the journal Zookeys formally recognized two new scorpion species in the Golden State.
Small enough to crawl in the palm of your hand, the scorpions were found in the dried-up lake beds of Soda Lake in Central California and Koehn Lake in the Mojave Desert.
One of the scorpion species was named Paruroctonus conclusus, while the other was named Paruroctonus soda, after the lake where it was found.
P. soda and P. conclusus have adapted so specifically to the dry, salty and high-pH habitats of Soda Lake and Koehn Lake, that the scorpions can only be found in those lakebeds and nowhere else.
P. conclusis on an illuminated white background. (Prakrit Jain)
The scorpions’ journey out of obscurity is largely due to two high school students, Harper Forbes and Prakrit Jain, using the nature app iNaturalist.
iNaturalist is a community science platform and joint initiative by the California Academy of Sciences and the National Geographic Society.
According to a California Academy of Sciences press release, Forbes and Jain were reviewing thousands of observations uploaded by other iNaturalist users when they came across two unknown scorpion species.
Harper Forbes (left) and Prakrit Jain (center) with California Academy of Sciences Curator of Arachnology Lauren Esposito (right). (Gayle Laird / California Academy of Sciences)
The first species Forbes and Jain learned about was the one that would later be known as P. conclusis. They initially learned about one of those species in 2019, based on an observation uploaded to iNaturalist near Koehn Lake.
CREEPY CRAWLIES SURFACE: HEAT, MONSOONAL ACTIVITY INCREASE SCORPION ACTIVITY
"We weren’t entirely sure what we were looking at," Jain said in the press release. "Over the next couple years, we studied scorpions in the genus Paruroctonus and learned they frequently evolve to live in alkali playas like Koehn Lake."
"When we returned to that initial observation, we realized we were looking at an undescribed Paruroctonus species," he added.
The observation Jain and Forbes came across in 2019. The featured scorpion later became known as P. conclusis. (Sarah Crews)
The second scorpion species, which later was named P. soda, was discovered after an observation of the then-unknown species was uploaded to iNaturalist.
Jain and Forbes then worked with California Academy of Sciences Curator of Arachnology Lauren Esposito to identify the species. Their collaboration led to the two scorpion species being formally described in the study featured in ZooKeys.
HOW TO WATCH FOX WEATHER ON TV
|
7.3. Lesson: Terrain Analysis
Certain types of rasters allow you to gain more insight into the terrain that they represent. Digital Elevation Models (DEMs) are particularly useful in this regard. In this lesson you will use terrain analysis tools to find out more about the study area for the proposed residential development from earlier.
The goal for this lesson: To use terrain analysis tools to derive more information about the terrain.
7.3.1. Follow Along: Calculating a Hillshade
We are going to use the same DEM layer as in the previous lesson.
If you are starting this chapter from scratch, use the
Browser panel and load the
The DEM layer shows you the elevation of the terrain, but it can sometimes seem a little abstract. It contains all the 3D information about the terrain that you need, but it doesn’t look like a 3D object. To get a better impression of the terrain, it is possible to calculate a hillshade, which is a raster that maps the terrain using light and shadow to create a 3D-looking image.
We are going to use algorithms in themenu.
Click on themenu
The algorithm allows you to specify the position of the light source: Azimuth has values from 0 (North) through 90 (East), 180 (South) and 270 (West), while the Vertical angle sets how high the light source is (0 to 90 degrees).
We will use the following values:
Z factor at
Azimuth (horizontal angle) at
Vertical angle at
Save the file in a new folder
exercise_data/raster_analysis/with the name
Finally click on Run
You will now have a new layer called hillshade that looks like this:
That looks nice and 3D, but can we improve on this? On its own, the hillshade looks like a plaster cast. Can’t we use it together with our other, more colorful rasters somehow? Of course we can, by using the hillshade as an overlay.
7.3.2. Follow Along: Using a Hillshade as an Overlay
A hillshade can provide very useful information about the sunlight at a given time of day. But it can also be used for aesthetic purposes, to make the map look better. The key to this is setting the hillshade to being mostly transparent.
Change the symbology of the original srtm_41_19 layer to use the Pseudocolor scheme as in the previous exercise
Hide all the layers except the srtm_41_19 and hillshade layers
Click and drag the srtm_41_19 to be beneath the hillshade layer in the Layers panel
Set the hillshade layer to be transparent by clicking on the Transparency tab in the layer properties
Set the Global opacity to
You’ll get a result like this:
Switch the hillshade layer off and back on in the Layers panel to see the difference it makes.
Using a hillshade in this way, it’s possible to enhance the topography of the landscape. If the effect doesn’t seem strong enough to you, you can change the transparency of the hillshade layer; but of course, the brighter the hillshade becomes, the dimmer the colors behind it will be. You will need to find a balance that works for you.
Remember to save the project when you are done.
7.3.3. Follow Along: Finding the best areas
Think back to the estate agent problem, which we last addressed in the Vector Analysis lesson. Let us imagine that the buyers now wish to purchase a building and build a smaller cottage on the property. In the Southern Hemisphere, we know that an ideal plot for development needs to have areas on it that:
with a slope of less than 5 degrees
But if the slope is less than 2 degrees, then the aspect doesn’t matter.
Let’s find the best areas for them.
7.3.4. Follow Along: Calculating the Slope
Slope informs about how steep the terrain is. If, for example, you want to build houses on the land there, then you need land that is relatively flat.
To calculate the slope, you need to use thealgorithm of the .
Open the algorithm
Choose srtm_41_19 as the Elevation layer
Keep the Z factor at
Save the output as a file with the name
slopein the same folder as the
Click on Run
Now you’ll see the slope of the terrain, each pixel holding the corresponding slope value. Black pixels show flat terrain and white pixels, steep terrain:
7.3.5. Try Yourself Calculating the aspect
Aspect is the compass direction that the slope of the terrain faces. An aspect of 0 means that the slope is North-facing, 90 East-facing, 180 South-facing, and 270 West-facing.
Since this study is taking place in the Southern Hemisphere, properties should ideally be built on a north-facing slope so that they can remain in the sunlight.
Use the Aspect algorithm of the
to get the
layer saved along with the
Set your Aspect dialog up like this:
7.3.6. Follow Along: Finding the north-facing aspect
Now, you have rasters showing you the slope as well as the aspect, but you have no way of knowing where ideal conditions are satisfied at once. How could this analysis be done?
The answer lies with the Raster calculator.
QGIS has different raster calculators available:
Each tool is leading to the same results, but the syntax may be slightly different and the availability of operators may vary.
We will usein the Processing Toolbox
Open the tool by double clicking on it.
The upper left part of the dialog lists all the loaded raster layers as
nameis the name of the layer and
Nis the band.
In the upper right part you will see a lot of different operators. Stop for a moment to think that a raster is an image. You should see it as a 2D matrix filled with numbers.
North is at 0 (zero) degrees, so for the terrain to face north, its aspect needs to be greater than 270 degrees or less than 90 degrees. Therefore the formula is:
aspect@1 <= 90 OR aspect@1 >= 270
Now you have to set up the raster details, like the cell size, extent and CRS. This can be done manually or it can be automatically set by choosing a
Reference layer. Choose this last option by clicking on the … button next to the Reference layer(s) parameter.
In the dialog, choose the aspect layer, because we want to obtain a layer with the same resolution.
Save the layer as
The dialog should look like:
Finally click on Run.
Your result will be this:
The output values are
What does it mean?
For each pixel in the raster, the formula we wrote returns whether it matches
the conditions or not.
Therefore the final result will be False (0) and True (1).
7.3.7. Try Yourself More criteria
Now that you have done the aspect, create two new layers from the DEM.
The first shall identify areas where the slope is less than or equal to
The second is similar, but the slope should be less than or equal to
Save them under
Set your Raster calculator dialog up with:
the following expression:
slope@1 <= 2
slopelayer as the Reference layer(s)
For the 5 degree version, replace the
2in the expression and file name with
7.3.8. Follow Along: Combining Raster Analysis Results
Now you have generated three raster layers from the DEM:
aspect_north: terrain facing north
slope_lte2: slope equal to or below 2 degrees
slope_lte5: slope equal to or below 5 degrees
Where the condition is met, the pixel value is
Elsewhere, it is
Therefore, if you multiply these rasters, the pixels that have a value
1 for all of them will get a value of
1 (the rest will get
The conditions to be met are:
at or below 5 degrees of slope, the terrain must face north
at or below 2 degrees of slope, the direction that the terrain faces does not matter.
Therefore, you need to find areas where the slope is at or below five
AND the terrain is facing north,
OR the slope is at or
below 2 degrees. Such terrain would be suitable for development.
To calculate the areas that satisfy these criteria:
Open the Raster calculator again
Use this expression in Expression:
( aspect_north@1 = 1 AND slope_lte5@1 = 1 ) OR slope_lte2@1 = 1
Set the Reference layer(s) parameter to
aspect_north(it does not matter if you choose another - they have all been calculated from
Save the output under
The previous steps could have been simplified using the following command:
((aspect@1 <= 90 OR aspect@1 >= 270) AND slope@1 <= 5) OR slope@1 <= 2
7.3.9. Follow Along: Simplifying the Raster
As you can see from the image above, the combined analysis has left us with many, very small areas where the conditions are met (in white). But these aren’t really useful for our analysis, since they are too small to build anything on. Let us get rid of all these tiny unusable areas.
Open the Sieve tool ( in the Processing Toolbox)
Set the Input file to
all_conditions, and the Sieved to
Set the Threshold to 8 (minimum eight contiguous pixels), and check Use 8-connectedness.
Once processing is done, the new layer will be loaded.
What is going on? The answer lies in the new raster file’s metadata.
View the metadata under the Information tab of the Layer Properties dialog. Look the
This raster, like the one it is derived from, should only feature the values
0, but it has also a very large negative number. Investigation of the data shows that this number acts as a null value. Since we are only after areas that weren’t filtered out, let us set these null values to zero.
Open the Raster Calculator, and build this expression:
(all_conditions_sieve@1 <= 0) = 0
This will maintain all non-negative values, and set the negative numbers to zero, leaving all the areas with value
Save the output under
Your output looks like this:
This is what was expected: a simplified version of the earlier results. Remember that if the results you get from a tool aren’t what you expected, viewing the metadata (and vector attributes, if applicable) can prove essential to solving the problem.
7.3.10. Follow Along: Reclassifying the Raster
We have used the Raster calculator to do calculations on raster layers. There is another powerful tool that we can use to extract information from existing layers.
Back to the
We know now that it has numerical values within a range from 0 through
What we want to do is to reclassify this layer to other discrete
values (from 1 to 4), depending on the aspect:
1 = North (from 0 to 45 and from 315 to 360);
2 = East (from 45 to 135)
3 = South (from 135 to 225)
4 = West (from 225 to 315)
This operation can be achieved with the raster calculator, but the formula would become very very large.
The alternative tool is the Reclassify by table tool in in the Processing Toolbox.
Open the tool
Choose aspect as the
Input raster layer
Click on the … of Reclassification table. A table-like dialog will pop up, where you can choose the minimum, maximum and new values for each class.
Click on the Add row button and add 5 rows. Fill in each row as the following picture and click OK:
The method used by the algorithm to treat the threshold values of each class is defined by the Range boundaries.
Save the layer as
Click on Run
If you compare the native aspect layer with the
reclassified one, there are not big differences.
But by looking at the legend, you can see that the values go from
Let us give this layer a better style.
Open the Layer Styling panel
Choose Paletted/Unique values, instead of Singleband gray
Click on the Classify button to automatically fetch the values and assign them random colors:
The output should look like this (you can have different colors given that they have been randomly generated):
With this reclassification and the paletted style applied to the layer, you can immediately differentiate the aspect areas.
7.3.11. Follow Along: Querying the raster
Unlike vector layers, raster layers don’t have an attribute table. Each pixel contains one or more numerical values (singleband or multiband rasters).
All the raster layers we used in this exercise consist of just one band. Depending on the layer, pixel values may represent elevation, aspect or slope values.
How can we query the raster layer to get the value of a pixel? We can use the Identify Features button!
Select the tool from the Attributes toolbar.
Click on a random location of the srtm_41_19 layer. Identify Results will appear with the value of the band at the clicked location:
You can change the output of the Identify Results panel from the current
treemode to a
tableone by selecting Table in the View menu at the bottom of the panel:
Clicking each pixel to get the value of the raster could become annoying after a while. We can use the Value Tool plugin to solve this problem.
In the All tab, type
value tin the search box
Select the Value Tool plugin, press Install Plugin and then Close the dialog.
The new Value Tool panel will appear.
If you close the panel you can reopen it by enabling it in theor by clicking on the icon in the toolbar.
To use the plugin just check the Enable checkbox and be sure that the
srtm_41_19layer is active (checked) in the Layers panel.
Move the cursor over the map to see the value of the pixels.
But there is more. The Value Tool plugin allows you to query all the active raster layers in the Layers panel. Set the aspect and slope layers active again and hover the mouse on the map:
7.3.12. In Conclusion
You’ve seen how to derive all kinds of analysis products from a DEM. These include hillshade, slope and aspect calculations. You’ve also seen how to use the raster calculator to further analyze and combine these results. Finally you learned how to reclassify a layer and how to query the results.
7.3.13. What’s Next?
Now you have two analyses: the vector analysis which shows you the potentially suitable plots, and the raster analysis that shows you the potentially suitable terrain. How can these be combined to arrive at a final result for this problem? That’s the topic for the next lesson, starting in the next module.
|
Wealthier countries are rushing to bulk buy potential Covid-19 vaccines from drug manufactures even before phase III trials end. This means we should not expect the Covid-19 vaccine in Kenya any soon.
Researchers around the world are working on more than 165 vaccines against coronavirus, 27 of those vaccines are being tried on humans.
Most vaccines fail before phase I; trying on a limited number of people to see if it can stimulate immune response.
Also Read: Breakthrough in OXford’s Early Trials of Coronavirus Vaccine
Though vaccines require years of research and testing before production phase, scientists are hopeful of getting a safe and effective vaccine by the end of this year or early next year.
The United States, Britain, and the European Union have already signed multi-billion dollar deals with giant drug companies in the likes of Pfizer, BioNtech, AstraZeneca, and Moderna, to get billions of the doses first before everybody else.
If this is not enough already, Britain signed another deal on Wednesday to secure advanced supplies of potential COVID-19 vaccines from GlaxoSmithKline and Sanofi.
Poor countries will wait desperately for at least two years as rich countries scramble for the vaccines and hoard them as long as they wish, then later on avail them to poor countries, like ours, with strings attached.
This is not new.
During the H1N1 flu in 2009/2010, rich nations bought up all the available supplies of the flu vaccines leaving none for poor countries.
Thanks to God, the H1N1 flu turned out to be mild and less pandemic and was later contained with limited infections and deaths.
It is like every man for himself and God for us all.
Vaccine manufacturers can only produce about 2 billion effective Covid-19 doses by the end of next year.
If you were to vaccinate the whole of the US and Europe with the Covid-19 vaccine, it will take about 1.7 billion doses of the vaccine.
That leaves nothing for the rest of the world.
Globally, there are 7 billion of us. If you do the maths, you will notice that it may take a while for us to get a piece of the Covid-19 vaccine in Kenya.
Even if you were to share the vaccine with 40 other countries, that leaves 150 more countries without the vaccine.
Not unless WHO convinces the wealthy nations to give priority to vulnerable people in poor countries to get access to the vaccine.
Health experts argue that ending the pandemic means ending it globally.
The experts also note that two years of the pandemic will leave enormous devastating economic and health consequences to the nations of the world.
So let us pray and hope that our own researchers will be successful in getting a safe and effective Covid-19 vaccine in Kenya.
- List of AON Hospitals in Nairobi
- A Complete List of AON Dental Service Providers
- Details of Teachers AON Medical Scheme
|
Vaccinium arboreum Marshall
CC = 6
CW = 3
MOC = 42
Family - Ericaceae
Habit - Medium to tall shrubs or small trees 2-5 m in height.
Stems - Bark brown, longitudinally furrowed, peeling in thin plates with age. Twigs sparsely to densely hairy, green or reddish-tinged, becoming gray with age. Twigs pubescent, reddish. New season growth pubescent to velutinous.
Leaves - Alternate, simple, short-petiolate. Petioles to 1.5 mm long. Blades 20-55 mm long, 12-30 mm wide, thick and leathery, oblanceolate to broadly elliptic-obovate, the tip usually rounded or obtusely narrowed to a blunt point, the margins often with widely spaced, minute, glandular teeth; less commonly entire, otherwise glabrous or hairy, the upper surface glabrous, waxy and shiny, the undersurface dull, glabrous to sparsely hairy along the midvein.
Inflorescence - Terminal and axillary short racemes or solitary flowers. Flower stalks 4-10 mm long, with a conspicuous collarlike joint at the junction with the flower, often at least the lowermost stalks with small, leaflike bracts at the base. Axes pubescent.
Flowers - Calyx lobes 5, 0.7-1.0 mm long, the margins sparsely hairy toward the tip. Corollas 2.5-3.0 mm long, 3-4 mm in diameter, broadly urn-shaped to nearly bell-shaped, white, shallowly lobed, the 5 lobes reflexed. Stamens 10, not exserted, with 2 yellow spurs at the filament-anther junction, these slightly shorter than to about as long as the anther tubules, the filaments flattened, hairy along the margins, the anthers tapered to tubules 1.5-2.0 mm long. Styles 4-5 mm, slightly exserted.
Fruits - Berries 6-10 mm in diameter, black, shiny, not glaucous.
Flowering - May - June.
Habitat - Upland forests, margins of glades, tops of bluffs, low woods along creeks or near swamps, on acidic substrates.
Origin - Native to the U.S.
Lookalikes - V. pallidum, V. stamineum.
Other info. - This striking species occurs in Missouri mostly in the southeastern half of the state. Its larger range comprises a relatively sharply defined block within the southeastern quadrant of the continental U.S., with Missouri's populations lying near the northwestern edge of that block. The plant grows in acidic soils and doesn't transplant well, which is probably why it is not seen much in cultivation. The fruits of this species are edible but are tough and mealy, and generally considered unpalatable.
Photographs taken on Bell Mountain, MO., 6-1-03 (DETenaglia); also at Holly Ridge Conservation Area, Stoddard County, MO, 10-17-2017, and Gist Ranch Conservation Area, Texas County, MO, 6-9-2022 (SRTurner).
|
This information is excerpted from the book “Dying into Life: The Yoga of Death, Loss and Transformation” by Dr. Jivan Joti Kaur Khalsa
The medical field has given us the concept of the “moment of death.” As the life functions shut down, one moment they are measurable, at another they are not. This measurability of life has led to the concept of the “moment of death.”
Actually, death can be described as a gradual process of melting or dissolving, which can take minutes or hours to complete, long after the instruments have stopped measuring life.
Our physical body is made up of five elements – earth, water, fire, air, and ether. At the time of death, these elements dissolve into one another.
It is very common for someone nearing death to stop eating and drinking, signs that the body has started the process of shutting down.
As death approaches, the earth element is the first to dissolve. The body loses its feeling of solidity, hardness and boundaries. The body feels heavy, and its edges seem less defined. One feels “out” of the body, to the point of not being able to move the limbs at will. Peristalsis slows, the bowels no longer move without aid.
As the organs shut down, the person stops eating and drinking. The person will go in and out of consciousness, having one foot in life and the other in death. As the earth element dissolves into the water element, the person’s identity is less attached to the solid, and there is a feeling of fluidity.
As the water element begins to melt into the fire element, the feeling of fluidity becomes more like a warm mist. Bodily fluids have slowed, the mouth and eyes are dry, circulation is sluggish and blood pressure drops. Blood settles in the extremities, resulting in a feeling of lightness.
The fire element then melts into the air element, when feelings of warmth, cold or any physical sensations cease. The body temperature drops, and the skin becomes cool and pale. There is a feeling of weightlessness and boundrylessness, as one dissolves into more subtle realms.
Finally, as the air element dissolves, the out breath is longer than the in breath, with long pauses between breaths. The sound of the breath may take on a rattle quality. One experiences a sense of expanding into pure consciousness, which is the ether element.
Each stage is accompanied by less solidity, the edges are less defined and less external input is received. The process of dying seems to be accompanied by a sense of expanding beyond oneself or dissolving out of form. This could be a very frightening experience if one resists the sensations of melting.
Again, we are reminded of the importance of consciously preparing for death. It is not uncommon for one to have similar experiences during meditation or while relaxing after a yoga set.
As the ethers dissolve at the time of death, so do the Chakras. It is a very subtle process, but a trained Yogi can use these energies at the time of death to raise his or her soul up the chakras and out the Crown Chakra. If the soul leaves through the Tenth Gate, it is more likely to go straight to the Fourth Ether.
During yoga and meditation, the Yogi has learned how to raise his energy up the chakras to experience higher states of consciousness and ecstasy. At death, it is the same process. Instead of directing the Kundalini or energy up through the chakras, the yogi is guiding the soul toward the Tenth Gate.
Siri Amrit Singh Talks about the Death of his Grandfather
“As it came closer and closer, his physical body energetically shrunk. I could see his body disintegrating . . . his elements disappearing. I could see it. Then he lost control of his bodily functions. It was the smell of death. As the time went on, his face was absolutely radiant, and his eyes were powerful. There was like a glow about his whole head. And everything else was just nothing . . . like a curtain, not even there. I would sit with him and joke with him or sit and hold his hand and meditate with him. I would talk to him, not verbally . . . it was really amazing. I could sense where he was, and we talked soul to soul.”
Click Here to Watch the Death and Dying Playlist featuring Dr. Jivan Joti Kaur on YouTube!
Dying into Life: The Yoga of Death, Loss and Transformation: Second Edition – Coming Soon!
Death and loss are universal experiences, which we all experience in our lives. The experience of death and loss are never convenient, and everyone responds to them differently. For some, death is an ending, a tragedy, a wall of sorts; for others, it is a beginning, a door or an opportunity for tremendous personal growth and transformation. With training, we can prepare ourselves to view and respond to these transitions with more grace and inner serenity. We can also help others in their own transformative journey. Dying into Life book and course will give you such a training.
Click Here to Sign Up to be Alerted when this Book is Available for Purchase!
|
The sun’s energy can be used to do some pretty astonishing things! Get ready to explore the amazing capabilities of solar energy by building your own solar-powered vehicles and devices. Using a system of ultralight bamboo rods, plastic gears, and a powerful solar panel, you’ll build five different motorized models that that move using electricity generated directly from sunlight. Construct three types of solar cars, a solar fan, and a solar robot. Perform science experiments with each model to learn about gear ratios, solar cells, and more. The ultralight materials make your models speedy and durable while the modular gearing system lets you test out three different gear ratios.
Piece Count: 54
Manual Pages: 16
Product Dimensions: 8.75 x 11 x 1.7 in.
Product Weight: 1 lbs
Manual Dimensions: 5.5 x 8.25 in.
Batteries Required: N/A
Country of Origin: Taiwan
Year Released: 2020
2020 Parents' Choice Gold Award
4-ESS3-1 Earth and Human Activity
|
Scientists have unveiled the primary total map of an insect’s mind.
The great map, known as a connectome, took 12 years of meticulous paintings to build, and presentations the site of all 3,016 neurons within the mind of a larval fruit fly (Drosophila melanogaster). Between the ones mind cells are 548,000 issues of connection, or synapses, the place cells can ship each and every different chemical messages that, in flip, cause electric alerts that commute in the course of the cells’ wiring.
Researchers known networks by which neurons on one aspect of the mind ship information to the opposite, the workforce reported March 9 within the magazine Science (opens in new tab). The workforce additionally categorised 93 distinct kinds of neurons, which vary of their form, proposed serve as and the best way they connect with different neurons.
The brand new connectome is exceptional for its completeness, professionals informed Reside Science.
Similar: Google simply created essentially the most detailed symbol of a mind but
“This find out about is the primary so to map the whole thing of an insect central mind and thus symbolize all synaptic pathways of the entire neurons,” Nuno Maçarico da Costa (opens in new tab) and Casey Schneider-Mizell (opens in new tab), participants of the Neural Coding workforce on the Seattle-based Allen Institute for Mind Science who weren’t concerned within the initiative, informed Reside Science in a joint electronic mail.
In 2020, a unique analysis workforce printed a partial connectome of an grownup fruit fly (opens in new tab) that contained 25,000 neurons and 20 million synapses. However scientists have total connectomes for simplest 3 different organisms: a nematode, a larval sea squirt and a larval marine computer virus. Every of the ones connectomes consists of a couple of hundred neurons and lacks the distinct mind hemispheres noticed in bugs and mammals, mentioned find out about co-senior writer Joshua Vogelstein (opens in new tab), director and co-founder of the NeuroData lab at Johns Hopkins College.
Greater than 80 folks helped to build the brand new connectome, find out about first writer Michael Winding (opens in new tab), a analysis affiliate within the College of Cambridge Division of Zoology, informed Reside Science in an electronic mail. To take action, scientists thinly sliced a larval fly mind into 5,000 sections and snapped microscopic photographs of each and every slice. They pieced those photographs in combination to shape a three-D quantity. The workforce then pored over the photographs, known person cells inside them and manually traced their wires.
The ensuing map stunned scientists in numerous techniques.
As an example, scientists generally tend to consider neurons sending outgoing messages via lengthy wires known as axons and receiving messages via shorter, branched wires known as dendrites. Then again, there are exceptions to this rule, and it seems that axon-to-axon, dendrite-to-dendrite and dendrite-to-axon connections make up about one-third of the synapses within the larval fly mind, Winding mentioned.
Similar: How does the mind retailer reminiscences?
The connectome used to be additionally strangely “shallow,” that means incoming sensory knowledge passes via only a few neurons sooner than getting handed to 1 inquisitive about motor keep an eye on, which will direct the fly to accomplish a bodily habits, Vogelstein mentioned. To reach this degree of potency, the mind has integrated “shortcuts” between circuits that quite resemble the ones in state of the art AI methods, Winding mentioned.
One limitation of the connectome is that it does not seize which neurons are excitatory, that means they push different neurons to fireside, or inhibitory, that means they make neurons much less more likely to fireplace, Schneider-Mizell mentioned. Those dynamics impact how knowledge flows in the course of the mind, he mentioned.
Nonetheless, the connectome opens the door to many long run developments, reminiscent of extra energy-efficient AI methods and a greater figuring out of ways people be informed, Vogelstein mentioned.
“People do issues reminiscent of make choices, be informed, navigate the surroundings, consume,” he mentioned. “And so do flies. And there may be excellent reason why to suppose that the mechanisms that flies have for enforcing the ones forms of cognitive purposes also are in people.”
|
How Home Solar Batteries Work
Solar energy system generates electricity whenever the sun is shining, often making more than a home needs during peak seasons. That excess energy is sent to the grid, and the homeowner usually receives a credit from their utility that can offset the electricity used at night.
While the grid still plays a supporting role, more homeowners are requesting solar-plus-storage so they can have more control over their electricity use.
Solar storage batteries work by taking that excess electricity and storing it. The stored solar energy can be used to complement power from the grid at night or to power essential appliances1 during a power outage. (Check out this battery storage infographic from Sun Power Below.)
Lithium ion home storage batteries usually come in a rectangular white box that’s about 4- to 5-feet high, 6 inches to a foot deep and about 2 feet wide. They are mounted in an out-of-the-way spot, such as a utility room or in the garage. The bigger the battery, the more power that can be stored. Any excess left over after the battery is charged flows back to the utility. See our Sonnen Battery Page for information or contact SGE to get a free no-obligation quote today!
|
Psychosocial Health (PH)
To promote the Psychosocial Health SAVE develops life skills on Self-awareness, Creative and Critical Thinking, Problem solving and decision making, and Coping with stress and emotions to vulnerable children, women and workers of youth and adult in textile and garments.
Psychosocial health includes four important components of well-being. The importance of being mentally, emotionally, socially, and spiritually sound was lost on medicine for a long time. A pill was supposed to solve everything. There's plenty of proof that a healthy mind and a content heart are just as important for the prevention of diseases and their treatment. Therefore, this concept of psychosocial health, a state of mental, emotional, social, and spiritual well-being is a better balanced healthy life.
Basic Traits of Psychosocial Health
Individuals who are deemed to be psychosocially healthy aren't completely devoid of problems. Actually, it's not the quantity or quality of a problem, or lack thereof, which makes someone sound in this respect. It's the way people view themselves and how they deal with stressful situations that sets psychosocially healthy people apart from those who are not. Here are just a few traits are 1.Like themselves 2.Accept their mistakes 3.Take care of themselves 4.Have empathy for others 5.Control their anger, hate, tension, and anxiety 6.Are optimistic and 7.Can work alone and with others equally well
The thinking portion of psychosocial health is known as mental health. The beliefs and values in life, as well as how we relate to others and respond to situations in our life, are a reflection of mental health, which overlaps with the other aspect of health we're going to talk about. When something happens to us that we don't like and respond in a positive manner by accepting our mistake and looking forward to its correction, then that's good. But if we show up late for work yet again, get fired, and then blame anyone but ourselves, then that may be an indicator of less than ideal mental health.
The feeling part of psychosocial health is called emotional health. This includes things like anger, love, hate, and happiness. Oftentimes, emotional and mental health overlap a great deal in some situations. Going back to our example of getting fired from work because we came in late for the umpteenth time, if we feel a bit down, but still have high hopes for the future, that's a positive thing. But if we lash out in a blinding rage against our boss, sulk when we go home, and avoid everyone thereafter, then that may point to improper emotional health. Furthermore, it's not unexpected even for an emotionally healthy person to experience some sadness after getting fired; that by itself isn't conclusive of poor emotional health. Everyone, even the most optimistic people, have their ups and downs. But an emotionally unhealthy person is one that responds to a situation in a manner that is uncontrollable, out of proportion, and extreme.
Emotional intelligence is an ability to understand and manage our emotions and those of others. It has been broken up into five main parts
Know your emotions: Are you able to quickly recognize your feelings?
Manage your emotions: Can you express those feelings appropriately? Are you able to cope with them well?
Motivate yourself: The more you can do this independently in order to achieve more in your life, the higher your emotional intelligence.
Recognize the emotions of others: The more you can empathize with others, the better
Handle your relationships: The better you are at navigating conflict in life and building a good social network, the higher your emotional intelligence.
That relationships is a good way to introduce social health, the ability to create and maintain healthy relationships with others. I'm sure you can already appreciate how much this is related to the concepts we went over in emotional health. Social health goes beyond having appropriate emotional health and intelligence. A person with good social health:
Recognizes the importance of social engagement. We are not supposed to live alone!
A person with good social health is able to support their friends in a time of need and ask for their help when they need it themselves.
They aren't biased, prejudiced, racist, or sexist.
Listens to others well, expresses their feelings just as well, and acts in a responsible manner around others.
|
Read more about eth conversion calculator here. Commodities, of one sort or another, were best suited to the ‘medium of exchange’ function for most of human history. Linguistic and Commodity Exchanges Examines the structural differences between barter and monetary commodity exchanges and oral and written linguistic exchanges. The ‘intrinsic value’ of commodity is a crucial part of building its trust. We can look back many centuries to when goods such as tobacco or salt were used as money. People would use them to trade with each other as they were commonly used goods. Even if nobody would accept it, the owner could use it for their purposes.
What is an example of commodity money?
Examples of commodity money are gold and silver coins. Gold coins were valuable because they could be used in exchange for other goods or services, but also because the gold itself was valued and had other uses. Commodity money gave way to the next stage-representative money.
Stolaf23 January 31, 2011 On college campuses there can be many types of commodity money. For example, at my school we had “flex” dollars as part of our meal plan that were only usable in the campus cafe. That meant that you often could pay people back in these flex dollars by buying them food, rather than actually paying back in real money, provided they saw it as a fair trade. Cigarettes may be used as a form of commodity money in some circumstances. Something that serves as commodity money only has to have value in itself, rather than being of use to the bearer. For example, there is little most people can actually do with a gold coin and, if someone is a smoker, a cigarette is of more practical use. The gold coin has a much higher value, though, as a jeweler or goldsmith would be able to make use of it to produce an expensive object. We can see, touch, and feel commodity money – it is physical. That means it has value in and of itself, with people trading it freely in the knowledge that someone will accept it.
What happens if RBI prints more money?
In the past, any commodity that did not comply with these standards was not accepted as commodity money. Commodity money is money whose value comes from a commodity of which it is made. Due to the limited amount of gold coming out of mines, central banks could not keep up with its new value. Fiat money was the alternative that provided cost-efficient production and was convenient to use, and also gave greater flexibility to the government in order to manage its own currency. Cryptocurrency is another fiat money alternative that’s on the rise. Cryptocurrencies such as Bitcoin could be used in the future as the main form of currency, but for now, it’s still not widely accepted. Nowadays, almost all countries have fiat money as a legal tender. Although gold coins could be an alternative to fiat money since you can buy and sell them, they are not commonly used for everyday purchases.
Kurt Wuckert Jr. talks history of Bitcoin, Web3 and BSV on No BS Crypto podcast – CoinGeek
Kurt Wuckert Jr. talks history of Bitcoin, Web3 and BSV on No BS Crypto podcast.
Posted: Sun, 24 Jul 2022 09:04:37 GMT [source]
The check or debit card just tells a bank to transfer money, in this case checkable deposits, from one account to another. Consider a $20 bill that you accidentally left in a coat pocket a year ago. Value has, in effect, been “stored” in that little piece of paper. Define what is meant by the money supply and tell what is included in the Federal Reserve System’s two definitions of it . A cow is fairly durable, but a long trip to market runs the risk of sickness or death for the cow and can severely reduce its value. Twenty-dollar bills are fairly durable and can be easily replaced if they become worn.
Origins of Commodity Money
When you borrow money, for example, you typically sign a contract pledging to make a series of future payments to settle the debt. These payments will be made using money, because money acts as a store of value. In order to maintain its value, money must have a limited supply. While the supply of cows is fairly limited, if they were used as money, you can bet ranchers would do their best to increase the supply of cows, which would decrease their value. The supply, and therefore the value, of 20-dollar bills—and money in general—are regulated by the Federal Reserve so that the money retains its value over time. Inflation also limits money as a unit of account because prices are continually increasing so it is difficult to compare prices that are constantly changing. The development of mobile payment platforms, such as Apple Pay and Google Wallet, and apps such as PayPal and Venmo are now paving the way for the cashless future. Prices provide information for consumers and producers who allocate economic resources to their most desirable uses. Items in demand command a higher price relative to the costs of the resources to produce them, which induces sellers to provide more of those items.
7 Housing Markets Where Bidding Wars Are Disappearing – Money Talks News
7 Housing Markets Where Bidding Wars Are Disappearing.
Posted: Fri, 22 Jul 2022 10:01:44 GMT [source]
Customers receive a loyalty card on which they can add money and pay with it at any Starbucks location. With Oveit, economy owners can create a closed-loop environment, which works under the same principle. It is up to the economy owner to decide which vendors are part of it and members can easily be rewarded based on purchase behavior. King Alyattes of Lydia became the first to mint official currency in 600 B.C. This currency was represented by coins, made of silver and gold. Each coin had a different value which made it easier for people to estimate the cost of items. As a result, this adopted currency helped Lydia’s both internal and external trade, classifying it as one of the richest empires in Asia Minor. If you’ve heard the saying “as rich as Croesus”, it refers back to the last Lydian King that issued the first gold coin.
In principle, credit could perform this function, but, before extending credit, the seller would want to know about the prospects of repayment. That requires much more information about the buyer and imposes costs of information and verification that the use of money avoids. This happened recently in Zimbabwe, in Africa, and in Venezuela, in South America, when these countries printed more money to try to make their economies grow. As the printing presses sped up, prices rose faster, until these countries started to suffer from something called “hyperinflation”. Indivisibility, perishability, tendency to fluctuate erratically and variations in quality are some disadvantages of commodity money. Commodity money is any form of currency that can serve another purpose apart from its use as money. Afterward, humans turned to other agricultural products to use as money. Grains like barley and rice had value because they were food, so people were willing to accept them as payment for goods or services. What are the specific qualities that make something good money?
These round, pierced Chinese coins remained virtually unchanged until the 1800s. It’s only money, after all, and that’s just what we use to buy the things we want and need. We get paid by our employers, and we use that money to pay https://www.beaxy.com/exchange/eth-usd/ the bills, buy our food, and purchase goods and services. We might put some in a savings account at the bank or invest it in stocks or real estate, but for the most part, currency seems like a fairly straightforward concept.
Why do we use cash and not other types of money to perform transactions? Who says that the dollar you have in your pocket is valuable? You will know a lot more about these questions after reading our article on the types of money. In case of the fiat monetary system, governmental monetary policy is required to regulate the quantity of fiat money. Expert opinion is required for the development of this policy in order to achieve the desirable goals. However, the policy is entirely based on the personal value judgment of these experts and once the policy is finalized, government forces are required to implement this policy. Fiat money is a paper money and it represents nothing but a promise or an obligation. Under a fiat monetary system, final payment never occurs because a transaction is executed with a promise, a representation, or an obligation that something else is owed. It is not tangible and does not have any defined unit of measure. One additional function of money is that it must serve as a standard of deferred payment.
Yet people voluntarily give up valuable goods or services in exchange for pieces of paper. Fiat money doesn’t link or “peg” to any physical reserves, such as gold. My grandparents used to say that money makes the world go around, but what do we know about the money we use today? We currently use fiat money but also deal with commodity money as well.
All posts tagged: commodity money
Economies without money typically use the barter system.Barter—literally trading one good or service for another—is highly inefficient for conducting transactions. In a barter economy, an exchange between two people requires a double coincidence of wants, which means that what one person wants to buy is exactly what the other person wants to sell. For instance, in addition to being commodity money, cigarettes can be smoked, while gold and silver can be used for making pieces of jewelry. It is highly illiquid but could eventually be converted to money. Gold is not money because it is not used as a medium of exchange. “We don’t have a currency of our own,” proclaimed Nerchivan Barzani, the Kurdish regional government’s prime minister in a news interview in 2003. But, even without official recognition by the government, the so-called “Swiss” dinar certainly seemed to function as a fiat money. Here is how the Kurdish area of northern Iraq, during the period between the Gulf War in 1991 and the fall of Saddam Hussein in 2003, came to have its own currency, despite the pronouncement of its prime minister to the contrary. Economists measure the money supply because it affects economic activity.
How is commodity money different from paper money?
Commodity money is a sort of money that is considered as a present good. Whereas, fiat money is a future obligation as it is simply a promise to pay in the future. Payment is never made when it comes to fiat money, instead it is only discharged.
At the same time, cross-border transactions and stability will make gold-backed stablecoins an irresistible proposition for many and an intriguing opportunity for many more. Typically, a token backed by a commodity, referred to as a stablecoin, will be set up with a traditional custody and trust structure managing the underlying assets. Trustees are regulated financial professionals who manage assets, while custodians arrange for secure holding, whether themselves or through third parties. Trusts are audited by third parties, and in an additional layer of protection, tokens are issued on a public blockchain that’s transparent, unhackable and automatically preserves immutable audit trails. The tokens issued represent a legal claim on the trust’s contents — ownership in a certain sum of gold. After the second world war, this began to break down and was replaced by the Bretton Woods Agreement, which substituted the US dollar for gold worldwide. The world financial system now consisted essentially of promises to pay dollars, while dollars themselves were a fiat currency.
Certainly, the government can abuse the printing of money, but the government can abuse many things, such as can be seen perpetually in Russia. Only the people can ensure that the government works for their best interest. But an efficient economy requires money that not only serves as a convenient unit of exchange, but also as an accurate unit of account and as a predictable store of value. So, Ron Paul’s desire to end the Fed and go back to the gold standard will never happen.
- AskMoney.com and any content or offers listed herein are not an intermediary, broker/dealer, investment advisor, or exchange and do not provide investment advice or investment advisory services.
- This is why Bitcoin will never serve as a currency for major economies and why virtually every country in the world has moved away from the gold standard and why they will never return.
- With a background that blends engineering and finance, I cover value investing with a global macro overlay.
- Thus, many types of savings accounts are easily converted into currency.
- Fiat currency, or fiat money, is a type of currency that’s issued by the government and is not backed by physical commodities, such as gold.
Currency itself is perfectly liquid; you can always change two $5 bills for a $10 bill. Checkable deposits are almost perfectly liquid; you can easily cash a check or visit an ATM. It can be converted to money only by selling it, a time-consuming and costly process. Houses, office buildings, land, works of art, and many other commodities serve as a means of storing wealth and value. Money differs from these other stores of value by being readily exchangeable for other commodities. Its role as a medium of exchange makes it a convenient store of value. We use money in this fashion because it is also a medium of exchange.
|
We regret to inform users that this resource is no longer available. The site has been withdrawn as the technologies which it is built with have reached end-of-life.
An archived version of the site is available at https://wayback.archive-it.org/org-467/20191018041820/http://shelleysghost.bodleian.ox.ac.uk/
Last update to original site:
15 April 2020
Please contact email@example.com with any questions.
Preface from the original site
This exhibition is a collaboration between the Bodleian Libraries and the New York Public Library. It unites two great collections to chart the history and reputation of a great literary family that was blessed with genius but marred by tragedy.
What is the exhibition about?
Few families enjoy such a remarkable reputation for their contribution to the literature and intellectual life of Britain as the Godwins and the Shelleys. Shelley's Ghost: Reshaping the Image of a Literary Family explores how the reputation of this great literary family was shaped by the selective release of documents and manuscripts into the public domain. It also provides a fascinating insight into the real lives of a family that was blessed with genius but marred by tragedy.
|
Getting great grades in college is the name of the game. Whether you plan to pursue a career straight out of undergraduate or want to pursue a post-graduate degree, scoring great grades throughout your undergraduate education is crucial to success.
So what are some major ways to improve your studying tactics to make sure that you get the best grades possible?
Here are some of the best.
Find a way to take great notes
Taking notes in college is crucial to succeeding on your exams. Whether it is simply taking down facts or working on a way to remember a specific equation, note taking is crucial to success.
But simply writing things down likely won’t work. Try to take notes with the course’s exams in mind, so that when you start to study, you will have the information you need in your notebook or laptop.
Take breaks while studying
In college, you will find that you sometimes have to work on course work for hours at a time. Whether you are preparing for a final exam or crafting a major term paper, taking breaks is crucial to your success.
For every 45 minutes of studying, it is useful to take 15 minutes of break time to grab a quick snack, take a quick stroll around the library or step outside for a breath of fresh air. This will help your brain recharge and stay sharp and will also break up the monotony of studying to help you focus.
Consider studying together with friends
If you have entered your grades into a college gpa calculator and do not like what you see, you might need to surround yourself with some good role models. That can often come in the form of friends and fellow classmates. If you are struggling with the material, asking your classmates if they would be willing to meet together in a group to go over the course material and study together.
This can not only help you get a better understanding of the specific course work at hand, it can also expose you to studying techniques that other people use that work for them that you have not yet considered. You can then try to see if any of those studying techniques work for you.
Develop a strict study schedule
By now, chances are good you probably already know that cramming for exams is not a good way to learn and retain important information. However, that might not be keeping you from procrastinating throughout the term only to have to cram for the midterms of finals ahead.
To avoid that necessity, try to develop a strict but doable study schedule that forces you to work each and every day on mastering the material. This schedule should afford time to also take care of any homework you may have as well as studying any new material that you will want to be able to be comfortable ahead of your studying for exams.
|
Difference Between Sleeping and Dreaming
Dreams and the reason why we sleep have always aroused the curiosity of more than one student. Since ancient times there has been a special interest in dreams and their meaning, to such an extent that some attribute supernatural and mystical qualities to them. Difference Between Sleeping and Dreaming
With the passage of time, some beliefs associated with the acts of sleeping and dreaming have diminished considerably; in part because scientists made significant progress in the past century in studying the factors that make us sleep, as well as those that make us dream.
Now, due to the close relationship between these two terms, there is more than one that gets confused when it comes to understanding what makes them different. If you also have doubts about it or just want a little more information, keep reading, because below we will explain what the difference is between dreaming and sleeping.
SLEEP Difference Between Sleeping and Dreaming
Sleep is one of the basic needs of human beings and many other living beings, so much so that you can die from lack of sleep. This activity has always intrigued people because it is often considered the closest experience to death that can be appreciated while alive.
We sleep because a series of factors cause it, such as neurotransmitters, for example. When we are sleeping our body is in a state of rest and we are not clearly aware of what is happening around us. Our entire nervous system reduces the degree to which it performs its activities.
In humans, sleep has four stages; which are defined by the degree of “depth” of the same or; In other words, how insensitive we are to external stimuli. The first three phases correspond to NMOR or light sleep, while the fourth and last phase is known as REM or Rapid Eye Movements.
On the other hand, the matter of dreams and their study is a bit more subjective; although scientifically it has been possible to explain some elements or phenomena related to them.
Every day we hear people talking about dreams or nightmares they had the night before. Some say they dream that something is chasing them, others dream that they are flying, and there are also people who usually have dreams of the dead . In relation to the latter case, it is observed that sometimes some individuals attribute influences to this type of dreams that go beyond those they actually have.
What happens to us when we are awake is what contributes the most to the content of our dreams, that is why it is impossible to dream of people we have never seen; likewise, our age and gender play an important role in this process.
Finally, our dreams emphasize visual perceptions and emotions at the expense of reasoning and logic. Although we sometimes believe we control them, the truth is that dreams are involuntary and while we have them we do not have our abilities to judge, reflect and think as we do when we are fully conscious.
|
Eventually, if not from the first day of your special education career, you will come in contact with braces, splints and orthoses. You will be expected to apply and remove them, monitor skin integrity and teach others to do all of these things. I have worked with some great OTs and PTs over the years who have given me excellent information. Early in my career I also worked with OTs and PTs who gave me little or erroneous information. Here is some of the best information I have received.
Leg braces or AFOs (Ankle Foot Orthoses) are worn by many students with cerebral palsy, muscular dystrophy and other low incidence motor disabilities. AFOs and most custom orthoses are ordered by a physician and made by an orthotist. The body part, in this case the lower leg, is casted and a model is made of it. Then the orthotist builds a brace out of a special plastic. AFOs are made only for the child the prescription was written for and are not intended for use by anyone else. AFOs and other prescription orthoses are designed to be worn over a thin layer of clothing without any wrinkles in the fabric. Care should be taken to put AFOs on the correct feet, marking the AFO may help speed up this process.
When putting an AFO on a student the student should be seated or lying on his or her back. The sock should be pulled all the way up and be smooth. After placing the child's leg into the AFO make sure the heel is all the way back; you can do this by lifting the toes to and visually checking heel placement. Once the heel is back secure the velcro across the instep (if there is one) followed by the top strap and the toe strap (if there is one). Pull the sock down a bit by the toe to ensure their are no wrinkles. KAFOs are similarly put on, only the part that attaches to the thigh and the connected AFO should be put on at the same time. For both AFOs and KAFOs children generally wear sneakers one size larger than usual with the insole removed. There are also special AFO shoes available.
A new kind of AFO has been developed out of England. It is called the SAFO for Silicon AFO. It is lightweight and flexible. Those who wear it claim it is much more comfortable and cuts down on fatigue. It is very expensive, about $3,000, and is not covered by American insurance companies. Thus I wouldn't expect to see one in a classroom near you soon, but good to know about none-the-less.
Back braces also know as body jackets and TLSOs (Thoraco-Lumbar Sacral Orthosis) are worn to treat or prevent scoliosis (curvature of the spine), to immobilize after spinal surgery or to support week trunk muscles. There are two primary types of body jackets you will see in the SpEd classroom. The first is the bivalve body jacket, which has a back and front and velcro down each side. The second is the overlap body jacket which generally opens in the front, with two or three strap of velcro across the front. You can find directions to apply a body jack by clicking on the type of body jacket above. My biggest tips are NOT to use the g-tube cut out as a guide for body jacket placement and to make sure the body jacket is on right side up, marking "top" and "bottom" inside the body jacket may help with this. Body jackets, like AFOs and KAFOs are meant to be worn over a thin layer of clothing, like a tight fitting undershirt. There are special "body socks" designed for wear under a body jacket, but insurance companies generally only pay for one or two a year.
Hand splints are more variable than leg braces. Although some are doctor ordered and made by and orthotist, others may be made by your classroom OT, still others may be purchased pre-made. Some hand splints are designed for preventing contractures, others to aid in functional tasks and others to provide comfort and support.
Skin care is of utmost important in the cast of any brace, splint or orthosis. When first worn the orthotist or therapist will generally recommend a 30 minutes on/30 minutes off schedule, checking the skin before and after for any redness. Gradually the time on will increase as tolerated. Redness lasting longer than twenty to thirty minutes usually means the brace must be adjusted. Many orthotists recommend rubbing the skin under the brace with alcohol several times a day to toughen the skin and discourage use of lotions which soften the skin.
I have had student who love their braces, splints or orthoses and I have had students who have tried to hide, destroy or throw away their devices. One of my students will complain of her body jacket being uncomfortable, but will want it adjusted, not removed, because she likes wearing it. Another of my students glares at the person who puts his body jacket on and will even make gagging noises when he first has it on in order to get it taken off (telling him to knock it off works just as well as removing the body jacket).
P.S. With thanks to a commenter (the first on this new blog of mine) I want to note that I just learned something. An orthosis (plural orthoses) is the actual custom brace. Orthotics is the science of making orthoses. I thought that "orthotic" was what you called the brace. You learn something new everyday! My commenter sent me to this glossary to clear things up.
|
First X-ray detection of a colliding-wind binary beyond the Milky Way
Imagine two stars with winds so powerful that they eject an Earth's worth of material roughly once every month. Next, imagine those two winds colliding head-on. Such titanic collisions produce multimillion-degree gas, which radiates brilliantly in X-rays. Astronomers have conclusively identified the X-rays from about two-dozen of these systems in our Milky Way. But they have never seen one outside our galaxy — until now.
Thanks to the European Space Agency's XMM-Newton X-ray observatory, with help from NASA's Chandra X-ray Observatory, an international team led by Dr Yaël Nazé of the Université de Liège in Belgium has found such a system in a nearby galaxy. This galaxy, the Small Magellanic Cloud, orbits the Milky Way and is located about 170 000 light-years from Earth.
The binary system, known as HD 5980, contains two extremely massive stars, 'weighing' about 50 and 30 times the mass of the Sun. Each star radiates more than a million times as much light as the Sun, meaning they put out more light in one minute than our host star generates in an entire year.
The sheer photon pressure of this incredible outpouring of light blows off gas from each star in a supersonic 'wind'. These winds are so powerful that they carry away roughly an Earth mass each month, a rate 10 thousand million times greater than the solar wind, and at a speed 5 times faster than the solar wind itself.
HD 5980's two stars are separated by only about 90 million kilometres, roughly half Earth's average distance from the Sun. "These stars are so close to each other that if they were in our solar system they could fit inside the orbit of Venus," says Nazé. As a result, the winds smash into each other with tremendous force, heating the gas and generating enormous numbers of X-rays.
"The system emits about 10 times more energy in X-rays alone than the Sun radiates over the entire spectrum," says team member Dr Michael F. Corcoran, a scientist with the Universities Space Research Association at NASA's Goddard Space Flight Center in Greenbelt, Maryland.
Using data from Chandra, the same team first reported HD 5980's highly energetic X-ray emission in 2002. But its origin was uncertain. Data taken from 2000 to 2005 with XMM-Newton shows that it is indeed produced by a wind collision.
The stars orbit each other every 20 days in a plane that is edge-on to Earth's line of sight, so the stars periodically eclipse each other. The wind collision is thus seen from different angles and through different amounts of material. XMM-Newton saw the X-ray emission rise and fall in a repeatable, predictable pattern.
"Similar X-ray variability from massive binaries inside the Milky Way have been detected, but this is the first indisputable evidence for the phenomenon outside our galaxy," says Nazé. "This discovery highlights the great capabilities of modern X-ray observatories."
XMM-Newton has the largest mirrors of any X-ray observatory ever flown, and the sheer size of these mirrors allowed astronomers to monitor this distant system. HD 5980 itself is surrounded by hot interstellar material that creates a diffuse X-ray glow that makes the object difficult to study. "The Chandra data allowed us to pinpoint HD 5980 and resolve the system from the diffuse emission," says Corcoran.
HD 5980 is one of the Small Magellanic Cloud's brightest stars. Situated on the periphery of the star cluster NGC 346, the two stars are nearing the end of their lives and will eventually explode as supernovae. The more massive star, HD 5980A, is passing through a Luminous Blue Variable (LBV) phase — a short-lived, erratic stage that only the most massive stars go through. The most well-known LBV in our galaxy, Eta Carinae, produced a giant outburst that was recorded by astronomers in the 1840s. HD 5980A experienced a smaller-scale outburst that was seen in 1993-94. Its companion, HD 5980B, is an evolved Wolf-Rayet star that has already ejected much of its original envelope.
"It's interesting to be able to study an extragalactic colliding-wind binary like HD 5980 as if it were in our own galaxy", says Corcoran. "Colliding winds provide an important handle on how massive stars shed material. Being able to study them in external galaxies means we can study the effects of different compositions and environments on how these massive stars evolve. From the XMM-Newton data, we can study the delicate balance between the two winds, and determine the changing strength of the winds."
Note for editors
The results will appear on-line today in The Astrophysical Journal Letters, in the article titled: "First detection of phase-dependent colliding wind X-ray emission outside the Milky Way" (http://arxiv.org/abs/astro-ph/0702403).
Coauthors also include Dr Gloria Koenigsberger of the Universidad Nacional Autonoma de México and Dr Anthony J. Moffat of the Université de Montréal in Canada.
For more information
Yaël Nazé, Université de Liège, Belgium
Tel: +32 4 366 9720
Email: naze @ astro.ulg.ac.be
Michael F. Corcoran, Universities Space Research Association at NASA/GSFC, Greenbelt, Maryland, USA
Email: corcoran @ milkyway.gsfc.nasa.gov
Gloria Koenigsberger, Universidad Nacional Autonoma de México
Email: gloria @ astroscu.unam.mx
Anthony J. Moffat, Université de Montréal, Canada
Email: moffat @ astro.umontreal.ca
Norbert Schartel, ESA XMM-Newton Project Scientist
Email: norbert.schartel @ sciops.esa.int
|
Every year, millions of animals—including cats, pigs, turtles, and frogs—are dissected in primary schools, middle schools, and high schools and then discarded, many after suffering and dying for nothing more than to satisfy the demand for biological “specimens.”
As the "study of life," biology should foster respect and compassion for animals. Yet dissection encourages neither; animal life is devalued and treated as expendable.
However, more and more students prefer to learn anatomy and physiology using humane alternatives such as computer-based programs, 3-D models, and videos, which are also less expensive to use. Educational research shows that students using humane alternatives learn as well or better than students using animals.
You Can Help
Students and teachers can choose to use alternatives, and our Dissection Campaign Packet provides guidance and materials for students and teachers who want to create a humane biology classroom at their school.
News & Events
April 19, 2012
The disappearance of frogs is a big deal. Simple stuff you can do to help.
September 2, 2011
This school year, middle- and high-school students throughout New York will be reminded of their legal right to choose when it comes to animal dissection.
January 28, 2011
Nominations are currently being accepted for the 2011 Russell and Burch Award, which will be given to a scientist who has made outstanding contributions to animal alternative methods in the areas of biomedical research, testing or higher education.
May 18, 2009
The HSUS urges Connecticut state senators to vote "yes" on House Bill 6565 to allow students to choose alternatives to animal dissection.
June 11, 2013
The U.S. Fish and Wildlife Service (FWS) announced a proposal to protect all chimpanzees under the Endangered Species Act.
June 7, 2013
The U.S. Environmental Protection Agency formalized several policy recommendations designed to reduce animal tests in pesticide safety.
January 22, 2013
Expert Advisory Panel Confirms Chimpanzee Retirement from Laboratories to Sanctuary is the Way Forward
The HSUS commends the expert recommendations proposed to the National Institutes of Health by its independent advisory body, the Council of Councils, regarding chimpanzee research and retirement.
January 9, 2013
The Humane Society of the United States applauds Gilead Sciences, Inc., a biopharmaceutical company headquartered in Foster City, Calif., for agreeing to not use chimpanzees for research and development.
|
Understanding Network I/O, Part 2by George Belotsky
With today's technology, creating your own Internet services can be a relatively easy, one-person project. You may not produce the next Google, but helping your business, not-for-profit organization, school, or friends with a useful Internet application is thoroughly feasible — even on a part-time basis.
In fact, simple Internet clients should take less than a day to write, as described in the previous article on Python network programming. In this second article of a two-part series, we discuss more advanced networking topics, including a set of guidelines for choosing the most suitable approach for your situation.
As in the first article, examples are provided in the Python programming language. Python's clean, elegant syntax is highly suitable for creating compact, easy-to-understand programs. If you require more information about Python, the previous article includes many Python-related links and an installation notes section. Reading the first article will also help you understand the material presented here, but it is not strictly necessary.
Doing Several Things at Once
As discussed in the previous article, network I/O is unpredictable. Sometimes requests will fail outright for some (possibly transient) reason, but often the fault is much more subtle. For example, data might start flowing only after a lengthy delay (high latency), or flow very slowly (low bandwidth). On the Internet, such faults may be caused by a malfunctioning system on another continent — far out of the reach of your application.
This unpredictability presents a challenge if your program must perform multiple network operations. For example, servers typically process requests from many clients. It is rarely acceptable to make everyone wait just because one client has trouble. Fortunately, there are powerful, well-tested techniques to deal with such situations.
The key to all of these techniques is that several network I/O operations can be performed concurrently. Thus, we continue to process most requests quickly, even if some requests are delayed due to network-related problems.
Today, there are two basic strategies for concurrency; multitasking and asynchronous I/O. Both techniques are widely applicable to servers, clients, and peer-to-peer systems. To help get you started quickly, the examples presented here extend the ones given in the first article. First, however, we will briefly cover the most basic, fundamental approach: synchronous I/O.
Synchronous I/O is the simplest method for your networked application. Basic synchronous I/O provides no concurrency at all; the program stops at each operation, waiting for it to complete. This technique is sufficient for simple clients. All of the examples in the previous article, except for the one based on Twisted, used synchronous I/O.
Synchronous I/O is easy to test. Other methods introduce many complex subtleties, so initial verification of an application's logic benefits from the use of synchronous I/O. The following program implements a web client that fetches the current outdoor temperature in New York, London, and Tokyo. It is a straightforward modification of example 8 in the previous article.
Example 1. A synchronous I/O client
import urllib # Library for retrieving files using a URL. import re # Library for finding patterns in text. import sys # Library for system-specific functionality. # Three NOAA web pages, showing current conditions in New York, # London and Tokyo, respectively. citydata = (('New York','http://weather.noaa.gov/weather/current/KNYC.html'), ('London', 'http://weather.noaa.gov/weather/current/EGLC.html'), ('Tokyo', 'http://weather.noaa.gov/weather/current/RJTT.html')) # The maximum amount of data we are prepared to read, from any single page. MAX_PAGE_LEN = 20000 for name,url in citydata: # Open and read each web page; catch any I/O errors. try: webpage = urllib.urlopen(url).read(MAX_PAGE_LEN) except IOError, e: # An I/O error occurred; print the error message and exit. print 'I/O Error when reading URL',url,':\n',e.strerror sys.exit() # Pattern which matches text like '66.9 F'. The last # argument ('re.S') is a flag, which effectively causes # newlines to be treated as ordinary characters. match = re.search(r'(-?\d+(?:\.\d+)?) F',webpage,re.S) # Print out the matched text and a descriptive message; # if there is no match, print an error message. if match == None: print 'No temperature reading at URL:',url else: print 'In '+name+', it is now',match.group(1),'degrees.'
Here is the output produced by the client.
Example 2. Synchronous I/O client output
In New York, it is now 37.9 degrees. In London, it is now 46 degrees. In Tokyo, it is now 48 degrees.
|
On the brink of extinction, tigers need man as never before
Tigers are threatened by both habitat destruction and poaching.
Thu, Jun 10 2010 at 6:41 PM
HUNTED: Tigers are hunted for their prized coats, but poachers are also after the predators' bones, teeth, claws, whiskers and other organs used for traditional medicine. (Photo: ZUMA Press)
Nearly extinct, tigers can still be saved but efforts necessary for their survival face two huge obstacles: deforestation and the black market, where the big cats sell for $50,000 a piece.
A hundred years ago, they still numbered 100,000 and were spread across Asia, from India to China and passing through Russia. But today, even the most optimistic estimates find that only 3,500 tigers remain in the wild.
"Tigers are on a decline, they are threatened by habitat destruction and poaching," said Joseph Vattakaven, one of India's top tiger scientist.
The senior coordinator of Tiger Conservation for the World Wildlife Fund in India and a couple dozen other experts from Asia gathered at the National Zoo in Washington to exchange plans to preserve the species.
A symbol of power and ferociousness, the super predators are hunted down for their prized coat of dark vertical stripes over white and reddish-orange fur.
But poachers are also after the predators' bones, teeth, claws, whiskers and other organs used for traditional medicine and potions that allegedly boost sexual performance — think tiger penis soup — but also make a killing on the black market.
Most of the clients are in China, according to Vattakaven.
"We have to stop the demand in China. People are not aware of how many tigers are in danger," he said.
"Everyone must be involved. We need to involve people of local communities" near tiger habitats to put a stop to poaching practices, he added.
Among the ideas offered up at the gathering organized by the Global Tiger Initiative: creating specialized patrols well-versed in poaching techniques that could dissuade or apprehend poachers.
"Those are small groups with guns. With their presence only, they can frighten poachers." said Somphot Duangchantrasiri, a Thai forestry officer and head of the Khao Nang Ram Wildlife Research Station.
"But it's dangerous because the others got guns too. There were shootings and people were killed."
The sheer size of tiger habitats also present a major challenge.
In Russia, "the problem is that we have these vast areas, all those small roads; you have to control all the vehicles, which is virtually impossible," said Vladimir Istomin, the deputy head of a Russian government agency charged with protecting wildlife.
For the Global Tiger Initiative, the top priority remains halting poaching but next on the list is mitigating the man-made destruction of tiger habitats.
Cornered into divided territories, tigers are struggling to find prey and to reproduce.
The solution, some say, is to build protected pathways between the different lands the fierce creatures call home so that they may evolve without fearing man — and without man fearing tiger.
"We need connections between parks to exchange genetics" between tigers in a crucial move to preserve the species, Vattakaven pleaded.
Experts say the challenge is just as environmental as it is political, as they remain locked in a battle to convince governments at stake to add tiger conservation to their already heavy agendas.
But that's easier said than done.
Russian tigers live in a developing area with ongoing construction.
Copyright 2010 AFP Global Edition
|
July 31, 2007 > History
Niles, the subway center
Most of the people who live in Niles are proud to live there, but they probably do not brag about living in a "subway town." It is rather difficult to tell how many subways Niles has; it depends on when you count and how far out from Niles you look.
Originally there were two towns, Vallejo Mills, which became known as "Old Town," and the new railroad town named "Niles." The two towns were separated by railroad tracks which created some communication problems and dangerous crossings. There were several serious accidents through the years and many close escapes. A few buildings in "Old Town" were pulled across the tracks to Niles, but that did not solve the safety problems. The solution was by creating subways under the tracks, avoiding dangerous railroad crossings.
The first subway was a narrow structure under the Southern Pacific tracks to connect the road on Front (or Main Street) to Old Town (Vallejo Mills) and Niles Canyon. It was a county road built under a 1901 agreement with the Southern Pacific Railroad and the Spring Valley Water Company. Niles residents were jubilant because the tunnel was a much safer railroad crossing for horses and wagons. When trucks replaced wagons, the narrow and low 16-foot ceiling tunnel resulted in several accidents.
The Chamber of Commerce was discussing the need for a tunnel under the railroad tracks at the north end of town in 1909. Niles citizens petitioned the Board of Supervisors in June 1914 for a "tunnel to do away with the dangerous grade crossing." Supervisors appointed viewers for a tunnel site above the Essanay plant in July 1915. The request was granted and a spot chosen in December 1915 for the tunnel opposite Tom Sullivan's house. Railroad Commissioners approved the subway after listening to Chamber of Commerce delegates. Tom Sullivan donated the property and the subway was named for him.
The local paper reported that a force of men started work on the $38,000 subway in June 1916 to "connect the two strands of the State Highway on each side of the track." Costs were borne jointly by the Southern Pacific and Alameda County. The grading was soon finished and concrete work begun in July, but the subway was not completed until February 1917.
Subways continued to be a source of concern as noted in a 1931 news clip: "Baled hay to the roof in the Main Street subway under the Southern Pacific tracks slowed down traffic for several hours last Thursday morning. A south-bound truck and trailer dumped the hay when the load shifted on the trailer just at the foot of the grade in the north end of the subway."
The Chamber of Commerce continued their efforts to get warning bells at the railroad crossings at Thane's Corner and Morrison Avenue south of Alameda Creek. Railroad Commission Engineer R. C. Ashworth came to Niles, studied the crossings and reported that they were extremely dangerous." It was expected that a subway would be built at Thane's Corner, but it didn't happen for years.
Niles residents continued to be concerned about subways and railroad crossings, but they were faced with rumors and new concerns. Laura Whipple called the Southern Pacific Company about subway conditions in Niles and received a letter from F. L. Burckhalter dated February 10, 1936 that "plans have been completed for the construction of a new state highway located from five to eight hundred feet northeasterly of the present highway through Niles." The plans also meant that the subway for the Niles Canyon road would be moved south and built to handle larger loads and increased traffic.
Burckhalter closed his letter by saying, "I trust the fulfillment of these plans will take care of the undesirable situation to which you refer." He probably did not understand or care much about how the plans would affect the town of Niles.
Plans included a new subway for South Main Street, but they also rerouted State Highway Route 5 around Niles. Instead of going down Main Street south to the bridge over Alameda Creek, the highway would bypass the town in a large arc. The project, known as the "Niles grade separation and relocation project" included relocating about three miles of highway, constructing six underpasses and building a new concrete bridge over Alameda Creek.
The town of Niles continues to be served by subways. The Sullivan underpass serves as access to the Niles Canyon Railway and continues as a main entrance to Niles.
|
Ten kid-friendly foods with super-powers
If Kate Di Prima, paediatric nutritionist and author, was stranded on a desert island with a bunch of kids, these are the ten foods she'd like to have with her:
1. Baked beans
Baked beans have tons of yummy goodness that also provide a decent punch of nutrition and fibre. This palatable and easy-to-prepare entrant from the legume family is filled with anti-oxidants, protein, vitamins and minerals.
- Great in jaffles, on pizza and added to any stew, soup or casserole.
Eggs are “nature's little vitamin capsule,” says Kate, because they are so nutrient-rich, providing 11 different vitamins and minerals, high quality protein, healthy fats like omega-3 and important antioxidants. They are also super-tasty, convenient and can be eaten on their own or added to a meal.
- Beat eggs with a splash of milk to make a simple scrambled eggs for breakfast, make a fritatta with cooked vegetables, or make egg-y bread soldiers for afternoon tea.
Mother Nature's perfectly packaged spread, the avocado is a dream food for kids and adults. Here's why - in every 100g it contains 11 percent of the recommended daily intake of vitamin A, 11 percent of thiamine, 19 percent of riboflavin, 21 percent of niacin, 42 percent of vitamin C and 13 percent of magnesium, to name a few.
- Add to a banana smoothie, spread on crackers, make a dip or slice onto pizzas.
4. Tinned salmon
Fresh fish is great, but tinned fish goes the distance and can be pulled out of the pantry for a last-minute nutritious meal. Salmon has long been called a ‘super-food' because of its high omega-3 content - the added benefit of the tinned version is the soft little bones that are calcium-dense and can be eaten.
- It's the wonder food that can be added to pasta sauces, used as a filling for sandwiches and turned into a mornay.
- Try salmon patties.
“All berries are great,” says Kate, but in Australia strawberries are readily accessible and when they're in season, don't cost a fortune. Out of season, frozen berries also do the job. Plus they're jam-packed with goodness including vitamins A, C, K and B5 and B6, potassium, folate, riboflavin, and different types of antioxidants. They're also rich in manganese, potassium, magnesium, copper, and omega-3 fatty acids, and research has found they're very good for the boosting the immune system.
- Just eat, washed, straight from the punnet, or add to breakfast cereals, stir through yoghurt, or whizz into a smoothie.
A special treat that's a powerhouse of nutritional value, yoghurt helps your kids load up on calcium, protein and has all those good bacteria our tummies need.
- Add to smoothies, baked potatoes and serve with fruit.
It may be green but for some reason kids still like it. And it's a true super-food with studies suggesting it prevents cancer and keeps us healthy. Not only does broccoli contain antioxidants, including vitamin C, but it's a particularly good source of folate (naturally occurring folic acid) as well as the cancer-fighting phytochemical called sulphoraphane.
- Add florets to stir fries and casseroles, or steam then and blend into a yummy soup.
It doesn't matter that many kids don't fancy raw tomatoes because these ruby wonders are better for you cooked and processed. “The more you cook them, the higher in anti-oxidants they become,” says Kate. Research shows that the anti-oxidant lycopene found in abundance in tomatoes is more easily absorbed by the body if processed into sauce and paste.
- Make up Napoli sauces to stir through pasta and spread on pizza. Open a can of tomatoes and add to your stews and casseroles.
Wholegrains are loaded with fibre and a big suite of B vitamins. Kate advises to aim for the least processed wholegrains - and substitute where possible for highly refined grains like white flour and white rice.
- Use wholemeal pastas and breads where possible and choose wholegrain cereals. Try substituting wholemeal flour for white flour when cooking.
10. Lean red meat
There is no better source of easily absorbed iron for us human beings than red meat, says Kate. It is also a great source of vitamin B12, the anti-oxidant selenium and protein. And here's an interesting fact - half the fat found in lean meat is the heart-healthy monounsaturated and polyunsaturated kind.
- Lean mince can be turned into meatballs, burgers and bolognese sauce while little lamb cutlets are the perfect finger food.
Related healthy eating articles
This article was written by Fiona Baker for Kidspot, Australia's best family health resource. Fiona spoke to Kate Di Parma, a leading Australian dietitian and co-author of More Peas Please: Solutions for Feeding Fussy Eaters (Allen & Unwin, RRP $29.95).
Last revised: Monday, 9 August 2010
This article contains general information only and is not intended to replace advice from a qualified health professional.
- Do I have postnatal depression?
- Are your kids getting enough green time?
- 6 ways to reduce your risk of breast cancer today
- Being friendly with your breasts could save your life
- Sunscreen shock: Just how safe is sunscreen for our kids?
- Why mums need breakfast too
- Digestive distress: How to manage bloating, wind and cramping
- Phthalates in plastics: how safe are they?
- In a lather over sodium lauryl sulfate
- What's the fuss about parabens?
|
Mid-Side Explanations (Part 1)
Well what is Mid-Side? Surprisingly, the M-S technique is one of the oldest stereo recording methods. The theoretical basis for it appears in Alan Blumlein’s seminal 1934 patent, although it wasn’t until the stereo experiments of Danish State Radio engineer Holger Lauridsen in the 1950s that the technology caught up with the theory. Mid-Side which is short for middle side is usually combination of two microphones. A figure eight or bidirectional microphone (Side channel) with a directional microphone, cardioid, hyper cardioid, super cardioid and even sometimes omni (Mid channel). The microphones sit in a vertical array, one microphone on top of the other and are usually housed within a blimp or some sort of suspension system. This technique splits the center and side information into two channels. When the signal from both microphones is decodedyou can create a multi channel signal. You can read more about how MS works here
I suggest reading this and any future posts on the matter from Mychal. Check out his full post here.
|
Photo Credit: Robert Mount
SCIENTIFIC NAME: Farancia abacura
Subspecies: Farancia abacura abacura (Eastern) and Farancia abacura reinwardti (Western)
OTHER NAMES: Hoop snake, horned snake, and stinging snake
DESCRIPTION: Mud snakes are large aquatic snakes that attain lengths up to 80 inches, but generally are 40 to 65 inches in length. The scales of the mud snake are smooth, with a glossy black color on the dorsal and a bright red or pink and black checkerboard pattern on the ventral. The mud snake has a sharp point on the end of its tail. The mud snake is very docile and refuses to bite, but its habit of pressing the spine-like tip of the tail against the captor’s skin gives rise to the misconception that the mud snake can sting. Thus, the common nicknames “horned snake” and “stinging snake.” Southern folklore also holds that the mud snake can take its tail in its mouth and roll like a wheel, giving rise to the common name “hoop snake.” However, this snake is not capable of moving in this manner. Mud snakes range throughout the coastal plain from east
HABITAT: Mud snakes inhabit swamps, marshes, ponds, and slow moving mud-bottom streams. They prefer aquatic areas with heavy vegetation, like beaver ponds with swampy margins.
FEEDING HABITS: Adult mud snakes feed almost entirely on amphiumas and sirens. The presence and abundance of these chief components of the mud snake’s diet are required for mud snakes to survive. Juvenile mud snakes eat tadpoles, small salamanders, and fish.
Mount, Robert H. 1975. The Reptiles & Amphibians of
Conant, Roger and Joseph T. Collins. A Field Guide to Reptiles and Amphibians, Eastern and Central North America, The Peterson Field Guide Series, Third Edition. Houghton Mifflin Company. pp. 182
Florida Backyard Snakes www.floridabackyardsnakes.com/Easternmudsnake.htm
South Carolina Reptiles and Amphibians www.snakesandfrogs.com/scra/snakes/mud.htm
Nelson, David K. Personal observations and field notes
Author: Dave Nelson, Wildlife Biologist, Division of Wildlife and Freshwater Fisheries
|
It's easy to critique the works of others and get your work critiqued. Just follow the steps below:
1) Post your first piece.
2) You must then critique the work of another member to post another piece yourself.
3) For each critique you give, you earn 1 credit that can be used to post another one of your writings.
4) You can build up credits to be used at another time by giving critiques to others.
Our Daily Devotional
Place it on your site or
receive it daily by email.
TRUST JESUS TODAY
This article has been written for submission to a Christmas Magazine.
The HIStory of CHRISTMAS.
“Oh look! Santa and the reindeers on the roof,” said a little girl pointing to one of the thousands of light displays on the huge two-story house.
“There’s an angel!” exclaimed her sister.
“Look at the baby in the box.’ said a little toddler.
“Santa’s going down the chimney – look,” said a bigger boy.
“Do you want to put some money in the well Tommy?” asked the father of yet another family as hundreds of people milled round the illuminated house.
Little eyes sparkled with glee at the loud rumbling sound made by the coins as they rolled from the top of the well in ever decreasing circles until they fell into the hole at the bottom. The money would go to helicopter care flight.
Christmas! These celebrations have gone on for some 2,000 years because of a child born in a stable with only an animal feed box for a bed. What is the meaning of all this?
The Bible tells us it all began at the beginning of time with the first two human beings Adam and Eve. This information comes to us having been given direct to Moses from the mouth of the Living Creator God some three-and-a-half thousand years ago. God, the eye witness, created them as adult people in His own image and later told them to increase and multiply after their own kind. They were created perfect and lived in a perfect universe. God couldn’t create anything less or He wouldn’t be God. They were vegetarians as were all the animals including the dinosaurs. Death, decay and disease were not part of this perfect world. The Apostle Paul stated in his letter to the Romans, no death before Adam sinned. Sin came into the world through Adam, and death came through sin he wrote.
Because God does not want us to be robots he gave us the ability to choose. Unfortunately Adam chose to do things his own way instead of God’s way thus death and decay entered the world just as God had warned. The meaning of the Hebrew word for death in this verse of Scripture means dying, dying, dying until eventually you are dead. Our English doesn’t have a matching word. So on the very day Adam disobeyed God he and Eve began to decay (die) physically and they did die spiritually. Also the first death happened that day too because God killed an animal (or two) to make clothing for Adam and Eve. This was the first sacrifice.
God’s Word also tells us that all people are descended from Adam and Eve and are born in Adam’s image with a bent to go their own way instead of God’s way. However Adam and Eve were privy to God’s promise to send someone to put it right – a second Adam, one not made of the dust. This hope lived on down the generations until God chose one nation to carry His message. Every nation knew of the God of the Jews. The Jews, being in Adam’s image too, were bent on going their own way so God scattered them.
After God brought them back to the country He gave them, there began a period of some five hundred years of silence from the Living God to His creation. The silence was broken when certain angels brought messages; first to Zechariah, then the Angel Gabriel to a young virgin Jewish girl named Mary and to Joseph who after the birth of Jesus became Mary’s husband. The message to Mary was that the Creator God who called the universe into being, would “overshadow her” and she would conceive a son who would be the Saviour of the world – the man not made from dust. The next angelic appearance came when first one angel then a sky full of them, informed certain shepherds of the birth of the long awaited Messiah, the King of the Universe. Yes, God Himself was born in human flesh to save humankind by taking the punishment of Hell that they rightfully deserved and so set them free. We don’t have to reach up to find God because He came down to us. Now isn’t that something to celebrate? Don’t take my word for it read it, you read it.
If you want God’s gift of a new life – physical and spiritual – that Christ Jesus bought for you, acknowledge your bent to go your own way instead of God’s way, ask for forgiveness and receive His Holy Spirit. At this point God becomes your friend and confidant forever and in the New Kingdom God promises a body that will never die. Perfection will again be restored. Jesus will return to take us to His Kingdom soon. We don’t know what time or what day (or year) but we must keep ready by daily seeking Him.
Perhaps you believe science has proved the Bible wrong? Read ‘HIStory and Science’ in this issue.
The opinions expressed by authors may not necessarily reflect the opinion of FaithWriters.com.
REMEMBER, this is a Critique Circle. Please try to give a critique to receive a critique. If you do not want to give any critiques, you can use the REGULAR ARTICLE SUBMISSION area. If you are unsure about how to critique, please use the CRITIQUE GUIDELINES and CRITIQUE TIPS.
To view your critiques that you receive on any writing, login to your account and click "CRITIQUE CIRCLE MANAGEMENT" to view all of your critiques and edit each piece. Then, click "VIEW CRITIQUES" next to the article title to view critiques on that piece. Comments on all of your writings when using the Critique Circle will not be displayed publicly as regular and writing challenge articles. They can only be viewed by accessing them from your account.
|
Lewis Carroll's Alice's Adventures in Wonderland and its sequel, Through the Looking-Glass and What Alice Found There, are two of the most famous nineteenth-century children's fantasy novels. In fact, these books inaugurated a new era of children's literature in English: books that didn't have to be didactic or moralistic, that didn't teach children lessons. Books that simply created imaginative worlds in which children could let their minds roam free. The result was a style of writing that simultaneously embraced nonsense and logic. While other Victorian books for children – like Tom Brown's Schooldays and the works of Mary Louisa Molesworth and Mary Martha Sherwood – gave rules for living, these books simply provided space in which to live.
Without the curiosity, fantasy, and downright silliness of the Alice books, children's literature might not have branched out into the world of the imagination. Wonderland and Looking-Glass paved the way for many of the books that children and adults enjoy today – The Spiderwick Chronicles, the Harry Potter series, the Chronicles of Narnia, and so on.
The author of the Alice books, Lewis Carroll (the pen-name of Charles Lutwidge Dodgson) was a shy math professor at Oxford. To entertain three of his favorite "child-friends," he began telling the stories that eventually developed into the Alice books. Although one of the original audience members was the real-life Alice Liddell, the stories that Carroll composed for her (and her sisters') amusement have broad appeal for all readers, children and adults, from the nineteenth century until the present day.
The Alice books, sometimes combined or referred to with the abbreviated title Alice in Wonderland, have been adapted numerous times into films (both live action and cartoon), plays, and musicals. The books also provide a rich shared mythology for our culture. Because of the Alice books, Neo can "follow the white rabbit" to discover the truth about the Matrix, the Who can sing a psychedelic song about the White Rabbit, and we can all enjoy the strangely comprehensible nonsense of "Jabberwocky." Heck, anything that results in an amusement park ride where you get into a teacup is appealing to us.
So you want to know why you should care about Alice's Adventures in Wonderland and Through the Looking-Glass? Well, hold on just a moment while we ask you some questions. Seriously – keep a tally of your answers for us. They're just simple yes-no questions. Here we go:
|
200 Years. 200 Stories. Story
99: “VIREO Beginnings
Crawford H. Greenewalt's high-speed photograph of a Black-breasted Plovercrest (Stephanoxis lalandi) as it is about to land on a perch (© C. H. Greenewalt/VIREO).
The year was 1979, and history was in the making when Crawford H. Greenewalt generously offered his collection of bird photography to the Academy. With its prized shots of birds in flight, Greenewalt’s collection became the starting point for the Academy’s Visual Resources for Ornithology (VIREO), the most comprehensive bird image bank in the world. These 9,000 photos, taken primarily in North and South America, Africa, and the Caribbean, form the nucleus of VIREO, which today provides a centralized and well-curated collection of avian photos for scientific and public use. There are more than 85,000 images in VIREO’s online bird image database, and it’s growing rapidly.
Greenewalt’s high-speed images of hummingbirds were the best of his time. His connections with Harold Eugene “Doc” Edgerton, a pioneer in multiflash strobe photography, and Victor Hasselblad, the iconic developer of medium format cameras, granted him access to cutting-edge technologies then inaccessible to most photographers. Greenewalt worked directly with these experts to develop the innovative equipment he needed to take stop-action motion shots, freezing one instant of movement in time. His techniques were so good that he was even able to capture ever-moving hummingbirds. From their home in VIREO, these remarkable images have been accessed for use in books, magazines, field guides, and other important works.
See some of Greenewalt’s photos, and view other beautiful images from our VIREO collection.
|
Avoid the dirty dozen
According to the Environmental Working Group there are 12 fruits and vegetables that should always be purchased organically in order to avoid ingesting pesticides. Known as the "dirty dozen," these fruits and vegetables are ones that are eaten whole or with the skin. Fruits and vegetables that are peeled or have thicker skins have a decreased risk of passing pesticides on to the consumer.
Always buy organic varieties of these 12 fruits and vegetables:
- Imported Grapes
- Bell Peppers
Another tip: Buy in-season fruits and vegetables, which will likely be locally produced or at least not imported from countries who don't have strict organic standards. In-season fruits and vegetables are also typically cheaper than produce that is shipped in.
Opt for safer salads and greens
A recent report from the nonprofit agency Consumer Reports found almost 40 percent of bagged or packaged salads from 16 brands (including organic varieties) were contaminated with bacteria that is a common indicator of fecal contamination. Packaging puts all produce at a higher risk of contamination (and makes it more expensive compared to unpackaged), so opt for fresh bunches of greens and heads of lettuce as opposed to prewashed or triple-washed packaged greens.
Is your salad safe?
Although the only leafy green on the "dirty dozen" list is spinach, other greens like lettuce, kale and arugula should be purchased organically – and not packaged – because they are frequently contaminated with pesticides. Additionally, tomatoes are another salad ingredient to purchase organically to minimize your exposure to chemicals.
Support your local farmers
If you are purchasing produce from a farmer's market, the best way to determine if it is organic is to ask the vendors, who will likely be the farmers who grew the produce. They will be more than happy to explain how they grow their fruits and vegetables and can let you know if their produce is organic.
Read the labels
When you are buying produce in a grocery store, fresh fruits and vegetables don't come with a nutrition label as you find on packaged foods, but produce does come with a sticker. Although most grocery stores have signs designating organic produce, you can also look at the numbered sticker on the item to make sure you are buying organic.
Here are the meanings behind the numbers:
- Numbers beginning with 9 are organic
- Numbers beginning with 8 are genetically engineered produce (GMO)
- Numbers beginning with any other number (typically 3 or 4) are conventionally grown
Reading labels is important regardless of the type of food you are buying.
Fruits and vegetables that have hardy exteriors and are peeled before consumption have a decreased risk of passing pesticides on to you and your family.
Produce you can buy conventionally:
Buy as much organic produce as you can afford and certainly opt for organics when buying any of the "dirty dozen." When cost is an issue, though, opt for conventional buys of these 12 fruits and vegetables because they will be the least contaminated.
Wash your produce
Organic and conventionally-grown fruits and vegetables should be washed well before consumption. This even includes the produce you peel; you can transfer bacteria from the outside of a fruit or vegetable to the flesh when you cut it with a knife.
Want more organic food tips? Read on
|
The question of how cod stocks fell so low in the waters off New England is almost as perplexing as the question of how to bring about recovery.
The favorite reason - too much fishing pressure - is followed by other explanations, including changes in ocean temperature and degradation of the environment. Perhaps it is a combination of these things.
Pinpointing the cause or causes of plummeting cod stocks is key to their rejuvenation.
But four major parties concerned with the question - scientists at the National Marine Fisheries Service, regional fisheries managers, environmental conservation groups and commercial fishermen - rarely agree. The debate is heated at times.
Adding an edge to the debate is the knowledge that had fish stocks been managed properly in recent decades, there would be more than enough for the commercial fishermen.
"If these stocks were rebuilt there would be such great economic benefit," declared Lee Crockett, executive director of the Marine Fish Conservation Network in Washington, D.C., a coalition of more than 170 national and regional environmental organizations concerned with the future of the ocean's resources.
"How do you get there? The fishermen are concerned that any reduction will drive them out of business," he said.
The reauthorization of the Magnuson-Stevens Fishery Conservation and Management Act, a program of resource management adopted by Congress in the mid-1970s, has set a goal of 217,000 metric tons of living Georges Bank cod, or biomass. Scientists estimate there were 22,564 metric tons of cod on Georges Bank in 2004.
Originally written to address concerns of overfishing by foreign fishing fleets, the Magnuson Act is now concerned with the U.S. management of its fish resources.
Fred Serchuk, a scientist with the National Marine Fisheries Service, believes if the 217,000-metric-ton goal is achieved, commercial fishermen could harvest 35,000 metric tons of cod a year without injury to the fishery - three times what was landed in the year 2001.
For decades, scientists, managers, fishermen and conservation groups have been grappling with how best to preserve and rebuild cod stocks.
Scientists with the National Marine Fisheries Service are charged with assessing the health of ocean fish stocks.
Fisheries managers are responsible for shaping a plan that allows fishermen to harvest stocks without depleting the resource.
Fishermen go to sea and try to earn a living wage from their work.
Conservation groups focus on protection of the resource, and are often willing to challenge plans advanced by government scientists, fisheries managers or commercial fishermen.
So far, fisheries managers have concentrated on reducing fishing pressure, both by closing areas of the ocean to fishing and by limiting the amount of time that commercial fishing vessels can spend at sea. Unsurprisingly, both approaches have proved unpopular with fishermen.
On July 14, fisheries managers and scientists met in Woods Hole to talk about better protecting ocean floor habitat and to develop workable closures.
One approach, advocated by the Conservation Law Foundation, calls for the creation of Habitat Areas of Particular Concern, the ocean equivalent of sanctuaries.
David Pierce, the deputy director of the state Division of Marine Fisheries, said meeting participants agreed on specific areas to protect.
There is growing evidence that the practice of dragging harms areas where plants and seaweed grow on the bottom.
Every time a dragger drops its net into the ocean, the vessel pulls two 1,000-pound doors along the bottom. The doors spread the net outward.
"Bottom trawling and scallop dredging is tearing up important habitat," said Mr. Crockett of the Marine Fish Conservation Network. "If this were happening on the land, you could fly overhead in an airplane and see that habitat is being destroyed. You'd say ‘Oh, my God.'" He continued:
"With the land it is a big issue, people understand. But the ocean is different, you can't see. You have to be Jacques Cousteau to see what is happening down there."
Mr. Pierce said areas south of the Vineyard have been targeted for protection. Other areas have been pinpointed along the northern edge of Georges Bank.
"Ideas have been brought forward by the Conservation Law Foundation and the World Wildlife Fund of Canada. They are proposing Habitat Areas of Particular Concern south of the Vineyard. These areas are historically already known as places where cod have congregated," he said.
"The point of our proposal is that we ought to protect the places where you find juvenile fish," said Priscilla Brooks, director of the marine conservation program with the Conservation Law Foundation, a group that has actively pursued responsible management of fish stocks.
Submitted at the end of April, she said, the proposal is based on data from trawl surveys.
If adopted, the closures would not take place until 2008.
Scientists report two kinds of cod live in the waters on and around Georges Bank. There are cod that spawn in the deeper ocean and those that spawn closer to shore. If the Conservation Law Foundation has its way, more inshore cod will be protected.
"We have evidence cod actually go to nursery areas close to shore," said Paul Diodati, director of the state Division of Marine Fisheries. "One of these aggregations is in the Massachusetts Bay area. We have evidence of large concentrations of cod coming into these same areas over and over again."
Mr. Diodati said similar populations might exist in the waters south of Cape Cod.
Another possible fishery revival technique is a special net that would take haddock rather than cod. Both species share the same Georges Bank habitat.
"We have to work out ways to enable fishermen to fish for haddock, which is abundant, without catching cod," Mr. Pierce said. "What we are using now is a net called a haddock separator."
But he said results so far have not been promising.
"Early indications are that the net is either not working or fishermen are purposely not making it work," he said. "The net is supposed to allow the fishermen to get four haddock to every cod; but if they are getting three haddock to one cod, that has serious implications."
Mr. Crockett said the government must also explore industry management methods similar to those used in agriculture markets.
"Our concern is that the political response has always been to weaken the conservation requirement," he said. "I think it would be more beneficial if the politicians helped these fishermen deal with the economic consequences."
Under one proposal the government could offer fishermen money to sell and scrap their boats, or pay them not to go fishing.
But members of the commercial fishing industry want exactly the opposite. They are calling on regulators to lower the 217,000-metric-ton goal, saying that conservation measures cannot possibly bring about that kind of recovery. A reevaluation has been scheduled for 2008 as part of the Magnuson Act's groundfish management plan.
Among the commercial fishermen faulting the management scheme is Robert Lane of New Bedford, who owns two fishing boats.
"I think it is cyclical," he said of the fisheries. "Years ago, when I went fishing, we never saw haddock. I fished the shoals and never saw much. Now the haddock are in huge abundance. I wonder how reliable their science is."
Paul Howard, executive director of the New England Fishery Management Council, also notes that warmer water found in recent years at Georges Bank has pushed cod away.
Mr. Crockett continues to see overfishing as the main culprit.
"We hear the constant refrain from the fishing community that the scientists are wrong and that there are more fish out there," he said.
But Mr. Crockett said as long as there are fishermen out there trying to catch the last cod, there will be someone willing to pay for it, and the decline is inevitable.
|
Anax is an ancient Greek word for "king". It is one of the two Greek titles traditionally translated this way, the other being basileus, which also translates as sovereign. Anax can be interpreted more accurately as "high king".
The word anax derives from the stem wanakt-' (ϜΑΝΑΞ, ϜΑΝΑΚΤΟΣ), and appears in the Mycenaean language, written in Linear B script as wa-na-ka (). The digamma was pronounced /w/ and was dropped very early by eastern Greek dialects (e.g. Ionian).
The word Anax in the Iliad refers to Agamemnon (ἄναξ ἀνδρῶν, i.e. "Commander-in-Chief") and Priam, kings who exercise overlordship over other kings. This possible hierarchy of one "anax" exercising power over several local "basileis" probably hints to a proto-feudal political organization of Bronze Age Greece. The Linear B word wanakteros (wa-na-ka-te-ro), meaning "royal", and the Greek word anaktoron (ἀνάκτορον), meaning "palace", are derived from wanax. Anax is also a ceremonial epithet of the God Zeus ("Zeus Anax") in his capacity as overlord of the Universe, including the rest of the Gods. The meaning of "king" of basileus in Classical Greece is due to a shift in terminology that took place during the Greek Dark Ages. In Mycenaean times, a gwasileus appears to be a lower-ranking official, while in Homer, Anax is already an archaic title, used for legendary heroes and gods rather than for contemporary kings.
The Greek title has been compared to Sanskrit , a word for "merchant", but in the Rigveda once used as a title of Indra. The word could then be from PIE *, roughly "bringer of spoils" (compare the etymology of lord, "giver of bread"; compare also the Vanir).
In modern Greek the term is still in use in the description of the royal palace i.e. anactora meaning "The mansion of anax".
|
What is a Hoof Abscess?
Hoof Abscesses are an internal infection of the horses hoof causing pressure and discomfort.
There are many ways a horse may contract a hoof abscess and it is not an uncommon occurrence in the horse world. A qualified farrier or veterinarian should be called in to diagnose.
Quite often a hoof abscess may be seen from underneath the hoof in the form of a darker area that can ooze a blackish pus-like substance with pressure. Not always is the hoof abscess near to the surface of the sole, and may occur in the cracks and fissures of an unhealthy white line as well.
A few ways a hoof abscess may be contracted:
- Tragic Insult - For example, sharp object peircing the hoof sole.
- Unhealthy Hoof - allowing foreign material to bury itself into the whiteline/surround areas.
- Hoof Diseases - Often a horse with Laminitis will be prone to Abscessing due to internal swelling and destabilization within the hoof.
Treating Hoof Abscesses in Horses.
To properly treat a hoof abscess a qualified professional is always recommended for diagnosis. With the proper treatment, a hoof abscess will usually be cleared up with no further problems.
Treating an equine hoof abscess can be done through the use of a "Hoof Abscess Tool" that is designed especially for drilling into the infected area of the hoof, leaving the rest of the uninfected hoof untouched. This hoof abscess tool is a much better alternative to "pairing away" with the hoof knife.
Creating a hole an eigth of an inch in size using hand power, the hoof abscess tool is the solution for creating a precise drainage hole. By drilling into the infected area of the equine hoof, an opening will be provided for the "pus" to escape.
Further treatment requires bathing and poulticing procedures. Bathing can be done with warm water and epsom salts. Poulticing can be done with a wet bran/epsom salt mix applied in the corner of an old feed bag or disposable diaper - wrapped and held with duct tape.
It must be stated, that a professional must be the one doing the drilling, as a horses hoof is a very complicated and sensitive structure. The horse owner can maintain the baths and poulticing regiment - a very important part of the healing process.
Not every hoof abscess is treatable and may sometimes need to run its course. This usually involves off and on lame symptoms ranging from a couple of weeks to a few months; Until the foreign material "blows" it's way out of the hoof wall near the coronet band. An unnerving experience for the horse owner, yet usually not an overly serious problem for the horse hoof once it has finished.
Written By: Josh Emsley
|
Welcome to Lakeridge Elementary’s Global Reading Challenge Blog
Global Reading Challenge is a competition in for schools in partnership with the King County Library. Itchallenges students to read 10 books and answer questions about them in teams. To prepare for this challenges teams are practicing writing and answering sample questions. Click here to go to the library’s official site and find out more about this year’s Global Reading Challenge.
This blog is intended to build collaboration as students get ready for the competition. To use this blog, click on a book, click comments to add your question. (Remember to only use first and last initial in the name section; no email address.) Then read potential questions posted by other students. Quiz yourself and look back in your book to find out the answers you are unsure of. Work with your team to ensure you have amazing recall of all the books’ details!
|
The Junior Zookeeper Program allows children aged 11 to 17 a wonderful opportunity to learn about a variety of animals at the Zoo, and to share their knowledge with the public. We have revamped the 2013 program to provide even more opportunities for teens to broaden their experiences. The program is now three-tiered, divided up according to years of experience at the zoo and individual abilities. The Junior Zookeeper program has proven to be a great way for kids to learn responsibility, build leadership and time management skills, gain self confidence, and get some quality time with animals.
Members of the Junior Zoo Crew will learn how to care for the animals within the Contact Area, keep the area clean, and interact with the public, answering questions about the animals. They will also help clean the glass of other exhibits (old meerkat exhibit, crane, prairie dogs, red pandas and tanukis). Junior Zoo Crew Members will assist 2nd years with the Edu-Carts, and be available to face paint, help with summer camps and participate in Show and Tails.
Zoo leaders have at least one year previous experience as a Junior Zookeeper. Teens will have a higher level of responsibility and will be trained as Junior Docents. They will supervise members of the junior zoo crew, help with the Contact Area and exhibit cleaning, and help with diet prep. They will run the live animal components of the Edu-carts as well as help the 3rd years come up with educational activities for the public. They can also help with summer camps and participate in Show and Tails.
Wolf Pack Members must have at least 2 years previous experience as a Junior Zookeeper. Members of the Red River Wolf Pack have the most experience within the Junior Zookeeper Leadership Program and in turn have the highest level of responsibility. Not only will they be leading their own activities, but they will be supervising the lower years, as well as working with the older Wildlife Explorers and Zookeepers to help them complete their tasks at the zoo (animal husbandry, diet prep and enrichment projects). They can also help with summer camps and participate in Show and Tails.
* All teens can expect to assist with the zoo’s special events by running activity centers or leading interpretive stations*
Here are just some of the things a Junior Zookeeper will do:
This includes assuring the public has an enjoyable experience in the contact area, and that the animal interaction is comfortable and fun for the animals too. Juniors assist the Zookeepers in keeping the area clean for the animals and the public, grooming the animals and monitoring the animals well being.
This weekly story time includes Juniors reading a story to zoo visitors that features animals from the Red Rive Zoo and around the world.
Juniors will be trained to handle and present education animals to the public assisted by the Education Director. Edu-carts are portable stations set up around the zoo meant to bring the public in close contact with live animals and teach the about a variety of topics through hands-on activities.
The Zoo garden helps feed the Zoo’s many animals in the Fall. Juniors design and plant the garden and tend to it during the summer.
Face painting is a fun way to engage younger children visiting the Zoo. Junior Zookeepers have the opportunity to work in the carousel pavilion face painting station on busy days.
To enroll your child in the Junior Zookeeper Program, please complete the Application and Recommendation Form and mail it to:
Red River Zoo
4255 23rd Ave S
Fargo, ND 58104
Deadline for applications is May 15, 2013. This popular program fills up quickly, so please send in your application as soon as possible. Call 701-277-9240 or email email@example.com with any questions.
|
Readership: A research level text suitable for graduate level students as well as professional researchers in ecology, parasitology, epidemiology, evolutionary biology, and conservation biology.
Frédéric Thomas, François Renaud, and Jean-François Guegan
"The book is well-written and produced...highly recommended." - Parasitology, Volume 132 - 2006
"It is an introductory, but penetrating, anecdotal and readable, yet packed with well chosen examples and illustrations of principles...This is an account that will appeal to ecologists of all backgrounds and does not assume any deep knowledge of parisitology. Combined with its readable text abd rich supply of examples this makes it ideal as an introduction to the subject for undergraduate students. Peter Moore, Bulletin of the British Ecological Society 2006, 37:1"
Peter Hudson: Introduction: Parasites, diversity, and the ecosystem
1: Michel Loreau, Jacques Roy, and David Tilman: Linking ecosystem and parasite ecology
2: J.-F. Guégan, S. Morand, and R. Poulin: Are there general laws in parasite community ecology? The emergence of spatial parasitology and epidemiology
3: Anders Pape Møller: Parasitism and the regulation of host populations
4: Michael V.K. Sukhdeo and Alexander D. Hernandez: Food web patterns and the parasite's perspective
5: Robert Holt and Thierry Boulinier: Ecosystems and parasitism: the spatial dimension
6: Richard C. Tinsley: Parasitism and hostile environments
7: Kevin D. Lafferty and Armand M. Kuris: Parasitism and environmental disturbances
8: Frédéric Thomas, Michael B. Bonsall, and Andy P. Dobson: Parasitism, biodiversity, and conservation
9: Sam P. Brown, Jean-Baptiste André, Jean-Baptiste Ferdy, and Bernard Godelle: Subverting hosts and diverting ecosystems: an evolutionary modelling perspective
10: François Renaud, Thierry De Meeüs, and Andrew F. Read: Parasitism in man-made ecosystems
Gary G. Mittelbach: Conclusion: Parasites, communities, and ecosystems: conclusions and perspectives
|
Use the free Adobe Acrobat Reader to view a pdf file of this article
Monetary Regimes and Inflation Targeting
Enzo Croce and Mohsin S. Khan
Inflation targeting—a framework for monetary policy that commits the central bank to achieving low inflation—has enjoyed considerable success among industrial countries in helping to maintain price stability. Developing countries may also benefit from this approach, which enhances transparency and compels policymakers to deepen reforms.
Backed by experience and strong empirical support, academics and policymakers alike agree that high inflation (and its associated high variability) distorts decisions private agents make about investment, saving, and production and ultimately leads to slower economic growth. As a consequence, during the last 15 years or so, a growing number of countries have granted institutional independence to central banks and statutorily committed them to aim monetary policy primarily at achieving some form of price stability.
Rules versus discretion
After years of high inflation, the world entered a period of price stability in the 1990s, not only in the industrial world but also in developing countries. Central banks have helped this favorable trend by moving increasingly toward announcing the future course of key nominal variables as a way to influence inflationary expectations. Such announced intermediate targets (or rules) help improve policy credibility by limiting the central bank's incentive to exploit short-run trade-offs between output movements and inflation, which could otherwise give rise to an inflationary bias. Operationally, the relevance of these intermediate targets is twofold: they prevent domestic or external shocks from leading to permanently higher inflation; and they make the long-term commitment to price stability more concrete. In short, these targets act as nominal anchors, committing central banks to implement consistent policies, while providing a transparent yardstick the public can use to monitor policy implementation.
Targeting the exchange rate or monetary aggregates?
Traditionally, intermediate targeting has involved a preannounced exchange rate rule or targets for a specific monetary aggregate. Under the exchange rate rule, monetary policy is severely limited, because it is directed only at the exchange rate, thus constraining the ability of the central bank to respond to domestic or external shocks. By contrast, for countries with flexible exchange rate arrangements, monetary aggregates become the intermediate target for monetary policy. This type of regime is commonly referred to as monetary targeting. Under this system, the central bank moves its instruments (for instance, interest rates) to control monetary aggregates, which are considered the main determinants of inflation in the long run. Thus, controlling monetary aggregates would be equivalent to stabilizing the inflation rate around the target value. Obviously, the ability of monetary aggregates to function effectively as intermediate targets is based both on the stability of their empirical relationship to the goal variable (the inflation rate) and on their relationship to the instruments of monetary policy.
While most developing countries adopted some form of exchange rate targeting following the breakdown of the Bretton Woods arrangement in the mid-1970s, two-thirds of these countries currently follow more flexible exchange rate arrangements. Nevertheless, a number of developing and transition countries continue to maintain fixed or quasi-fixed exchange rates, and some previously high-inflation economies (for example, Argentina since 1991 and Brazil during 1994-98) have effectively used pegged rates to reduce inflation quickly. However, with the growing integration of world capital markets over the past two decades and the increased volatility of capital flows since the 1992 European Monetary System (EMS) crisis, and especially after the more recent financial crises in Asia and Latin America, the conditions for maintaining a fixed exchange rate system have become much more demanding. As a consequence, developing and transition economies that still maintain a fixed exchange rate as a nominal anchor for monetary policy are coming under mounting pressure to move either toward more flexible arrangements or to the other extreme of the spectrum, such as currency boards or full-fledged dollarization.
Industrial countries—with the notable exception of EMS members in their arrangements with each other—have traditionally favored more flexible exchange rate arrangements in the post-Bretton Woods era, with the majority opting for some kind of monetary targeting regime. However, during the 1980s, countries' experience with monetary targeting became unsatisfactory. As financial institutions developed money substitutes, the demand for money became increasingly unstable, and it became apparent that, although highly correlated in the long run, money and inflation were not sufficiently correlated in the short run. As a result, in the early 1990s, several Organization for Economic Cooperation and Development countries—first New Zealand, then Canada, Israel, the United Kingdom, Australia, Finland, Spain, and Sweden—adopted explicit inflation targeting as a strategy for conducting monetary policy.
Operational aspects of inflation targeting
Inflation targeting is a monetary policy framework that commits the central bank to achieving low inflation. The process usually starts with a joint public announcement by the central bank and the government (usually the ministry of finance) of an explicit quantitative target for inflation to be achieved during a specified time horizon—for example, 2 percent inflation a year during the following two years. Then, the central bank—which must be free to choose how it will set its instruments ("instrument independence")—is responsible for achieving this target and should provide regular public information about its strategy and decisions. This commitment to transparency helps reduce uncertainty about the future course of monetary policy while enhancing central bank credibility and accountability.
Inflation targeting has been described in the literature as a "framework for conducting monetary policy under constrained discretion." It relies on rules, since the adoption of explicit targets requires a commitment by the central bank to policy consistency. At the same time, it leaves at the central bank's discretion the decision about how to deploy its instruments, which allows for some flexibility in responding to unforeseen domestic and external shocks.
A typical inflation-targeting central bank sets its instruments—say, interest rates—today at a level that will bring inflation forecasts—for, say, inflation one or two years ahead—close to the inflation target at that future time. Inflation forecasts act as an intermediate target; the discrepancy between the forecast and the inflation target prompts policy choices to close the gap. This forward-looking approach is obviously desirable, given the long and variable lags between changes in the monetary instruments and their impact on the ultimate policy goal. By contrast, responding to past or current inflation would imply that policy is always reacting too late, increasing the likelihood of greater variability of inflation and output.
In practice, the central bank usually decides on the future course of monetary policy after assessing the information provided by a number of indicators, such as inflation forecasts provided by structural macroeconomic models, forecasts produced by more mechanical approaches—like vector autoregressive models—and surveys of market-based inflation expectations. The monetary authorities also consider developments in key monetary and financial variables, such as money and credit, the term structure of interest rates, asset prices, and labor market conditions. To the extent that more than one of these indicators suggest that future inflation is likely to exceed the target, the need to activate instruments becomes more evident.
Transparency under inflation targeting
Monetary policy is more efficient when markets understand policy objectives and the links between monetary policy measures and these objectives. Also, transparency plays a key role in conveying to market participants the idea that central banks are accountable for their results, which, in turn, has the potential of increasing discipline in policy design and implementation. To the extent that policy objectives, including intermediate targets, are publicly announced, transparency is also present under monetary targeting. However, proponents of inflation targeting claim that their approach maximizes transparency and open communication. For one thing, it is easier for the general public to understand the explicit announcement of inflation targets than the growth rate of particular monetary aggregates. Also, since the costs of inflation arise not only from its level but also from its variability, explicit inflation targets, by reducing uncertainty about the future course of inflation, improve saving and investment decisions, thus enhancing overall productivity. In addition, clarifying the central bank's intentions may help reduce volatility in financial markets, with the attendant beneficial effects of lowering risk and exchange rate premiums.
Obviously, central banks can build credibility when they establish a good track record by hitting the announced inflation targets. In this context, all central banks engaged in inflation targeting release periodic monetary policy reports, or inflation reports, indicating central banks' intentions for the future course of monetary policy, as well as explaining discrepancies between actual and targeted inflation rates. To improve the public's understanding of the central bank's reasoning, these reports also contain a description of how inflation forecasts are generated (including an assessment of upside and downside risks), as well as an indication of how the central bank would react to a relevant set of contingencies. This advance notice reduces the likelihood that the central bank's reaction to these contingencies will be misunderstood.
Additional implementation issues
Implementing inflation targeting requires the authorities to make several key decisions. First, they need to establish which measure of inflation to use. The two natural options are the consumer price index (CPI) and the GDP deflator. Although the latter measure is appealing because it more fully reflects the notion of "domestic" inflation, the CPI has clear operational advantages: it is the index most familiar to the public; it is usually available on a monthly basis and in timely fashion (and thus can be monitored regularly); and it is seldom revised. An additional and important issue is whether monetary policy should target all movements in inflation, or whether short-term fluctuations that are considered exogenous should be excluded. Most inflation targeters focus on the underlying or core inflation. This measure excludes from the CPI items subject to idiosyncratic price changes arising from supply shocks, such as energy and food (a few countries have also excluded onetime price changes originating from increases in administrative prices and in indirect taxes). Adopting a target for core inflation implies that monetary policy would accommodate only the first impact of these price increases, but not second-round effects resulting from the wage-price spiral.
The second issue is to decide on the target level of inflation. Most low-inflation industrial countries have chosen inflation targets of 1-3 percent. It is generally recognized that higher inflation rates have adverse effects on growth and may generate welfare and efficiency costs as well. But an inflation target of zero is not desirable either. For one thing, the presence of downward rigidities in nominal wages and prices would call for a positive rate of inflation to allow for needed changes in real wages and other relative prices. Zero inflation targets would also leave no room for real interest rates to become negative during the business cycle, if this were required. Indeed, the recent Japanese experience indicates the need for achieving negative real interest rates to stimulate aggregate demand. Certainly, one of the advantages of inflation targeting is that it can prevent deflation by offsetting the effect of systematic, negative shocks to aggregate demand. In this sense, this regime treats inflation and deflation symmetrically: monetary policy should become more restrictive (expansionary) if actual inflation is systematically above (below) the inflation target.
A third issue is whether to adopt an inflation target point or target ranges—that is, inflation targets with predetermined ranges or tolerance bands. Owing to the difficulties in predicting inflation, as well as the uncertainty surrounding the precise time frame of the monetary transmission lag, point targets are more likely to be missed, with the attendant cost to credibility. Also, point targets may require greater fine-tuning of monetary policy to minimize the probability of their being missed.
Target ranges, on the other hand, require a decision about the band width. Bands that are too narrow suffer from the same drawbacks as target points. But bands should not be too wide either, because as the probability of compliance increases with the band width, the usefulness of the targets to affect expectations decreases. Despite these problems with target ranges, however, with only a few exceptions, central banks using inflation targeting have selected them over target points.
The fourth issue is the choice of policy horizon—that is, how fast the decline of the target path should be. In practice, if the initial level of inflation is much greater than desired, then the speed with which policy moves inflation toward the target depends on an assessment of the transition costs of disinflation. A gradual approach to disinflation may be preferable in the presence of long-term contracts, lagged adjustment of inflation expectations, and lack of full credibility. At the same time, the need to break up the inertia of inflation expectations and build up credibility would suggest a more rapid disinflation. Naturally, if the inflation rate is already near optimal levels, the policy framework should aim at maintaining it indefinitely.
The record of inflation targeting so far
To date, the inflation performance of inflation targeters among industrial countries appears promising. Indeed, the focus on price stability has contributed to a remarkable convergence of inflation rates among these countries. To be fair, the generally benign international economic environment in recent years and the process of international integration have contributed, in part, to this convergence. It is not clear whether these developments, by themselves, will continue to ensure a continued low inflation trend, and some observers say that inflation targeting has not yet been tested over a full business cycle. However, inflation targeters have had to deal with many disturbances, including the Asian crisis and large current account deficits. The recent increase in oil prices is another hurdle that these countries appear to be addressing effectively.
Issues relevant to developing countries
The promising experience of inflation-targeting pioneers, as well as a number of failed experiences with exchange rate anchors in Asia and Latin America, has persuaded some developing countries to adopt a similar strategy to tame inflation, enhance credibility, and anchor expectations. In Latin America, Brazil, Chile, Colombia, and Mexico have all abandoned their exchange rate targets or bands and moved to a floating exchange rate regime. Each of these countries—along with other emerging economies, including the Czech Republic, Poland, South Africa, and, more recently, Thailand— conducts monetary policy through a more or less formal process of inflation targeting. Although most of these countries have been under the framework for a short time, the record is encouraging so far, as emphasized by participants attending a recent high-level seminar on implementing inflation targets (for details, visit the IMF's website at www.imf.org/external/pubs/ft/seminar/2000/targets/ index.htm). For example, after a huge depreciation of its exchange rate at the beginning of 1999, Brazil's inflation was less than 9 percent for the year and is projected at about 8 percent in 2000. Chile and Israel had similar experiences; both countries adopted the inflation-targeting framework in the early 1990s when their annual inflation rates were nearly 20 percent. The scheme was implemented gradually and flexibly in both countries, helping to reduce inflation to international levels without incurring substantial output costs.
Inflation targeting can benefit developing countries in many ways, by providing a coordination device for inflation expectations as well as a yardstick of accountability for central banks. But developing countries have specific problems that can make inflation targeting more difficult for them to implement than it is for industrial countries. First, because many developing countries still have relatively high rates of inflation, it is more difficult to predict future inflation accurately. As a consequence, the likelihood of missing inflation targets is higher than in more developed countries. Second, the degree of pass-through from exchange rate changes to prices (which tends to be higher in developing countries) and widespread explicit or even implicit indexation mechanisms lead to considerable inflation inertia. Third, one of the prerequisites for inflation targeting is commitment to no other nominal target. Because many developing countries have a sizable share of assets and liabilities denominated in foreign currencies, large exchange rate movements may have serious adverse effects on inflation. Fourth, in many developing countries, central bank independence is more a statutory than a de facto situation, because its decisions are still governed primarily by the need to finance the fiscal deficit, and some fiscal dominance still persists. Many developing countries have significantly lowered their central government's fiscal deficit, but some still have contingent liabilities—involving obligations incurred by local governments and public enterprises, or arising from quasi-fiscal deficits—that threaten the consolidated public sector's fiscal stance. Under these circumstances, central banks might hesitate to raise interest rates for fiscal reasons, although they would be required to do so to contain inflation. Finally, some developing countries may encounter difficulties in meeting the sophisticated information requirements needed for inflation forecasting (for example, reports on leading indicators and reliable econometric models).
Despite these problems, the inflation-targeting approach appears to be promising for developing countries. It offers a number of operational advantages and it compels policymakers to deepen reforms, enhance transparency, and improve the fiscal stance; it also holds out the promise of eventual convergence to international levels of inflation.
|
Glycans are polymers of (arbitrarily) more than about ten monosaccharide residues linked glycosidically in branched or unbranched chains.
Glycans are polysaccharides. Usually, this word is used to refer to the carbohydrate moiety of a glycoprotein. There are 2 types: O-linked and N-linked. O-glycans consist of N-acetylgalactosamine, galactose, and neuraminic acid. N-glycans consist of N-acetyl glucosamine, fructose, mannose, galactose, and neuraminic acid. N-glycans are derived from a 14-sugar unit consisting of 14 residues (3 glucose, 9 mannose, and 2 N-acetylglucosamine). O-glycans, on the other hand, have one sugar added at a time. Examples of O-linked glycoproteins are:
Most glycoproteins are N-linked and have 5-15 sugar residues. O-linked glycoproteins have 1-4 sugar residues.
There is little doubt that glycans have many protective, stabilizing, organizational, and barrier functions. The glycocalyx that covers most cells can represent a substantial physical barrier. The glycans attached to matrix molecules such as collagens and proteoglycan are important for the maintenance of tissue structure, porosity, and integrity. Such molecules also contain binding sites for specific types of glycans, which in turn help with the overall organization of the matrix. The external location of glycans on most glycoproteins can provide a general shield, protecting the underlying polypeptide from recognition by proteases or antibodies
Glycoconjugates and glycans are assembled by glycosyltransferases in reactions specific to the sugar donor and acceptor. These enzymes generally reside in the golgi compartment, with their catalytic domain facing the lumen.
Recommended symbols and conventions for drawing glycan structures. The example used is a typical branched “biantennary” N-glycan with two types of outer termini. This symbolic system for representing monosaccharides is used throughout this book (the figure is also reproduced on the inside front cover). The monosaccharides assigned these symbols are those most commonly found in higher animal glycoconjugates. Unless otherwise indicated, all are assumed to be in the d-configuration, except for l-Fuc and l-IdoA; all glycosidically linked monosaccharides are assumed to be in the pyranose (p) form (six-membered ring); and all glycosidic linkages are assumed to originate from the C1 hydroxyl group except for the sialic acids, which are linked from the C2 hydroxyl group.
Diversity in nature
Available data indicate that considerable diversity of glycan structure and expression exists in nature. However, partly because of the inherent difficulties in studying glycan structure, relatively little is known about the details of this diversity (there are very few published reviews on this subject). For many taxa, there is essentially no information at all. Sufficient data indicate that, unlike the case with nucleic acids and the Genetic Code, there is no universal “glycan structure code.”
|
Teen Violence Statistics
Youth Violence Statistics School Violence Statistics Domestic Violence Statistics Dating Violence Statistics Gang Violence Statistics Rape Statistics Cyber Bullying Statistics Sibling Abuse Statistics Sexual Violence Statistics School Shooting Statistics
School Shootings School Bullying Causes of School Violence School Violence Prevention School Uniforms and Violence School Safety How to Stop School Violence
Teen Violence Facts
Violent Children Overview Gang Violence Drinking, Drugs, and Violence Media and Teen Violence Effects of Bullying Effects of Youth Violence Violent Personality Traits Alcohol and Violence Cycle of Violence Types of Violence Hate Organizations and Teen Violence
Teen Violence Issues
Teen Violence Causes Dating Violence Youth Violence Warning Signs Date Rape Cyberbullying Internet Violence and Cyberthreats Teen Anger Issues Teen Domestic Violence Teen Violence and Video Games Sibling Rivalry Teen Workplace Bullying
Teen Violence Help
Parenting Violent Teens
Parenting any teenager brings challenges but parenting violent teens can be extremely difficult. Learn risk factors associated with violent teens and get tips on getting help for violent teens. Stop the teen violence in your home now with help from this article.
One of the most difficult situations you can encounter in family life has to do with a violent teenager. Parenting violent teens can be quite a challenge. When possible, it is better to look for signs that your teenager might be developing violent tendencies and do your best to stop the problem before it gets out of hand. Understanding the things that can lead to violent teens is an important part of addressing the problem. Once you understand the risk factors, and identify a problem, then you can begin working toward a solution.
Teen violence risk factors
Risk factors that can contribute to teen violence come from many places. These factors include individual, family, school and the community. The Centers for Disease Control and Prevention, as well as Family First Aid, offer the following risk factors that can lead to violent behavior in teenagers.
Individual risk factors
These are risk factors that violent teens often deal with in their personal lives that you should be aware of when parenting violent teens:
Family risk factors
In some cases, violent teens experience problems at home. These family issues can result in violence.
School risk factors for teen violence
Sometimes what is going on in the educational setting can influence teenage behavior toward violence.
Community risk factors
Many of those who are parenting teens notice the presence of several different risk factors in their lives. When parenting violent teens, it is important to take note of these risk factors and issues, and do what you can to offset them.
Getting help for violent teens
When parenting violent teens, it is your job to make sure that they get the help that they need. Without proper help, teenagers can grow into abusive adults that have a hard time connecting in positive ways with others, and developing healthy relationships. The resultant depression and social anxiety can serve to heighten the problem of violence in a life. These types of behaviors should be addressed early on, in order to reduce the impact violence has on the future.
There are different ways to get help for violent teens. One of the most common options is to find counseling. Family counseling may be necessary, especially if there are a number of risk factors in the home situation. Counseling can help the teenager learn techniques to control his or her anger, and to channel it ways that are more constructive and less violent. This can also help parents learn skills to help with parenting violent teens.
More extreme solutions to violent teen behavior can include residential facilities and boot camps. These types of programs get the teenager away from the current environment, and provide opportunities to break down old habits, deal with anger and other issues, and develop more positive behaviors. However, it is important to note that when teens return from such experiences, they have continued help, encouragement and support. If possible, it can help to move to a different area of town, or switch schools, to limit the influences that originally led to the violent behavior.
Parenting violent teens is never easy, but you need to do your best. First, take an honest look at your home environment, and see if things can be changed. Then look for other ways to help your teenager, and your family, break the cycle of violence before it develops further.
Related Article: Violence Intervention >>
|
|Addressing commanders’ perceptions
of public affairs with existing communication theories is useful for framing
the issue and guiding the research methodology. For this Capstone
project, the researchers will examine commander’s perceptions using three
theoretical perspectives: uses and gratifications theory, value expectancy
theory and leader-member exchange theory. In addition, elements of
the communication apprehension principle will be applied to all three of
these theories to better define the competing influences that shape a commanders'
views of public affairs. Examining these influences from these theoretical
perspectives may help explain what makes each influence more or less important
than another. The theories will also prove useful in future research
studies that seek to develop strategies to address those influences.
Uses and Gratifications
Uses and gratifications
theory, first advanced in the 1940s by Lazarsfeld and Stanton (1944), attempts
to explain the reasons people use mass media and the different types of
gratification they receive from it. Gratifications, simply stated,
are rewards or satisfactions obtained by the individual. The theory
relies on the belief that the audience is not merely a group of passive
media consumers, but that they play an active role in selecting different
media to meet their needs (Infante, Rancer & Womack, 1997; Lowery &
De Fleur, 1983). The theory came into prominence in the late 1950s
and early 1960s at a time when researchers realized that traditional effects
theories did not adequately explain audience experiences with mass media
(Blumler, 1979; Swanson, 1979).
Rubin (1986) stated
two underlying presumptions of the uses and gratifications model.
First researchers need to understand audience needs and motives for using
mass media in order to comprehend the effects of the media. Second,
understanding audience consumption patterns will enhance understanding
of media effects.
Rubin (1979) identified
six major uses of television for children and adolescents: learning, passing
time or habit, companionship, escape, arousal, and relaxation. In
a separate study, Rubin (1983) found five reasons that adults use television:
passing time, information, entertainment, companionship, and escape.
Rubin (1984) also identified in a subsequent study two types of television
viewers – ritualized and instrumental. Ritualized users are frequent
TV viewers who use television mainly as a diversion. Instrumental
users usually have a specific purpose in mind when they watch TV and often
use it for information purposes.
Levy and Windahl (1984)
refine the idea of a “totally active audience” (p. 73), and suggest different
members of an audience will display different types and amounts of activity
in different communication settings and at different times in the communication
sequence. They identified three types of audience activity people
engage in when using the mass media: pre-activity (behaviors taken in the
selection of mass media content); duractivity (psychological attentiveness
and personal involvement in the experience); and post-activity (behaviors
taken after the experience, such as discussion or reflection). These
activities obviously varied in degree from person to person. Levy
and Windahl (1984) found that overall, the public is more or less active
and relatively self aware and knowledgeable about the media’s ability to
gratify certain social and psychological needs.
Garramone (1984) writes
that audience motivation is a mediating factor in information processing.
The reasons a person uses various media affect their attention to various
aspects of the media presentation, including the channel and the content.
Uses and gratifications
has come under some criticism from a number of researchers. There
is debate over whether uses and gratifications is a general theory of communication
or a framework comprised of several theories. Swanson (1979) argues
that viewing U & G as a framework of theories leads to conceptual ambiguities
and inconsistencies, while Blumler (1979) and Windahl (1981) suggest U
& G is best approached as an umbrella concept encompassing several
theories. Infante et al. (1997) point out that most of U & G
research relies on self-report questionnaires, which some critics question
in terms of reliability and validity.
Becker (1979) points to
the difficulty in defining and measuring “gratification.” Because
gratification is audience- rather than researcher-oriented, operationalization
becomes a thorny issue. Becker (1979) does point out however that
gratifications do not seem to be media-specific. That is, a person
who seeks a particular type of gratification from one medium will likely
do the same for another medium. Rubin (1986) believes U & G research
will be best served by continuing to explore and explain the specific links
among attitudes, motives, behavior, and communication effects.
Looking at communication
apprehension within the U & G perspective is useful in understanding
why person may avoid using a particular communication strategy. The
principle of communication apprehension simply states that people are more
likely to avoid communication situations that result in fear or anxiety
for the communicator. Within communication apprehension is a category
called reticence, which is a trait attributed to people who are habitually
silent or uncommunicative. Burgoon and Hale (1983) refer to this
in the “Unwillingness to Communicate” model. This model is composed
of two dimensions: an approach-avoidance dimension, which measures the
chance of an individual seeking out face-to-face interactions; and a reward
dimension, which measures the degree to which an individual finds interaction
with others as unprofitable. A reticent person is unlikely to actively
"use" particular forms of communication or derive gratifications from those
Similarly, Miller (1987)
advances several ideas concerning the anxiety and fear associated with
oral communication. Each seems to hint at some link between distress
about communication and negative expectations concerning the outcomes or
process of communication. Burgoon and Hale (1983) suggest that people
who find communication futile can be identified by the "unwillingness to
communicate" approach. The "unwillingness to communicate" scale was
designed to deal with reticence or quietness concerning face-to-face interactions.
Again, the degree of anxiety and fear a person experiences in a communication
situation is likely the affect the person's use of that particular style
While uses and gratifications
theory attempts to explain the reasons people use mass media and the gratifications
they receive, the researchers of this Capstone project feel the principles
of the theory can be applied to explain why many military commanders do
not support public affairs operations. The underlying principle is
that if commanders perceived that there were viable operational uses of
public affairs and that some sort of gratification would result from public
affairs efforts (either personal gratification or unit/base gratification),
then they would be more likely to adopt pro-public affairs attitudes.
Ideally, if attitudes changed, then behaviors would follow, and commanders
would begin to use public affairs professionals in the manner they are
designed to operate.
Employing the uses and gratifications
perspective has potentially significant benefits for advertisers, television
network executives, and politicians. If they can identify the form
and the content that satisfies the needs of their customers, they have
a dependable vehicle for communicating persuasive messages with success.
Similarly, public affairs officers who can identify the form and content
necessary to convey the importance of what they do are more likely to educate
their commanders about the potential uses and rewards of implementing public
Value Expectancy in
officer support for a public affairs program and its staff, the theories
of value expectancy and leader-member exchange stand out as methods of
generating support. Both theories deal with how to persuade using
either recognition of the value of an action thus improving the chances
of adoption, or the cross-communication between senior and subordinate
and upward influence tactics to gain support. The research found
clearly shows that techniques based from either theory (and the given situation),
would greatly enhance a PAO's efforts to gain support from a CO who has
single or multiple influences on him or her to disregard the public affairs
program and/or staff.
Barge (1994) outlines the
expectancy value theory as a choice-making process in which people go after
goals that they perceive as realistic, attainable and desirable.
In other words it means that people calculate the relative payoffs of accomplishing
certain goals. The author stresses that people will first calculate
the expectancy or the amount of confidence they have that certain behaviors
will be followed by a certain outcome. Secondly, people will calculate
the valance, or degree of postivity or negativity, of their view of whether
the outcome is what they wanted. The final calculation people will
make is the instrumentality, or the belief that if they go to the trouble,
the desired outcome will come about (Barge, 1994).
The author notes that
while expectancy value theory explains why people based their decision-making
in order to maximize their gains, the theory does not completely account
for all behavior. Barge (1994) says the theory falls short when the
number of possible outcomes becomes too taxing for our cognitive ability
to calculate. In addition the theory's valance considerations can
not always explain why some people avoid pursuing a goal with a negative
consequences whether the valance is large or small (Barge, 1994).
The important key in
trying to apply this theory to a nonsupport situation is:
1) limiting number of variables,
2) strong positive valance,
3) attainable desired outcome.
If the CO sees value for
the effort, the odds of gaining compliance and support are improved.
Drake and Moberg (1986) suggest
a variation of the value expectancy theory with their exchange paradigm.
The authors argue that each influence attempt is evaluated by the receiver
in terms of comparison of the contribution requested and the inducements
In their model, the authors
outline an influence attempt with the evaluation calculation stage: is
the request adequately compensated by the inducements offered in the content
of the request? The next step is the three possible responses: clearly
yes, maybe yes/no, clearly no. For clearly yes and no, there is little
consideration of the contributions/inducements the requestor receives either
non-calculative compliance or angry non-compliance. The maybe yes/no
section of the model is where the receiver calculates, or weighs, the contribution
request against the inducements offered. The result is either calculative
compliance or non-compliance (Drake and Moberg, 1986).
This provides the basis of
the argument that content does not drive influence or compliance as much
as effective communication. Influencers who use language that violates
power and social expectations will find it harder to achieve their goals
even with adequate inducements. In contrast, using language that
palliates receivers into compliance when the inducements are not good enough
or certain linguistic forms can sedate a target into automatic compliance
responses (Drake and Moberg, 1986).
The effects of non-supportive
leadership of any unit, organization or group ultimately result in poorer
subordinate performance, failure to meet or inadequately meet goals, and
drops in subordinate morale and expectations. Nebecker and Mitchell
(1974) studied the value expectancy theory as it applies to leadership
behavior and subordinate expectations of that behavior. The authors
argue that the value expectancy theory -- the perceived expectation that
a behavior is related to the attainment of outcomes weighted by the evaluation
of these outcomes -- can be used to help predict leadership behavior.
Furthermore, the authors argue that leadership behavior can facilitate
or block the attempts of subordinates to reach their work-related goals
(Nebecker and Mitchell, 1974).
Using leadership behavior
as the independent variable and individual or group outcomes as the dependent
variables, Nebecker and Mitchell (1974) studied supervisors from three
U.S. Navy air squadrons, 50 county supervisors, and their subordinates
using an 11-point Likert scale survey. The authors asked the supervisors
to self-report on the leadership traits provided in the survey, and they
asked the subordinates to rate their supervisors on how they used those
traits. The scale was set with 1=uses none of that behavior and 11=maximum
The behaviors that were rated
1) criticizing subordinates'
2) praising subordinates'
3) showing friendliness
4) explaining to subordinates
what is expected of them
5) supervising subordinates'
6) instructing subordinates
on how to do the job
7) seeking opinions from
subordinates on decisions that will affect them
8) treating worker as individuals
Compilation of their data
showed that expectations of subordinates were correlated with the extent
to which leaders used the surveyed behaviors positively and to the expectancy
value theory (Nebecker and Mitchell, 1974). while the authors called
for other research, it can be assumed that leaders, either military or
civilian, who exhibit positive leadership traits and work toward meeting
the expectations of subordinates will achieve greater success (Current
leadership elements, leadership
principles, and leadership
compentencies for the U.S. Navy --requires Adobe Acrobat Reader)
also plays a role in the value expectancy context. McCroskey (1984)
suggests that communication apprehension develops as a direct result of
what outcome is expected from engaging in various communication behaviors.
Negative expectations are associated with a lack of success in communicating.
MacIntyre & Thivierge's
(1995) research found that people prefer to speak to more familiar and
more pleasant audiences, "both in terms of anticipated anxiety and their
willingness to speak" (p.465). However, the speakers seem more at
ease when speaking to pleasant strangers than to unpleasant friends.
But pleasant friends constituted the most preferred audience.
A category of communication
apprehension known as person-group communication apprehension may be helpful
in describing the relationship between commanders and their hesitations
or mistrust concerning media. Person-group communication apprehension describes
the reactions of an individual communicating with a specific person or
group. According to this perspective, some people may cause apprehension
in others in communication situations (McCroskey, 1982). This theory
supports the possibility that media may make commanders uncomfortable and
Another type of communication
apprehension that may explain commander's attitudes concerning public affairs
and the media in particular is situational communication apprehension.
This perspective describes an individual's communication apprehension to
a person or group at a given time (McCroskey, 1982). Situational
apprehension may explain a commander's fear or unwillingness to speak on
camera or grant interviews to media.
The researchers of this Capstone
project feel that communication apprehension in terms of dealing with the
news media may be a major influence on a commander's attitudes toward public
affairs and their subsequent willingness to become involved in PA programs.
Using McCroskey's (1984) perspective, it is reasonable to assume that a
commander who does not expect a high value from a military-media interaction
is unlikely to support those interactions or participate in those interactions.
Reasons for the apprehension could include fear of saying the wrong thing
and fear of embarrassment in a public forum. Or they could be related
to prejudices and pre-conceived notions about the news media's motives
Often the public affairs
office is considered an outside entity on its own installation. The
"PAO-types" constantly talk with the media and outside community sources,
which, in the mind of the non-supportive CO, are considered to be adversarial
to the military purpose. This status of "being outsiders," makes
influencing the CO difficult at best and different tactics must be considered.
One of the typical signs
of non-supportive leaders is the lack of meaningful, two-way communication
between the leader and the subordinate(s) needing support. Many times
this is perceived by subordinates as lack of concern for their work and/or
no empowerment. Fisher and Ellis (1990) say that effective leaders
exhibit flexible communicative skills. These leaders will adjust
their communicative behaviors and interpersonal relationships according
to the situation and the nature of the people they work with – the followers.
They reference several studies showing when leaders are working with motivated,
competent workers, they show more consideration and respect for them; they
also involve the workers in more decision-making and create less structure
for the workers. Their followers significantly influence these types of
leaders and their communicative behaviors.
Krone (1991) describes the
leader-member exchange theory as having subordinate relationships embedded
in groups, and that these groups are not equivalent. Two specific
groups are defined as in-groups and out-groups. The in-group enjoys
greater work-related support and responsiveness from supervisors and handles
more administering activities and has greater communication with superiors.
The out-group develops more formal and restrictive relationships with supervisors
and perform only routine tasks. However Krone (1991) points out that
the framework of the theory does not explain the extent of in-group or
out-group subordinates' use of upward influence tactics: open persuasion,
strategic persuasion, and manipulation.
The author proposes
a topology for three tactics for upward influence, which are motivated
desires for some alternative condition than what is already in force within
an organization. Open persuasion is the overt attempt by subordinates
to affect supervisors' thinking with the desired outcomes fully disclosed.
Strategic persuasion is less open with the means and closed with the ends.
Some techniques used with strategic persuasion include foot-in-the-door,
door-in-the-face, manipulation use of information, managing self-presentation,
and using ingratiation behaviors. More than the others, manipulation
involves more covert behaviors from subordinates which conceal the real
reasons and ultimate outcome from an influence attempt (Krone, 1991).
Studying the LMX theory
and upward influence tactics, Krone (1991) discovered that the quality
of the relationship in either group determine the tactic most likely used.
Krone discovered that while both groups indicated they used open and strategic
persuasion tactics, the in-group, which perceives a higher quality supervisory
relationship, uses them more than the out-group, which feels more compelled
to protect itself from non-supportive retaliatory responses. Out-group
members were also more inclined to use manipulative tactics because the
author says these tactics are less risky for the out-group relationships
because there is less to lose if caught in the deception (Krone, 1991).
As an off-shoot of the LMX
theory, Harris and Sherblom (1999) brought up one theory to explain the
behavior and the effects of non-supportive leadership in the managerial
leadership grid theory, developed by Robert Blake and Jane Mouton in 1964
from studies conducted at Ohio State University during the 1950s.
It characterizes leadership styles: team management, authority-compliance,
middle of the road, country club management, opportunism, paternalism or
maternalism, and impoverished management on a grid with concern for people
on a vertical axis and concern for task on the horizontal axis. According
to Harris and Sherblom (1999), each axis is scaled from 1 (least) to 9
(most) and the leadership styles are placed appropriately on the scale.
For example 1,1 rating is impoverished leadership that gives no concern
to people or tasking. Likewise, 9,9 is team management which gives
high regard to both people and tasking. A commanding officer who
is non-supportive of public affairs could be possibly scored low in the
team management and concern for people categories while ranking higher
in task accomplishment (mission priorities). Harris and Sherblom
(1999) note that criticism of the theory is that it is too simplistic in
its assumption of universality, but add that it is a valuable starting
place for understanding different leadership styles and leaders.
And while it can help leaders determine when and what styles to use in
certain situations, it can also be a valuable tool to subordinates to determine
how best to influence a leader. (Harris & Sherblom, 1999).
Harris and Sherblom (1999)
state that everyone expects at least three characteristics for all leaders
to exhibit: vision, credibility and communication competence. They
point out that leaders do more than hold meetings and keep track of events.
They must hold on to the overall vision while moving the group toward that
vision. This means planning long and short-term goals, focusing attention,
managing conflict, and empowering others to help the creative process.
By credibility, Harris and
Sherblom (1999) say a leader must inspire the group’s trust and confidence
in the leader’s abilities and credibility. The authors define credibility
1) knowledge and expertise,
2) honesty and ableness,
3) remaining calm under
4) likableness, and,
5) interest in others
Leaders without credibility
are usually perceived as manipulative or dishonest and will have a harder
time gaining compliance from their subordinates.
is defined by the authors as being able to translate relevant knowledge,
skills, and situationally appropriate behavior in a way subordinates can
understand and trust. It also is defined as being able to mange ambiguity
and uncertainty – knowing how to “read” the followers as well as their
operational environment, and know when to reduce or heighten uncertainty
(Harris & Sherblom, 1999).
Often times, commanding
officers see the public affairs officer and staff as necessary evils to
be tolerated. Others see the media as an enemy that cannot be trusted.
In most cases of the non-supportive CO, the individual sees no value to
dealing with the PAO or the media and therefore sees no purpose in using
limited resources to support the endeavor. The PAO and staff must
try to provide the CO with considerations designed to gain compliance by
attaching values and benefits that guide the CO toward compliance and support.
|
The Kojiki, translated by Basil Hall Chamberlain, , at sacred-texts.com
Originally, when dwelling at the palace of Naniha, [the Heavenly Sovereign] on holding a copious feast when at the great tasting, 1 was intoxicated with the great august liquor, and fell greatly and augustly asleep. Then his younger brother, King Sumi-no-ye-naka-tsu, wishing to take the Heavenly Sovereign, set fire to the great palace. Thereupon the Suzerain of Achi, 2 ancestor of the Suzerains of Aya 3 in Yamato, having taken him away by stealth, set him on an august horse, and caused him to make a progress into Yamato. So [the Heavenly Sovereign] awoke on reaching the moor of Tajihi, 4 and said: "What place is this?" Then the Suzerain of Achi said: "King Sumi-no-ye-no-naka-tsu set fire to the great palace; so I am fleeing with thee into Yamato." Then the Sovereign sang, saying:
On reaching the Pass of Hanifu 6 and gazing at the palace of Naniha, the fire was still bright. Then the Heavenly Sovereign sang again, saying:
So when they reached the entrance of the Ohosaka mountain, 8 they met one woman. This woman said: "A number of men bearing weapons are barring [the
way across] the mountain. Thou shouldst cross it going round by way of Tagima. 9 Then the Heavenly Sovereign sang, saying:
So making his progress up, he dwelt in the temple of the Deity of Isonokami. 11
358:1 p. 359 I.e., on the occasion of his performing the religious ceremony of tasting the first rice of the season.
358:2 Achi no atahe, supposed to be of Korean origin, and to be a descendant of , great grandson of the Chinese Emperor .
358:3 Aya no atahe. This family was of continental origin, Aya being the Japanese reading of the character ; see Sect. CXI, Note 2.
358:4 Tajihi no nu, in the provinces of Kahachi. The signification of the name is obscure.
358:5 This Song expresses the Monarch's regret at not having brought his mats with him.—From the expression used in the text (tatsu-gomo), the, commentators suppose that such mats were used as a sort of screen to avert draughts. One proposal is to consider tatsu as the Verb tatsuru, "to set up," because these mats must have been "set up" round the room. But it agrees better with grammatical usage to take it in its other sense of "cutting," or "dividing," and to suppose that the mats were so called because they "cut off" the draught from the person sitting behind them.
358:6 Or "Hill of Hanifu," Hanifu-zaka, in the province of Kahachi.
358:7 The meaning of this Song is perfectly clear.
358:8 See Sect. LXIV, Note 25. The word rendered "entrance here and below in the same context is literally "mouth."
359:9 See Sect. LXII, Note 49.
359:10 Moribe thus paraphrases this Song: "If the maiden whom I met at Ohosaka and whom I sought direction of had been a common mortal, she would have simply told me the shortest road. But now I see why it was that she bid me go round by way of Tagima: it was to preserve me from danger. Ah! she must have been a Goddess."—The p. 360 words tada ni generally have the sense of "directly," "immediately," and are indeed here so understood by Motowori. Moribe's interpretation, which has been followed by the translator, does but little violence to the text, and suits the general meaning better.
359:11 See Sect. XLV, Note 16.
|
by Jeff Zbar
Updated 12 months ago
The geographic area where Fort Lauderdale exists today traces its
populated roots back thousands of years. Native Americans, including the
Tequesta and later the Seminole, thrived here before the first White settlers — thought to be Bahamians — encamped along the New River, notes Susan Gillis, official Centennial Historian for the city of Fort Lauderdale.
City celebrates 100-year anniversary.
|1998||The BankAtlantic Center opens in Sunrise, welcoming the Florida Panthers NHL franchise as part of its 200-dates-a-year calendar line-up.|
|1991||The Broward Center for the Performing Arts opens, anchoring the new downtown arts and entertainment district. The Broward County Convention Center also opens near
|1985||The City Commission instructs the police to enforce open-bottle laws, effectively ending Spring Break's run and transforming the city into a family-friendly destination.|
|1961||The NAACP stages beach "wade-ins" in an effort to desegregate Fort Lauderdale beach.|
|1960||Where the Boys Are, starring Connie Francis and George Hamilton, debuts. For the next 25 years, Fort Lauderdale is known as the "Spring Break Capital of the World."|
|1960||The New River Tunnel (later renamed the Henry E. Kinney Tunnel, after a Miami Herald editor who supported its creation) opens.|
|1938||The Elbo Room bar opens on Fort Lauderdale beach, eventually serving soldiers then spring breakers.|
|1928||Port Everglades opens, enabling area farmers to ship produce up the East Coast.|
|1928||What later becomes Fort Lauderdale-Hollywood International Airport opens as a field with a runway. The airfield later became a naval air station during WW II, then Broward County Airport, from which Mackey Air began flying to the Bahamas in the 1950s.|
|1917||Las Olas Causeway is completed, crossing the New River Sound to the beach. The original "Las Olas" (the waves) was an area hunting lodge and later a hostel.|
|1896||Henry Flagler's Florida East Coast Railway arrives in Fort Lauderdale.|
|1893||Frank Stranahan builds a trading post on the north bank of the New River. His barge ferry carries people, wagons and goods across to the south side.|
|1838||The first army fort, named for Major William Lauderdale of the Tennessee Volunteers, is erected during the Second Seminole War.
Two more forts would follow.
Historic Images courtesy of the Fort Lauderdale Historical Society Inc.
|
Colquitt County, in south Georgia, was established in 1856 on lands ceded between 1814 and 1818 by the Creek and Seminole Indians. The state's 115th county, it was created from parts of Thomas and Lowndes counties and named for Walter Terry Colquitt, an attorney, judge, circuit-riding Methodist preacher, and statesman who served Georgia in the state senate, U.S. Senate, and U.S. Congress.
Maps of Colquitt County drawn just seven years after its creation show only two communities, Greenfield (no longer extant) and Moultrie (formerly known as Ochlockney), today the county seat. A number of other communities have come and gone, leaving seven incorporated towns: Berlin, Doerun, Ellenton, Funston, Moultrie, Norman Park, and Riverside.
The region was uninviting at first for settlement. Early maps label it as "Piney Wastes" or "Pine Barrens," descriptive of the miles and miles of sandy soil then supporting only yellow long-needle pine forests used mainly as a buffer zone between the Creeks and the Seminoles.
Realizing that the soil would not support cotton, the first white settlers started making use of the forest. They cleared land, shipped out the lumber, and harvested pine gum for turpentine. Wood and turpentine were both used in shipbuilding, and thus the region became known as a rich source of naval stores. The arrival of a number of railroads after the Civil War (1861-65) provided both a demand for timber to use as crossties and a method to transport Colquitt's products
By 1910 it became apparent that the forests were disappearing into the sawmills and turpentine stills, leaving abundant tracts of "cut over" land. The county's first "farm agent" helped develop a farsighted crop-diversification system known as the "Colquitt County Plan." This five-year method served as a model for the U.S. Farm Security Administration during the Great Depression, earning the county well-deserved national renown for its progressive planning. Colquitt is still known for its diversity of agricultural crops, among them cattle feed, cotton, peanuts, sugar cane, watermelon, corn, wheat, and other grains.
While the civil rights movement of the 1960s caused strife for some in Georgia (and elsewhere), Colquitt's schools were peacefully desegregated by local residents' careful planning. Among other accomplishments of the 1960s and 1970s were the founding of the Moultrie Area Vocational-Technical School (later Moultrie Technical College) and the consolidation of all high schools in the county. When Spence Field, a military airfield from the World War II (1941-45) era, closed in the 1960s, the city of Moultrie bought it and made the site and facilities available for
Brewton-Parker College extension at Norman Park offers a core curriculum associate degree and education-related bachelor's degrees. The extension is housed at the Georgia Baptist Conference Center in Norman Park, which is the former home of Norman College. Moultrie Technical College serves both traditional and nontraditional students and offers associate degrees in such applied sciences as accounting, early childhood care, and Internet programming. Of the college's five campuses, two are in Colquitt County (both in Moultrie).
Notable county residents include U.S. senator Saxby Chambliss and Charles M. Duke, a lunar-module pilot for the Apollo 16 space mission and the tenth man to walk on the moon. Duke received his first flight training at Spence Air Base.
According to the 2010 U.S. census, the population of Colquitt County is 45,498, an increase from the 2000 population of 42,053.
Susan R. Boatright and Douglas C. Bachtel, eds., Georgia County Guide (Athens: Center for Agribusiness and Economic Development, University of Georgia, annual).
Colquitt County Heritage Book Committee, comp., The Heritage of Colquitt County, Georgia, 1856-2003 (Marceline, Mo.: Walsworth, 2003).
W. A. Covington, History of Colquitt County (Atlanta: Foote and Davies, 1937; reprint, Spartanburg, S.C.: Reprint Co., 1980).
Mattie Oglesby Coyle, History of Colquitt County, Georgia, and Her Builders (Moultrie, Ga.: [Observer Press], 1925).
Elizabeth B. Cooksey, Savannah
A project of the Georgia Humanities Council, in partnership with the University of Georgia Press, the University System of Georgia/GALILEO, and the Office of the Governor.
|
About Seasonal Flu
Influenza is a contagious respiratory illness. Every year various strains of the seasonal flu circulate in our community causing "the flu" in tens of thousands of people.
Flu Granny Campaign, and the Ottawa County Health Department reminds you:
- For crying out loud, get your flu shot!
- For the umpteenth time, wash your hands!
- For goodness sake, cover your mouth when you sneeze!
- You are old enough to know better; do not go to work sick!
Questions and concerns about the seasonal flu? Explore our site. If you cannot find the answers you are looking for, or simply would like to share an idea or suggestion, click here. We would love to hear from you. Check this site periodically as new items will continue to be added to the page. You can also keep up with the often changing flu information by visiting www.facebook.com/flugranny and becoming one of her "fans."
|What is it?||The flu is a contagious respiratory illness caused by influenza viruses. It can cause mild to severe illness, and at times can lead to death.|
|How is it spread?||Flu viruses are spread mainly from person to person through coughing or sneezing of people with influenza. Sometimes people may become infected by touching something with flu viruses on it and then touching their mouth or nose.|
|What are the symptoms?||Symptoms of flu include: Fever (usually high), headache, extreme tiredness, dry cough, sore throat, runny or stuffy nose, muscle aches. Stomach symptoms, such as nausea, vomiting, and diarrhea, also can occur but are more common in children than adults|
|How serious is it?||With seasonal flu, we know that seasons vary in terms of timing, duration and severity. Seasonal influenza can cause mild to severe illness, and can lead to death. Each year in the United States, on average 36,000 people die from flu-related complications and more than 200,000 people are hospitalized from flu-related causes.|
|Who is at risk?||In seasonal flu, certain people are at "high risk" of serious complications. This includes people 65 years and older, children younger than five years old, pregnant women, and people of any age with certain chronic medical conditions. This includes pregnancy, diabetes, heart disease, suppressed immune systems, asthma and kidney disease.|
There are everyday actions that can help prevent the spread of germs that cause respiratory illnesses like influenza.
- Get your flu vaccination.
- Cover your nose and mouth with a tissue when you cough or sneeze. Throw the tissue in the trash after you use it. In the absence of a tissue, use the crook of your elbow.
- Wash your hands often with soap and water, especially after you cough or sneeze. In the absence of soap and water, alcohol-based hand cleaners are also effective.
- Avoid touching your eyes, nose or mouth.
- Try to avoid contact with sick people.
- If you are sick with flu-like illness, you should stay home for at least 24 hours after your fever is gone except to get medical care or for other necessities. (Your fever should be gone without the use of a fever-reducing medicine.)
- Be prepared in case you get sick and need to stay home for a week or so; a supply of over-the-counter medicines, rehydrating beverages, tissues and other related items might could be useful and help avoid the need to make trips out in public while you are sick and contagious.
What should I do if I get sick?
You should stay home and avoid contact with other people. You may ease symptoms with over the counter flu medicine, get plenty of rest and drink fluids. You should stay home for at least 24 hours after your fever is gone without the aid of fever reducing medicines. Staying at home means that you should not leave your home except to seek medical care. Avoid normal activities, including work, school, travel, shopping, social events, and public gatherings. If you have severe illness or you are at high risk for flu complications, contact your health care provider or seek medical care. Your health care provider will determine whether flu testing or treatment is needed.
Yes. Antiviral drugs are prescription medicines that fight against the flu by keeping flu viruses from reproducing in your body. If you get sick, antiviral drugs can make your illness milder and make you feel better faster. They may also prevent serious flu complications.
How long can an infected person spread seasonal flu to others?
People infected with seasonal flu shed virus and may be able to infect others from 1 day before getting sick to 5 to 7 days after. This can be longer in some people, especially children and people with weakened immune systems.
How long can influenza virus remain viable on objects (such as books and doorknobs)?
Studies have shown that influenza virus can survive on objects and can infect a person for 2 to 8 hours after being deposited on the surface. To prevent the spread of influenza virus it is important to keep surfaces clean by wiping them down with a household disinfectant according to directions on the product label.
Holland, MI 49424
FAX: (616) 393-5643
Clinic FAX: (616) 393-5659
8:00am - 5:00pm
Social Media Sites Policy
16920 Ferris Street
Grand Haven, MI 49417
Phone: (616) 846-8360
FAX: (616) 844-1778
Monday, Wednesday, Friday:
8pm-12pm & 1pm-5pm
3100 Port Sheldon Road
Hudsonville, MI 49426
Phone: (616) 669-0040
FAX: (616) 669-3039
Monday, Wednesday, Friday:
8am-12pm & 1pm-5pm
|
Micro combined heat and power (MCHP) is an emerging technology that shows tremendous potential to reduce greenhouse gas emissions. A hybrid technology, MCHP systems enable owners to self-generate a portion of their electricity as a byproduct of heating their home or office. EPA estimates a typical home in a cold climate could reduce CO2 emissions by 20–30% with a MCHP system by offsetting electricity purchased from the grid.
Two MCHP units met the Emerging Technology Award Requirements for micro-CHP (66KB) and were recognized by EPA in 2011 and 2012:
ECR International's freewatt MCHP system uses heat generated by a reciprocating Honda engine to produce 12,000 BTU/hr of heat while simultaneously co-generating 1.2kW of electric power for a home or building—up to 5,000 kWh per year! On colder days where the heating demand exceeds the initial level of heat generation, the system's high efficiency furnace or boiler kicks in to meet the space heating requirement. The Warm Air system includes a 95% efficient two-stage, variable speed condensing furnace while the hydronic system incorporates a modulating, 95% efficient boiler.
Freewatt system controls also have the ability to connect to the Internet, offering the homeowner the ability to monitor power generation and energy savings, or set their programmable thermostat.
For more information, visit www.freewatt.com.
Marathon's ecopower MCHP system harnesses the heat generated by a reciprocating engine to deliver more than 40,000 BTU/hr of heat while simultaneously co-generating as much as 4.7 kW of electric power to the building. Primarily used in multi-family and small commercial buildings, this unit functions best in applications where hydronic heating systems are used; however, it can be adapted to other heating systems.
Ecopower systems can be multiplexed (i.e., up to three systems connected to one central control unit) to serve larger facilities. Some typical applications include: multi-family buildings; schools; lodges and small hotels; agriculture/green houses; car washes; and sports centers/swimming pools.
For more information, visit www.marathonengine.com/intro_eco.html.
|
As the nation marked Columbus Day on Monday, indigenous groups led a rally at Occupy Wall Street exposing the history behind Christopher Columbus and the impact his "discovery" had on the Americas. "We’re here to say that Columbus is not a day," said Roberto "Múcaro" Borrero of the United Confederation of Taíno People. "We’re here to join with other people’s voices in saying there needs to be an end to the cycle of colonialism and greed." [includes rush transcript]
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: We’re standing here at Liberty Plaza right next to an indigenous gathering, where they’re using the people’s mic. People are speaking, and then they’re repeating it to amplify what is being said.
Why don’t you introduce yourself?
ROBERTO "MÚCARO" BORRERO: Hi, Amy. My name is Roberto "Múcaro" Borrero. I’m a representative of the United Confederation of Taino People. I’m a Taíno indigenous person.
AMY GOODMAN: And explain who are the Taíno and why you’re here today on Columbus Day.
ROBERTO "MÚCARO" BORRERO: Well, for us, it’s actually Indigenous Peoples Day. And for the Taíno people, who were the first indigenous peoples in the Western Hemisphere to be contacted by Columbus, to be impacted by the colonial machine that took—that was set in motion after that initial contact, we’re here to say that Columbus is not a day. We’re here to join with other people’s voices in saying there needs to be an end to the cycle of colonialism and greed. So I’m happy to be here with everybody.
AMY GOODMAN: Thank you very much.
|
The Cat in the Hat has scattered things all over the house-can you pick up the most things before Mother gets home?
To collect the most Picture Cards.
4 Playing Pieces and Stands
40 Picture Cards
Spinner Card and Spinner Arrow
1. Each player chooses a playing piece, puts it into a stand, and places it at Start.
2. Each player uses the Player's Square closest to her/him.
Player's Square for Player 1 Picture Card
3. Players place one Picture Card on each space on the board, so that the background color of the Picture Card matches the color of the space (e.g., place yellow cards on yellow spaces).
PLAYING THE GAME
The youngest player goes first. Players take turns spinning the spinner and moving the number of spaces shown. Play passes to the left.
PICKING UP CARDS
The first time that a player ends a move on a space with a Picture Card, s/he picks up this card and places it on his Player's Square.
Players pick up an additional Picture Card when they end a move on a space with a Picture Card that either:
· shares a letter with the top Picture Card on their Player's Square, or
· matches the color of the top Picture Card on their Player's Square.
For example, if a player's top card is "dish," s/he can pick up a
Picture Card with a "d," "i," "s," or "h." He can pick up "fish," "house," "hat," or "milk," but cannot pick up "net," "gown," "man," or "umbrella." If this player has a card with a red background he can pick up a card with a red background, regardless of the letters on the cards.
When a player collects a Picture Card, he stacks it on top of all the other Picture Cards on her/his Player's Square.
A player may only use the top Picture Card on his Player's Square to make matches; other cards can no longer be used and are kept stacked below the top card.
WINNING THE GAME
The game ends when the last player reaches Finish. Players count the number of Picture Cards they've collected-the player with the most Picture Cards wins the game.
The Cat in the Hat Game is designed for parents and children to play together. The rules are simple and the game is played in the same manner every time, so children can quickly become comfortable with the game. This game teaches and reinforces early reading skills: children look for letters that form words and learn to recognize words as they see them paired with pictures. The game also features counting, matching, and introductory strategy skills. Since the game is not over until the last player reaches Finish, every player stays involved in the game until the very end.
PARENTS' RULES SUMMARY
Players take turns spinning the spinner and moving along the board from Start to Finish. The first time that a player ends his move on a space with a Picture Card, he removes that Picture Card from the board and places it on her/his Player's Square. From then on, a player picks up another Picture Card every time that s/he ends her/his move on a space with a Picture Card that shares a letter or color with the top Picture Card on his Player's Square. When the last player reaches Finish, the player with the most Picture Cards wins the game.
Copyright ©1997 University Games
|
Catholic Mass For Dummies
Part I: The Lord Be with You: Welcome to Mass.
Chapter 1: Understanding the Mass.
Chapter 2: The Foundations of Mass.
Chapter 3: The Liturgical Year.
Chapter 4: Meet the Players: Liturgical Ministers.
Part II: Forms of Catholic Worship.
Chapter 5: Ordinary Form of the Mass.
Chapter 6: Extraordinary Form: Traditional Latin Mass.
Chapter 7: Variations in the Ordinary Form.
Chapter 8: Extending the Mass: Liturgy of the Hours and Eucharistic Devotions.
Chapter 9: Eastern Catholic Divine Liturgy.
Chapter 10: Other Catholic Rites.
Part III: Tools of the Trade.
Chapter 11: Liturgical Books.
Chapter 12: Liturgical Vestments.
Chapter 13: Liturgical Vessels, Altar Linens, and Artifacts.
Chapter 14: Architecture, Art, and Music.
Part IV: The Part of Tens.
Chapter 15: Ten Special Places of Eucharistic Miracles.
Chapter 16: Ten Saintly Commentaries on the Holy Sacrifice of the Mass.
Part V: Appendixes.
Appendix A: The Mass in Latin, English, and Spanish.
Appendix B: Revisions in the English Translation of the Mass.
|
Many chemical substances are essential in small amounts for the human body to function but larger amounts can become harmful. Even water and oxygen can be lethal to people if they are exposed to excessive amounts. While many people believe that naturally occurring substances are safer than synthetic chemicals, some naturally occurring chemicals are the most poisonous.
Modern society uses tens of thousands of chemicals in everyday products. Alcohol, cosmetics, household adhesives and cleaning products, insect sprays, paints, petrol, weed killers, foods and medicines are just a few examples. Although many common products contain chemicals that can be harmful if used incorrectly, consumers generally understand and accept the risks and benefits of using these products.
Many useful products contain toxic chemicals that if used inappropriately can cause:
serious illness if swallowed
severe irritation on contact with the eyes or skin
respiratory and other illnesses if inhaled
allergic reactions in consumers with high sensitivity to small amounts of certain chemicals.
There has been increasing public awareness of potential chemical hazards associated with the use of some consumer products. In many cases safety concerns are not justified. This is because the composition of many products containing chemicals ensures no possible exposure to the chemicals or to large enough amounts of the chemicals to cause illness. In most cases products are only dangerous if consumers fail to use them for their intended purpose or fail to follow instructions and warnings for correct use.
Many concerns about chemicals relate to individuals with high sensitivity or allergic reactions to certain chemicals. These medical conditions range in severity and include:
mild skin irritation
Naturally occurring or synthetic chemicals in foods and other products may cause these reactions. Consumers who suffer these allergies and sensitivities rely heavily on the accuracy of ingredient or compositional information on product labels. It is essential for suppliers to ensure that this labelling is accurate and not misleading or deceptive.
If you suffer these reactions it is important to:
get expert testing and diagnosis from qualified medical professionals
seek information and advice about managing the condition
Reducing risks associated with chemicals in consumer products
Always read and follow instructions that come with the product, such as:
wash food, garments, bedding and towels before use
test cosmetics on a small patch of skin before use
wear gloves or goggles during use
use the product in a well-ventilated area
store products out of reach of children
seal products using the child resistant cap or closure provided
dispose of empty containers rather than using them to store other goods.
Note that suppliers must:
provide ingredient labelling for cosmetics and food
provide a declaration that foods contain certain allergens
ensure products meet requirements of any relevant product safety bans or mandatory standards.
Seek information about the chemical composition of products you are thinking of buying, as this may affect your decision. Ask suppliers for assistance. If a supplier cannot provide the information you seek, shop elsewhere. Only purchase products that best meet your needs and preferences. Be wary of paying more for any products that come with unproven claims about the benefits or safety of the product or its ingredients.
Food Standards Australia New Zealand (FSANZ)—food, beverages and packaging.
The Australian Building Codes Board (ABCB)—building products.
The Department of the Environment, Water, Heritage and the Arts (DEWHA)—environmental contaminants in hazardous waste.
The Australian Pesticide and Veterinary Medicines Authority (APVMA)—agricultural and veterinary medicines and swimming and spa pool sanitisers.
The National Drugs and Poisons Schedule Committee (NDPSC)—poisons and household cleaners and chemicals.
The National Industrial Chemicals Notification and Assessment Scheme (NICNAS)—industrial chemicals used in manufacturing, products, building and construction and for chemicals in cosmetics. NICNAS prohibits or restricts harmful use of chemicals in these products through:
Manufacturers must ensure all consumer products meet levels of safety generally expected by the community or face liability for illness, injury, death and loss. Consumers can take legal action against manufacturers of a defective or dangerous product, including for exposure to chemicals.
To avoid penalties and consequences all suppliers must also:
comply with relevant bans and mandatory standards
ensure all labelling and safety claims they make are true and not misleading or deceptive.
|
- Explore the data in your project to look for other trends. For example, look at the melt extent in years other than 1992 and 2002, such as 1995.
- Use the internet to find out about world events in 1992 that could have changed the melt extent pattern.
- Use the Measure Tool to measure, and then calculate the size of one of the melt extent grid squares. How much area of Greenland melted each year of the study? Produce a graph of melt area vs. year.
For teachers wishing to discuss/illustrate the issue of climate change and the cryosphere, without using GIS, the data can be viewed using online tools and resources such as the ones listed below.
- Animations and online visualizations are available from NASA Visualization Studio Images and Animations.
- Visit the NASA Global Ice Viewer to learn more about other glaciers around the world, see videos of melting, and learn about the NASA missions that are studying these glaciers. (Requires flash)
- Visit the Atlas of the Cryosphere to see other online maps and animations.
- Survey other NASA Global Climate Change Key Indicators.
- Read recent news about melting Arctic ice from National Geographic, July 2007, The Big Thaw.
- Learn more about remote sensing and the study of the Cyrosphere on the ICEsat page.
- Read more about Polar Discovery and science at the poles.
View Greenland Melt Extents with Google Earth. Data is available for 1979 - 2007 from the National Snow and Ice Data Center. Scroll down the page to see the Greenland files.
Case Studies with Tool
Other EET chapters that use My World GIS and/or other GIS software include the following:
How Cities Affect Their Local ClimateExplore the urban heat island effect using student collected surface temperature data. Subset large datasets, buffer others, examine spatial relationships, and gather statistics to investigate temperature differences in urban and rural school sites.
Detecting El Nino in Sea Surface Temperature DataCreate and analyze fifteen years of average SST maps to find El Niño and La Niño events.
Evidence for Plate TectonicsIdentify relationships among sea-floor age, earthquakes, and volcanoes to understand how they support the theory of plate tectonics.
Exploring Monsoon Precipitation and Streamflow in a Semi-Arid WatershedInvestigate the effect of summer thunderstorms on streamflow in a semi-arid watershed in Arizona.
Investigating Earthquakes with AEJEEDownload earthquake data from the USGS. Bring it into a GIS and analyze it to predict where the next big earthquake will occur on Earth.
Looking into Earth with GISExamine seismic wave data in a GIS and analyze wave velocities to infer the depth of the crust-mantle boundary.
Mapping Local DataFollow a study of Urban Heat Islands as an example of a map-based science research project.
Seeing the Forest for the Trees: What's in Your Woods?Investigate forest biodiversity in Maine using a spreadsheet and My World GIS. Then consider the environmental factors that contribute to tree species diversity.
Protecting Wetlands from Exurban DevelopmentExamine land-use changes around Macclenny, Florida. Propose locations for future development that minimize impacts on wetlands.
Tsunami Run-up Prediction for Seaside, Oregon with My World GISDownload and examine global, historical tsunami run-up patterns. Acquire DEM contours and import them into My World GIS. Then visualize the potential sea level rise that could occur during a tsunami run-up event near Seaside, Oregon.
Case Studies on Related Topics
Whither Arctic Sea Ice?Uses remote sensing data from Satellite images and the ImageJ program to illuminate trends in Arctic Sea Ice.
Explore the Role of Snow Cover in Shaping ClimateUse ImageJ to explore and animate satellite images of reflected short wave radiation, snow cover, and land surface temperature downloaded from the NASA Earth Observation (NEO) website. Then use NEO's Image Composite Editor (ICE) to observe, graph, and analyze the relationship between these three variables.
How Permanent is Permafrost?Use Google Earth to explore the distribution of permafrost in the Arctic. Create graphs to analyze permafrost borehole data. Then compare the borehole temperature record with global temperature trends and reflect on the implications for Arctic permafrost.
|
The Sun Essay
The sun is a huge, glowing ball of gases at the center of the solar system. The earth and the other seven planets travel around it. The sun is only one of billions of stars in the universe. As a star, there is nothing unusual about it. But the sun is more important to people than any other star. Without the heat and light of the sun, there could be no life on earth (Stix 49).
The diameter (distance through the center) of the sun is about 865, 000 miles (1,392,000 kilometers), about 109 times the diameter of the earth. Because the sun is about 93 million miles (150 million kilometers) from the earth, it does not appear larger than the moon. But the sun’s diameter is 400 times as large as that of the moon. The sun is also almost 400 times farther from the earth than is the moon (Stix 49). The sun is nearer the earth than is any other star. For this reason, scientists study it to learn about stars as much farther away. The visible surface of the sun consists of hot gases that give off light and heat. Only about one two – billionth of the sun’s light and heat reaches the earth. The rest is lost in space (Stix 51).
The temperature of any place on the earth depends on the position of the sun in the sky. The temperature greatly affects the weather of a region. Tropical regions near the equator have a hot climate because the sun shines almost directly overhead at noon. Regions near the North Pole and the South Pole have a cold climate because the sun never rises far above the horizon (Stix 54).
Today, we know we must have the sun as a source of heat, light and other kinds of energy. All life on the earth – people, animals and plants – depend on this energy from the sun. Plants use sunlight to make their own food and in the process give off oxygen. People and animals eat the plants and breathe in the oxygen. In turn, people and animals breathe out carbon dioxide, which plants combine with energy from sunlight and water from the soil to produce more food (Stix 54).
Scientists estimate that the sun and the rest of the objects in the solar system are about 4,600,000,000 years old. They believe that the sun will continue to be a source of energy for at least another 5 billion years (Stix 56). About three – fourths of the mass of the sun consists of hydrogen, the lightest known element. Almost a fourth of the sun’s mass consists of helium. Scientists discovered this gas on the sun before they found it on the earth. The word helium comes from the Greek word meaning sun (Stix 56).
Of the 109 known elements, 91 occur naturally in or on the earth. The other elements are artificially created. At least 70 of the earth’s natural elements have been found on the sun. But all these elements – except hydrogen and helium – make up only between 1 and 2 per cent of the mass of the sun. Scientists were able to indentify the elements on the sun by studying the spectrum (pattern of colored lines) of light from the sun (Stix 59).
Until human beings learned to develop nuclear energy, sunlight supplied their energy needs. Plants used sunlight from photosynthesis. Animals ate the plants, and people used both plants and animals for food, clothing and shelter (Stix 59). People also use the energy in fossil fuels – coal, oil and natural gas. These fuels come from plants and animals that lived millions of years ago. After the plants and animals died, they were buried by soil in swamplands or on the sea floor. By burning cola, and by refining oil and natural gas, energy is released from the sun that was stored in fossils millions of years ago (Stix 59).
In addition, people use sunlight for power in other ways. For example, the effects of sunlight cause wind, which some people use to power windmills. Sunlight also evaporates water, which falls as rain. The rain forms rivers. Hydroelectric power plants on the rivers use the power of moving water to generate electricity. Solar furnaces use mirrors to focus sunlight to heat water in boilers. Solar energy cells provide power for artificial satellites and spacecraft (Stix 62).
The sun gets energy from the thermonuclear reactions near its center. These reactions change hydrogen into helium. They release so much energy that the sun could not shine fro about 10 billion years with little change in its size or brightness. The sun is about 4,600,000,000 years old, and it probably will shine for at least another 5,000,000,000 years (Golub & Pasachoff 114).
By studying other stars, astronomers can predict what the rest of the sun’s life will probably be like. About 5,000,000,000 years from now, they believe, the center of the sun will shrink and become hotter. The surface temperature will fall slightly. The higher temperature of center will increase the rate at which hydrogen changes into helium, and the amount of energy given off by the sun will also increase. The outer regions of the sun will expand about 30 to 40 million miles (48 to 64 million kilometers) – about the distance to Mercury, the planet nearest the sun. The sun will then be a red giant star. When the sun is a red giant, the earth’s temperature will become too high for life to exist there (Golub & Pasachoff 114).
After the sun has used up its thermonuclear energy as a red giant, astronomers believe it will begin to shrink. After the sun shrinks to about the size of the earth, it will become a white dwarf (Golub & Pasachoff 117). The sun may throw off huge amounts of gases in violent eruptions called nova explosion as it changes from a red giant to a white dwarf. A star that becomes a white dwarf has entered a final stage of its existence (Golub & Pasachoff 118).
After billions of years as a white dwarf, the sun will have used up all its energy and lose all its heat. Such stars are called black dwarfs. After the sun has become a black dwarf, the planets will be dark and cold. It the earth still has an atmosphere, the gases of the atmosphere will have frozen onto the earth’s surface (Golub & Pasachoff 118). The inner third of the interior of the sun is called the sun’s core. The temperature in the core is about 27,000,000 F (15,000,000 C). The material that makes up the core is more than 100 times as dense as water, but it still consists of gases. Thermonuclear reactions, which produce the sun’s light and heat, occur in the core (Bracher 4).
Beyond the core is the radiative zone, which extends through about the middle third of the sun’s interior. In the radiative zone, the average temperature is about 4,500,000 F (2,500,000 C), and the gases are about as dense as water. The parts of the radiative zone that are nearer the sun’s surface are cooler than those that are closer to the sun’s core. Because radiant heat normally flows from a hot place to a cooler one, the energy produced in the sun’s core flows through the radiative zone, toward the surface of the sun. This outward flow of heat is called radiation (Bracher 4).
The convection zone begins about two – thirds of the way from the center of the sun and ends about 137 miles (220 kilometers) below the sun’s surface. The temperature in this zone is about 2,000,000 F (1,100,000 C), and the gases are about a tenth as dense as water. The gases are about a tenth as dense as water. The gases are so cloudy that energy from the sun’s core cannot travel through the convention zone by radiation. Instead, the energy causes the gases to undergo violent churning motions called convection and turbulence. These motions carry most of the sun’s energy to the surface (Bracher 7).
The sun’s surface, or photosphere, is about 340 miles (547 kilometers) thick, and its temperature, is about 10,000 F (5500 C). The photosphere is actually the innermost layer of the sun’s atmosphere. It is from one – millionth to 1 ten – millionth as dense as water (Bracher 9).
The photosphere contains many small patches of gas called granules. A typical granule lasts only 5 to 10 minutes, and then it fades away. As old granules fade away, the sun’s surface becomes marked with new ones. Scientists believe the granules are produced by violent churning of the gases in the convention zone (Bracher 9). The photosphere gives off the sun’s energy in the form of heat and light. The sunlight given off by the photosphere is made up of many colors. Various elements in the photosphere absorb some of the colors and prevent the sun from giving off those colors. Scientists can see what colors are absorbed by passing sunlight through a glass prism to form a spectrum.
These lines are called Fraunhofer lines, after Joseph von Fraunhoter, a German physicist who studied them during the early 1800’s. Each element has its own characteristics, pattern of Fraunhofer lines. Astronomers learned what elements are on the sun by comparing the Fraunhofer lines of sun’s spectrum with the lines that various elements show in laboratory experiments (Bracher 11).
In photographs of the sun, the region near the edge of the disk does not appear so bright as the central region. This effect is called limb darkening. It occurs because light from the central region follows a more direct path to the earth than does light from the edge of the disk. As a result, less of the central light is absorbed by the sun’s gases, and more light from deep within the atmosphere can be seen. The deeper gases are hotter then those near the surface and the hotter gases give of brighter light (Bracher 11).
About 100 miles (160 kilometers) above the photosphere, the temperature is about 7200 F (4000 C). Above this point, the temperature rises again. In the chromospheres (middle region of the sun’s atmosphere), the temperature reaches about 50,000 F (27,800 C) (Bracher 11).
The chromosphere consists of hot gas in violent motion. Some of the gas forms streams called spicules that measure as much as 500 miles (800 kilometers) thick and shoot up as high as 10,000 miles (16,000 kilometers) (Bracher 14).
The temperature of the sun’s atmosphere climbs rapidly above the chromosphere. A region above the chromosphere called the corona has an average temperature of about 4,000,000 F (2,200,000 C). The atoms of the corona are so far apart that gases of the coraona have little heat. If it were possible for an astronaut to be in the corona and shielded from the direct rays of the sun, the astronaut’s space suit would have to be heated (Golub & Pasachoff 118).
The temperature drops slowly from the corona outward into space. The corona has no well – defined boundary. Its gases expand constantly away from the sun. This expansion of its gases is called solar wind (Golub & Pasachoff 118).
The temperature of the chromosphere and the corona are a puzzle to astronomers. Heat flows from hot areas to cooler areas, and yet the photosphere is cooler than the outer regions of the sun’s atmosphere. Astronomers believe that the high temperature of the chromosphere and the corona result from the turbulence of gases in the convection zone, combined with the influence of magnetic fields produced in the sun’s interior (Golub & Pasachoff 120).
The sun radiates (gives off) energy into space in the form of light and heat. Every second, about 4 million short tons (3.6 million metric tons) of the sun’s mass change into energy. The earth gets only about 4 pounds (1.8 kilograms) or about one two – billionth, of the total energy radiated by the sun every second. But this amount is enough to make life possible on earth (Sukhatme & Sukhatme 97).
Astronomers have found that sun spots, flares, prominence, and other stormy activities on the sun occur because of changes in the patterns of magnetic fields on the sun. A magnetic field occupies the space around a magnet where magnetism exerts a force. Magnetic fields contain magnetic lines of force, or flux lines. In a bar magnet the lines of force form a simple pattern (Stenflo 85; Title 165).
The sun has a magnetic field that somewhat resembles the pattern of a bar magnet, especially near the sun’s poles. But near the sun’s equator, the magnetic pattern is always changing because the movement of gases there makes the magnetic field irregular. Atoms of those gases are ionized. An ion is an atom or group of atoms that has either gained or lost electrons. Many atoms of gas on the surface of the sun have lost electrons and form a type of gas called plasma. Particles trapped in a magnetic field usually follow the magnetic lines of force. But the motion of large quantities of plasma tends to change the direction of these lines. As a result, changes occur in the pattern of the sun’s magnetic fields, and stormy activity takes place (Stenflo 85; Title 168).
Sometimes a strong loop of magnetic lines of force extends through the sun’s surface. Where the lines cross through the surface, they lower the temperature of the gas. This gas does not shine so brightly as the surrounding gas, and it appears as a sunspot. Because a magnetic loop both leaves and reenters the surface, two sunspots are associated with the loop. After a few days, a magnetic loop may break up into several thinner loops. Each of these loops crosses the surface at a different place. The original sunspot breaks up into several sunspots that from a sunspot group. Still later, the magnetic loops spread out and over a wider area, and their sunspots fade away (Stenflo 87; Title 170).
A sunspot cycle begins when sunspots appear at high solar attitudes. As the cycle continues, more sunspots are reversed from those of the previous cycle. The north and south magnetic poles of the sun’s general magnetic field also become reversed. Thus, the sun takes two sunspot cycles, or 22 years, to go through a complete set of magnetic changes (Stenflo 89; Title 173).
Bracher, Katherine. “The Interior of the Sun.” Mercury 28 (1999): 4.
Golub, Leon and Jay M. Pasachoff. The Solar Corona. New York: Cambridge University Press, 1997.
Sukhatme, S.P., and K. Sukhatme. Solar Energy. India: Tata McGraw-Hill, 1996.
Stenflo, Jan Olof. Solar Magnetic Fields: Polarized Radiation Diagnostics. Springer, 1994.
Stix, Michael. The Sun: An Introduction. Springer, 2002.
Title, Alan. “Towards Understanding the Sun’s Magnetic Fields and their Effects.” AIP Conference Proceedings 703 (2004): 163 – 173.
University/College: University of Arkansas System
Type of paper: Thesis/Dissertation Chapter
Date: 20 March 2017
We will write a custom essay sample on The Sun
for only $16.38 $13.9/page
|
An area of land reserved in treaty negotiations for the exclusive use of an Indian tribe.
The Lummi elders revived the First Salmon Ceremony to instill in Lummi children a strong sense
of their community’s history and values.
The word first indicates that the ceremony honors the first salmon caught in the Nooksack
River in the spring. The First Salmon Ceremony has been held by generations of Lummi people
over many years.
The First Salmon Ceremony features children’s art, dancing, and eating, too.
You have answered all of the questions in this section. Use these
links to review your answers. To continue, click the arrow below.
Go To My Story Project
Why is it important for this community to educate its young people about this environmental issue?
This interactive experience requires
Adobe Flash Player 9 or higher.
What are the hopes this community has for the future of its culture and environment?
Take notes and save images to help answer these questions. Your images and notes
will be saved to the
Story Project where
you can use them to create your own slideshow.
“Our elders had a ceremony that we recently revived called
First Salmon Ceremony, where we pay respect to the salmon.”
The First Salmon Ceremony is a way of showing respect for the salmon. 2010
“I think the Salmon Ceremony is so important because it...allows us to have the
children understand the identity and the purpose for their life, and to be strong leaders for us.”
Lummi children take part in the First Salmon Ceremony. 2010
“We are salmon people, and we will always be salmon people.”
Lummi student art decorates the room where the salmon ceremony is held. 2010
“I think people need to understand that you have to respect and protect Mother Earth.”
Salmon cooks over an open fire pit for the First Salmon Ceremony, Lummi Nation. 2010
“Clean air, clean water, clean oceans, clean lakes — we need to clean up our act as human beings.”
A clean earth is needed. People can choose to make this happen. 2009
Students make the sticks the salmon is cooked on. 2010
The Lummi Nation is proud of its efforts to bring the salmon back.
|
PovcalNet, the World Bank’s global poverty database, provides all kinds of country statistics, including mean income, the share (and number) of the population living in absolute poverty ($1.90), the poverty gap and several measures of income inequality, such as the Gini coefficient. But one thing it doesn’t provide is median income or consumption. The median is a better measure of “typical” well-being than the mean, which is always skewed to the right.
We’ve been waiting for the World Bank to add these medians to its PovcalNet database, but we got impatient and did it ourselves. By manually running a few hundred queries in PovcalNet, we now have (and can share with you) the latest median income/consumption data for 144 countries (using 2011 PPPs — more on our methods below).
By making this data public, we hope to encourage more development professionals to use the median in evaluating individuals’ material well-being in developing (and developed) countries and progress toward broad-based economic growth and shared prosperity. We also hope that wider use of the median will provide an incentive for the World Bank to publish the data in an easily accessible format along with the full distribution, in line with its open data policy.
Why the median?
Average or mean-based measures of income, such as GDP per capita, will always be higher than the median — the value at the midpoint — of that distribution, which is inevitably skewed to the right. So medians convey far better the material well-being of the typical individual in a country and have other advantages including simplicity and durability. The simplicity helps explain why the stagnation of the median wage is so often cited in the US press in the context of middle-class decline as the benefits of growth go to the top. Real median household income has been about $53,000 a year or $48 a day per person for a family of three. That puts median income per person in the US at only just about one-third of average income measured as GNI per capita.
A better example for the development community: the median reflects how much the person at the 50th percentile of the income distribution earns (or spends), giving us a better picture of the well-being of a “typical” individual in a given country. Take Nigeria and Tanzania: in 2010, Nigeria’s GDP per capita (at PPP) was $5,123; Tanzania’s stood at only $2,111. This suggests that Nigerians were more than twice as well off as Tanzanians. Yet, if we compare consumption medians, a different picture emerges: a Nigerian at the middle of the income distribution lived on $1.80 a day, while his or her Tanzanian counterpart had 20 cents more to spend, at $2 a day.
That difference is illustrated in the graph below, with countries plotted left to right according to their GDP and vertically according to their median income or consumption. The highlighted pairs, such as Nigeria and Tanzania, have very different GDPs per capita while sharing similar levels of typical well-being as measured by median income or consumption.
Using PovcalNet to extract the medians: data and very brief methodology
Despite the illustrative power of the median, the development literature still relies largely on GDP (per capita) or sometimes on the marginally more representative GNI (per capita). For the last five years, the data needed to calculate country medians has been available via the World Bank’s PovcalNet database. PovcalNet provides information about poverty and inequality across the globe based on over 800 representative household surveys and 1.2 million households in over 140 economies. It is a treasure trove for scholars, students, and development professionals, but it fails to live up to its full potential in its current format. In one query, one can view average monthly income, the share of the population below a user-determined poverty line, the poverty gap, the Gini index, and other, more obscure measures of poverty and inequality (see the screenshot on Brazil’s data below). But there is no easy way for users to check the median income or consumption for a country or to access a country’s full income distribution. There is also no way to download query results in an easily editable format like a csv or xls file.
A year and a half ago, our colleagues Justin Sandefur and Sarah Dykstra ran 23 million queries through PovcalNet over the course of nine weeks and made the resulting global poverty and income distribution data (using 2005 PPPs) available to the public. We didn’t attempt to repeat their herculean efforts, but we did create a dataset of median income/consumption for all countries available using the recently updated 2011 PPPs. Our median data was obtained in its entirety from the World Bank’s PovcalNet database. We use the latest survey year available and list whether the median is based on consumption or income data. We also note — as PovcalNet does — whether the data is grouped (C or I) or whether it represents unit-record data (c or i). For China, India, and Indonesia values for rural and urban areas are listed separately. The data were collected by manually entering a guesstimate for the given country’s median as the “poverty line,” and revising the guesstimate until the associated headcount was 50 percent. Deviations of up to 1.5 percent in the headcount associated with the median are possible.
|
Impact play is a human Human sexual behavior in which one person (the bottom) is struck (usually repeatedly) by another person (the top) for the sexual gratification of either or both parties. Impact play is sometimes referred to as percussion play, corporal punishment or CP. It is considered a form of BDSM.
There are number of activities that qualify as impact play.
In erotic spanking the bottom is struck either with the top's open hand, or a rigid implement such a paddle, cane or riding crop. In the latter case the activity is often referred to as paddling, caning or cropping. The usual targets for spanking are the buttocks and inner or outer thighs.
- Single tails such as a bullwhip have a single fall. The associated activity is referred to as single tailing.
- Floggers, such as a cat o' nine tails have many falls. The associated activity is referred to as flogging.
For safety, impact play should be done on areas of the human body well protected by fat or muscle; spots to avoid include the kidneys, neck, tailbone, hipbones, the head and all joints. The usual targets for flagellation are the buttocks and the two areas of the upper back below the shoulder blades. With care, the thighs, the backs of the calves and the chest can be targets as well. Breasts are another potential, but high-risk, target.
The use of a whip means that the top must take great care to hit the intended target area, and avoid wrapping; that is when a whip or flogger makes contact with the target area somewhere up its length and the remaining length wraps around the bottom's body to deliver a sharp, non-erotic, and possibly injurious off-target blow, such as to the hipbones or ribs. The longer the falls, the more skill is required by the top to land a safe blow. Advanced flogging techniques use a pair of floggers employed in a martial arts style alternating pattern, a technique commonly referred to as "florentining" or "florentine flogging."
The sensations produced by impact play depend the area in which the impact is concentrated. Wide implements such as an open hand, paddle or flogger produce a dull "thuddy" sensation. Narrow implements such as a cane, riding crop, belt or single tail produce a sharp "stingy" sensation.
- sexuality.org has articles on spanking, flogging , and caning
- The basics of flogging at Albany Power Exchange
|
US Indian tribes
What's new on our site today!
Native Languages of the Americas:
Shasta Indian Legends, Myths, and Stories
This is our collection of links to Shasta folktales and traditional stories that can be read online.
We have indexed our Native American mythology section
by tribe to make them easier to locate; however, variants on the same
legend are often told by American Indians from different tribes, especially if those tribes are kinfolk or neighbors to
each other. In particular, though these legends come from Shasta mythology, the traditional stories of
related tribes like the Karok and
Achomawi tribes are very similar.
Enjoy the stories! If you would like to recommend a Shasta legend for this page or think one of the ones on here
should be removed, please let us know.
The great creator god of Shasta legends, often called Old Man Above or Great Man in English.
The culture hero of the Shasta tribe. In some Shasta stories, Coyote
plays the mischievous trickster role common in California Indian folklore, but in others, he is a more
serious protagonist who helps humanity and teaches them the arts of civilization.
Old Mole's Creation How Old Man Above Created The World:
Shasta myths of creation.
How Coyote Stole Fire:
Shasta legend about the origin of fire.
Why Mount Shasta Erupted:
Shasta legend about a fight between Coyote and the Yellow Jackets.
Land of the Ghost Dance:
Shasta legend about Coyote's visit to the land of the dead.
Mt. Shasta Grizzly Legend Old Man Above And The Grizzlies:
Shasta Indian legends about a woman who married a bear.
How The People Got Arrowheads:
Shasta legend about how Ground Squirrel stole arrowheads.
Coyote Was Going There: Indian Literature of the Oregon Country:
Excellent anthology of folklore from the Shasta and other Oregon tribes.
Indian Legends of the Pacific Northwest:
Collection of legends and folktales from the Shasta and other northwestern tribes.
Myths and Legends of California and the Old Southwest:
Online book about Southwest and California Indian mythology.
American Indian Trickster Tales:
Compilation of more than a hundred stories about Coyote and other Native American tricksters.
(Use discretion sharing these with kids as some of the stories contain adult humor.)
Shasta religion and expressive traditions
The Religion of the Indians of California
Books of Native American legends
Native American tribes in California
California culture area
Native American Indian tribe
Back to Indian monsters and spirits
Back to the American Indian linguistics homepage
Read some Native American literature
Indians of South America
Tribal tattoo art
Would you like to help support our organization's work with endangered American Indian languages?
Native Languages of the Americas website © 1998-2015 Contacts and FAQ page
|
HOLTZMAN, IBRAHIM VAUGHN
© Dr. Willis E. McNelly
Discoverer of the Holtzman Effect. Born on Liesco II during the Great Dark Ages, I.V. Holtzman was the son of the planetary governor. Young Holtzman was nearly killed in a tragic accident in a racing 'thopter in 7565 B.G. and was kept alive only by the most heroic measures of the advanced medical sciences of Liesco. He became the first of very few persons to undergo a brain transplant: his brain was placed in a prototype axolotl tank and wired into a large host computer with an unprogrammed personality blank, on the assumption that Holtzman would imprint his own personality on the machine. The process was marred by an induced psychosis: afterwards, Holtzman suffered from intense paranoia and refused treatment. Since Holtzman's was the first brain transplant ever performed, the extent of his powers was not fully understood.
When Holtzman tapped into the computerized production network and ordered the construction of a peculiar style of spaceship under the guise of the chief engineer of House Holtzman, no one noticed. Similarly, when release papers were presented to the hospital, he was discharged without a second thought. Finally, when the assembly that was Holtzman was placed aboard the odd new ship and connected directly to its systems, no one thought it odd that takeoff clearances arrived in the tower so promptly, or that the scheduling comp fed Holtzman into the takeoff line ahead of other waiting ships.
Before anyone could stop him, Holtzman triggered the suspensor-nullification device and disappeared into the Void. He wanted time to think. So with his ship, which was for all intents and purposes himself, he entered a cometary orbit aimed to attain perihelion in 7556 B.G., nine years away. For the next few years, the library comps of Liesco were plagued by unexplained interruptions in their transmissions: Holtzman was covertly copying the data into his own storage to be studied at his leisure. His mental processes retained their human nature while being sped up by an estimated factor of ten; needing neither sleep nor rest, Holtzman must have thought at least thirty times faster than a normal human.
He had been a mathematical genius before his accident and was most interested in the suspensor-nullification effect. In the time between his escape and 7562 B.G., Holtzman learned more about it than the best minds of the previous fifty centuries. He was evidently driven by a desire to remind his imagined persecutors that he was alive without revealing his position, because the first message transmitted via Holtzman Waves was a strange amalgam of random accusations.
The next messages, explaining Holtzman's discoveries, were emitted from the planetary mass of Liesco II itself, to the intense but brief confusion of Governor Holtzman and his advisors. As the nature of the discovery became clear, excitement seized the academic community of Liesco. But the Governor realized that his son's insane genius could prove dangerous, and came to the difficult conclusion that Ibrahim would have to be controlled or destroyed.
For the next nine years, the Governor’s patrols searched the Liesco system. In 7556 B.G., a patrol scout received a radar image of the ship now known as "the Mad Holtzman." The scout was immediately joined by two cutters, and all three moved in for the kill.
When Holtzman detected them, he sent a wave message to the six nearest inhabited systems, saying, "I have developed an instantaneous interstellar communication device, which Governor Holtzman of Liesco is attempting to keep for himself. If you will rescue me, I will share this knowledge with you." The message, emanating from the primary of each system, was set to repeat while Holtzman tried to outrun the approaching patrol vessels.
By his instinctive action, Holtzman had proven that his discovery could reunite the Empire: the ability to summon reinforcements instantly is the ability to win battles, and to win battles is to maintain an Empire. Of the six systems receiving Holtzman's SOS, five responded immediately.
Holtzman's ploy almost worked: his pursuers got off a couple of extremely long-range shots, ripping up the manipulators for his suspensor-nullification field. The stem of Holtzman's ship blew apart, throwing it into an uncharted orbit and destroying its ability to maneuver. Holtzman was crippled, unable to use his drives; he was rapidly drifting out of the range where his solar panels would provide enough emergency power to keep him functioning. So Holtzman husbanded his little remaining power and sent a quick wave pulse to every inhabited star system he could get an accurate aim on, containing the data for the construction of Holtzman Wave transmitters. Then, with his power beginning to flicker, he shut himself down, and instituted a single wake-up procedure to bring him back up when, as he had calculated, his new and highly eccentric orbit brought him back into the Liesco system in 1,862 years.
Holtzman's actions resulted in the widespread and rapid development of Holtzman Wave generators, bringing on the Wars of Reunification, which raged through the inhabited worlds. So ferocious were these struggles (and so long-lasting) that Holtzman did not reveal his existence during his second return to the Liesco System in 5694 B.G. He did, however, effect needed repairs within the limits of his damaged servos.
Detecting no malevolent activity on his third return, Holtzman sent a brief wave message to Liesco, not knowing that it was now a prison world administered by a few orbital computers. On detecting radio messages from the supposedly primitive planet, these machines immediately sent emergency calls to the Provincial Warden's office on Maktiun III. The Warden sent several technicians to Liesco to find the transmitter and report how the prisoners had managed to build it. Holtzman, of course, overheard all these messages and knew that investigators were on the way. Still insanely paranoid, he decided to protect himself fully: assuming that everything he transmitted would be recorded for the investigation, he "published" (as he described it) his discovery of the Planar Effect. He then dropped back into quiescence, all his receptors tuned toward Liesco.
When the technicians inspected the recordings made by the guardian machinery, they were flabbergasted: all accounts had Holtzman dead and lost in interstellar space. They first suspected a bizarre hoax, and turned to the orbiting computers, which were subjected to extensive diagnostic tests. Of course, nothing untoward was discovered. Meanwhile, the Warden played the recordings to several experts. One was a historian, and he recognized the archaic speech of the Great Dark Ages. Another was a theoretical wave mechanic named Staivan, chief engineer of House Varrik. Staivan, finding nothing inconsistent in the theories and mechanisms described in the tapes, tried to follow the instructions and generate a Node for this "Planar Effect."
He succeeded. The first manufactured Shield was a simple flat effect, about a meter in diameter, admitting radiation in all but the long radio frequencies. Staivan did not realize what he had, though, until he accidentally dropped a screwdriver into the field and saw it gently lowered through the plane of the effect. Staivan reported at once that whatever these messages were, they were no hoax.
He later took the field apparatus into the courtyard to test its resistance to a variety of missiles of increasing power, and, at last, a workman's cutting laser. Thus, as his last discovery, he learned that the Planar Effect did not mix well with coherent light.
The Warden sent a wave to Liesco, where Holtzman was nearing the end of his active period, demanding more information. The situation must have appealed to Holtzman's sense of humor: he broadcast a brief biography and promised to return in another 1,862 years when, he hoped, his reception would be more cordial. He then sent another "information packet" to the systems within range, detailing his latest discovery, and powered down. This was the second and last time Holtzman was to single handedly change the face of the empire, as the Planar Effect spread like wildfire.
When Holtzman made his fourth return in 1970 B.G., Liesco was again at war, this time in a dispute arising from the Second Reunification. But by now Holtzman was a legend who had predicted his own return. The combatants therefore agreed upon a two-month truce bracketing the perigee of Holtzman's approach. On this occasion Holtzman "published" his unified theory, linking the various effects into a single hierarchy of phenomena.
Observers noted that his paranoia seemed to be less intense than before. Holtzman was now willing to discuss himself in precise terms: for the first time he admitted what many had assumed-he was a machine over laid with the mind of a man, even if, as he said, he did not "feel like a machine." Apparently, Holtzman was getting lonely, because he was quite voluble during the passage, and gave his interviewers information on which, he joked, they could base their speculations for the next eighteen centuries.
Holtzman would not discuss what he called "work in progress," but something was exciting him as he left panel range: he stated several times that he could "see the end," and needed only a few more days. He was still too paranoid to let anyone know his orbit, though, and he revealed for the first time that to avoid capture he had rigged a small Planar Field before a normally inactive message laser. His maintenance procedure (always active, even when Holtzman was normally powered down) would trigger the laser if intruders were discovered. No one was sure that he was not lying, but Holtzman's cheerful statement that he had rigged a dead-man boobytrap reminded the listeners that they were dealing with a madman.
Holtzman passed out of range before he discovered whatever he was searching for: his last transmission was a frustrated promise to "finish this thing up first thing next time."
Holtzman's next return, his fifth, occurred in 108 B.G. The Butlerian Jihad was ending, and all intelligent machines had been destroyed except for Holtzman. So many pilgrims had arrived to witness the destruction of the last great symbol of the old order that keeping them supplied caused severe logistical problems, and even, incredible as it may seem, collisions between ships in interplanetary space. The Jihad fleet did not attempt to communicate with Holtzman, but began an intense search which found him after only three days. They cast lots to determine who would make the kill, and the honor fell to Viana Kellis. After drawing near to him, she suited up and entered Holtzman's ship; minutes thereafter, the entire fleet was bathed in the flash of a tremendous mass-conversion reaction.
No one knows what Holtzman's last theory was, if there really was one, since he has not been found again in the centuries since the Jihad. In all likelihood, his fate was exactly what it appeared to be. Both his life and death were tragic, and humanity cannot calculate the debt it owes him. For he was unique: had he not been mad. Holtzman would never have been so determined in his work, had he not been more machine than man, he could not have been so painstaking; yet had he not possessed that essential spark of humanity, he would never have been able to make the intuitive leaps that eventually brought him to the answers he sought.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.